last executing test programs: 1.505019843s ago: executing program 0 (id=5089): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006111080000000000731a0eff000000009500cecf00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x23}, 0x22) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x2, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.446086487s ago: executing program 0 (id=5091): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000040000000400000001"], 0x50) close(0x3) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r2, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x60000000}, 0xc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 1.412852558s ago: executing program 0 (id=5093): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r0}, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00'}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000800000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="b40800000000000073119b00000000008510000002000000b7000000000000009500c20000000000950000120000000079c1221a5629f87281ed8dd57a36c4bf2acc4811c8ac0ea254f2"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611090000000000063012100000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) ioctl$TUNSETLINK(r3, 0x400454cd, 0xd59eeee63dfc1db) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@cgroup, r4, 0xb}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000050000000000950000000000000000000000000000000009000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb261a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f9105f82317874b33d96b39fa4e045469989d552af6200000003a00000000000000abecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f1623ed38ae89d24e14b40234756ddcebfba2f87925bfacba83109753f543ad027edd68149ee99eebc6f7d6dd4aed4afe1f44ccb19e810879b70a70900000000000000000000d7900a820b6327944e9a217b9800e02a92895614cd50cbf83a1ed25268816b004519c9c5cff097d8000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d6209000000c773713a66b223fa8b148871c8d31d24000025449f106b99893ed20fa7a050fbbef90327e827e513e9606800000000e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed208ada12f7a1525320e71666f472a972d5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940f19dff00ffffffff080000ff003853e59de7621e348955735264f34b1046a1813668297a7edad187ef106ae7fcbb25090f17d0baadeb8ae190a1fb5a315f8347fb0379659500000000000000000000000000000000000000002fdf0193ec79c90ed210ebc2fbed6d4216770c1b0dec886b388d138c2b69c6aacb714e7264093061c660a5100b7cc165889eb94c8d7c77b6fa06f1a4d8e4a6b6cb37e319c5c22f276b03cae853f42b07ca0b03b1eb32a6b1a81cd511fd0b59d57a11c6a3ebf9731464ad21f07f618efc31023ac60007426162b57e803519954d7c952197b0a508c0e16fda392fa84be38e937d36af1c35138e05a9e8d6dc0272de72c41500000000304402e22af23437126f330f8eb4075daaeae3134ece35cd86d95bd9836bd186c4b6565e967a4e3e86f299b7400994ba136b4eccf3b0f001a266c0d160b3ce1182001d64b52a5ce7f506295d59eea6903b84ffbabf5a5b91c1d6ecce8728a224aec66c610e3becd60a35e848c224f8251947eed20e2b612cb099bfe8924d33ba7f0691fed04a43e9c64b7a1e3165e86cdb9871c678a6bbb14821f441c6c14d1bd78d8ffdfea12c19ea04264335d60b6b7a7da6fb83f33101db32f6ab137d943dd3c1e8db9f3e1263573dc721ae82fe0bc63598751a5092c9f7dbfc39d564834e3703492c2a651643d8ce5c36d97a4812cf73fc8ea0d6"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000380)={r0}, 0xc) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@s, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00'}, 0x90) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000800000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x88) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="b40800000000000073119b00000000008510000002000000b7000000000000009500c20000000000950000120000000079c1221a5629f87281ed8dd57a36c4bf2acc4811c8ac0ea254f2"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405000000000000611090000000000063012100000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async) ioctl$TUNSETLINK(r3, 0x400454cd, 0xd59eeee63dfc1db) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={@cgroup, r4, 0xb}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000050000000000950000000000000000000000000000000009000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 1.411772048s ago: executing program 2 (id=5094): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r2}, &(0x7f00000001c0), &(0x7f0000000080)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xd, 0xa, &(0x7f0000000d80)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r6}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @alu={0x7, 0x1, 0xb, 0x0, 0x8, 0x6, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x32}, @cb_func={0x18, 0xc, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000980)='GPL\x00', 0x400, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.410872768s ago: executing program 4 (id=5095): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="611528000000000061138c0000000000bfa00000000000001503000008004e002d3501000000001f95004100000000006916000000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffbd4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18487b6feb89752cd600000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d5454d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684e62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961cf4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fd0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bbff4bbe0000000000000000000000000044585397feaadda3fcc64e7b0c08f7ac5c64cb190f1712a3b10fc34eb758705f1751d8c8b712eb39d2b8ad44f129c2c9aedb15"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 1.343704542s ago: executing program 4 (id=5098): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000102700000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) ioctl$TUNSETLINK(r1, 0x541b, 0x200000000000) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 1.311793214s ago: executing program 0 (id=5099): perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffc, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc, 0x0, 0x0, 0x0, 0x779911f4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa4500, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000080)) 1.226167419s ago: executing program 2 (id=5100): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000001c0)={r2, &(0x7f00000000c0), 0x0}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x884, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x5, 0x8, 0xf}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x7, 0xffffffbc, 0x100, 0x1, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x1, 0x2}, 0x50) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x50) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r8}, &(0x7f0000000a00), &(0x7f0000000a40)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r8}, &(0x7f0000000880), &(0x7f00000008c0)=r7}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="12000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x2}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x1e, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xadb5, 0x0, 0x0, 0x0, 0xc}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x0, 0x1, 0x8, 0x9, 0x6, 0x8}, @jmp={0x5, 0x1, 0x4, 0xa, 0x8, 0xfffffffffffffffe, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='GPL\x00', 0x804, 0x5a, &(0x7f0000000280)=""/90, 0x40f00, 0x34, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0xa, 0x6, 0xffff}, 0x10, 0xceb3, r0, 0x2, &(0x7f0000000740)=[r3, r4, r5, r6, 0xffffffffffffffff, r0, r7, r9, r10, r11], &(0x7f0000000780)=[{0x0, 0x4, 0x3, 0x8}, {0x5, 0x3, 0x0, 0x3}]}, 0x94) r12 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000340)=ANY=[@ANYBLOB="1200000002000000180000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000400)=ANY=[@ANYRES32=r12, @ANYRES32=r0, @ANYBLOB='\a'], 0x10) close(0x3) close(0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x2000000000000055, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9d}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x5c}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x8, '\x00', 0x0, @sched_cls, r7, 0x6, 0x0, 0x13, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) 1.20925117s ago: executing program 1 (id=5102): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x44) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x10, 0x7, 0xfd, 0x2, 0x0, 0x3, 0x4009, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5262, 0x0, @perf_bp={&(0x7f0000000100), 0x5}, 0x100808, 0x8, 0x99e, 0x2, 0x7, 0x80000000, 0x3, 0x0, 0x1, 0x0, 0x1}, r0, 0x10, 0xffffffffffffffff, 0x1) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0x1, 0x4e, 0x1, 0x4, 0x0, 0x4, 0x800, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x10}, 0x16035, 0x7, 0xc, 0x7, 0x0, 0xab0, 0x7fff, 0x0, 0x6, 0x0, 0x7}, r0, 0x1, r1, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r0, &(0x7f00000005c0)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x27) 1.198924101s ago: executing program 1 (id=5103): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x14060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0xdffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000f36aa4cc828c89575d93d10638fd95a35ff766d3792bfcd909077b2d1117804c9e9fd19355fd51f99daf726ba3dfabf4bb197afd8a183cccac82a76efa662ea8741bad3790508c866f6b22c65dd00974775dd4323479c9bb9a101fc867fe", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000540)="d2ffdd934517f3e145fa02e086dd", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x7}, [@generic={0x6b, 0x1, 0x1, 0x9e}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x14060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0xdffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x19}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000f36aa4cc828c89575d93d10638fd95a35ff766d3792bfcd909077b2d1117804c9e9fd19355fd51f99daf726ba3dfabf4bb197afd8a183cccac82a76efa662ea8741bad3790508c866f6b22c65dd00974775dd4323479c9bb9a101fc867fe", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000540)="d2ffdd934517f3e145fa02e086dd", 0x0, 0xd5b4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x7}, [@generic={0x6b, 0x1, 0x1, 0x9e}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(r1) (async) 1.133104354s ago: executing program 2 (id=5104): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETLINK(r1, 0x400454cc, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x410880, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x8982, 0x20000000) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), 0x0, 0x0, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$unix(0xffffffffffffffff, 0x0, 0x200c8061) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x5452, &(0x7f0000000180)={'syzkaller0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x4000, 0x0, 0x0}, 0x30) (async) close(r5) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x80, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.132877924s ago: executing program 3 (id=5105): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83b23dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c11160fb20b1c581e7b0915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab3aa32f948c06b59b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2abd18cae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e26d0a5752813bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a7237841cef384b22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c74f0e2a9bf62ffec6459db40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced84680900000000000000d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d2782a70cf44ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894edff8249dc1e3428d2129369ee1b85af1eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038deb359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491dc6aaee0d40973109644fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f77abb21338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e155f455010b0cb578af7dc7d5e87d4cd376444e2de02f47c61e8e84ff828de453f3489460fd83210e95307e676e1fb4d5865c0ca177a4c7fbb4e62b4450900576b2b5cc7f819abd0f885cc4806f47ffbff01000054f5a2d3875e46000000000000e734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329a18cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481ed51a6359cade91fd645c6d924f36a86bf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf817becd9e5a225d67521d1128eac7d80a6225c3e2f0932223bfbf69ff861f4394836ddf128d6d19079e64336e09000000c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661fdcfa68f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b98a8bf6c747d9a1cc500bb892c3a16ff10feea20bdac89afb758cfa10000000000000000000000000200000000000000ed713df0c59e38928511a64845f1b21ed03369719fa905909d8ce35b42761c46d040e53a0a227e9cecd4d414231baa4894a13763ea5de7a52e61a588babaf5da9a28f477e032400938116cb294447898039724881de3ba3dd5e5e115b58d438b17ad11bf1b1f1ed057d89ec46b2b9bb434e9187a728d1136333958469b22d2126664b5299cc3167ac9a4d501638b978e1c692da5261dae5c9d13065b8ed8b358e7273dfa1e9a8dc1d16aa1edd0c274dedb7cd7e4753c152b4e0e3d124e561420587b9b00ab68c32d6b397c5e7cc4e803e6b6e8ed547e2875372023d111e64cd9ee3635888ecbc7352fd60f348456d74e9e7c09ee202dd09524ecfd3d8c836c0a13a9a45a7e2cec88fa2710ee35c9ed1b824fe4fe68849eee41b5e335aeec0f27053b3a07a001ffe29c5cc3a0ccdcc74330c2a995378d225495c5a543519d952c96da9257f47acc29c48d48b22b1f502b9d743d352de56efbb1b15158c4f0107ba5b3394d4cad4f0a1d31f694d0f559e7f82682775ec7569eeb7ef643dbcbafc4c1c5cbb0ad02dd2a69c5f2b5350049a817b546cf734a746a1cc147a6050bd16598e8e3a5c3515d0edc23e66bbdc6c117559357f49c59208af1162ba1d6667e3ab6bb1696c32dc3bcb2c8ab30d28265ff55c8a80c8e3ce29b2f576ea686d351a8cdb808739ed1a7022fb6e4e834593279c791085e49d1b8124adaf0010790e72ef2035e3da7ebb117c1a032a7378d5c62bb1a4e212618113bbd688091273028a44abfe09067e22fda361d6769d1f44bb06ca0cb9a14a54a8ba0dcb5445c4b368bd1dcce7500"/2356], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x1c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES64, @ANYBLOB="f9ffffffffffffffdcd5635f", @ANYRES8], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000013c0)={{r2}, &(0x7f0000001340), &(0x7f0000001380)='%pI4 \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000012c0)={r2, &(0x7f0000000080), &(0x7f0000001400)=""/152}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000240)="d2205d9ec717ab96f0ded75d86ddc4863ab02b2b2260c1ebcd1743824244ff770d25dd4991369955e657f5cf537b0142c1e34f8909c0", 0x0, 0xd5b5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 870.43279ms ago: executing program 2 (id=5106): perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x2, 0x7, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000008, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x400000, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x221480, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0200000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000d5962745", @ANYRES32=0x0, @ANYRES32=r2, @ANYBLOB="000000000100"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_bp={&(0x7f0000000340), 0x3}, 0x0, 0x5, 0x0, 0x0, 0x2, 0x10000003, 0x0, 0x0, 0x4}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) 833.040042ms ago: executing program 3 (id=5107): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910a8000000000007000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x268, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0xffffffffffffffee}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r1, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r2, &(0x7f0000000240)="66eebc25a7bcc2b7ac657655748802729213c19597dc57ca3c9c33f57b", &(0x7f0000000280)=""/66, 0x4}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r0, r1}, 0xc) 638.307353ms ago: executing program 1 (id=5108): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x4, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7a, 0x72, 0xa, 0xff00}, [@call={0x55}, @exit, @map_fd, @jmp]}, &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0xe, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x29}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) 637.930853ms ago: executing program 3 (id=5109): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="050000000600000000000000d600000000000000", @ANYRES32=0x1, @ANYBLOB="ff27070200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x8000000}, 0x50) write$cgroup_subtree(r1, &(0x7f0000000380)={[{0x0, 'cpu'}]}, 0x5) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r3) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r0, r3}, 0xc) 581.940126ms ago: executing program 1 (id=5110): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xd, 0x2642, 0x5, 0x10000, 0x10000, 0x1, 0x5, '\x00', r0, 0xffffffffffffffff, 0x2, 0x5, 0x5, 0x0, @void, @value, @value=r1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000001f00000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 512.534721ms ago: executing program 1 (id=5111): r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000071181e00000000009500000000000000572e0109ed78ddb1dbb3f38961d855a74b172d5eb104d585d8f1b0d95f95a3c2b694501447b9e7ad42fb083c19972dca0f000000000000000bdbab28375c4211b8b6708c1dcada2ecb4b"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) close(r0) write$cgroup_pid(r2, &(0x7f00000000c0)=r1, 0x12) 452.514804ms ago: executing program 3 (id=5112): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r1) r2 = perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@bloom_filter={0x1e, 0x8, 0x7fff, 0x1386d0c5, 0x450, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x0, 0x0, 0xfffffffe, &(0x7f00000006c0)) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002040)=@o_path={&(0x7f0000001040)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x4020, r0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002380)={r3, 0xe0, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f00000020c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x66, &(0x7f0000002180)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000021c0), &(0x7f0000002200), 0x8, 0x75, 0x8, 0x8, &(0x7f0000002240)}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0xc020660b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002500)=ANY=[@ANYBLOB="1e000000061004000000000000000000000000004319003a0fc789964148674b1fb0437701e3539d4899d28ff9cc9e8d2ba5b38e70566ba0402e60dac8e7289b0bf7cf4277a71c805e1b331280c05dd6b88fd09de4cab95c47ff791e229ac9a3d839a07eaf4369eb5fd97ac505d3488a6920392e6523d92a30a22d3237e3909a7f05af92de160f8edc9930370bca5363b981ca3d", @ANYRES32=r4, @ANYBLOB="0600"/20, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0300000001000000040000000600"/28], 0x50) sendmsg$tipc(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) sendmsg$tipc(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20061, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0}, 0x10000, 0x100, 0x8}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x44) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="090000000400000004000000090000000008faff", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r8}, 0xc) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_type(r9, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r10, &(0x7f0000000080), 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1100000004000000040000000200000200"], 0x48) 450.563544ms ago: executing program 4 (id=5113): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000020000000c00000000140000", @ANYRES32, @ANYBLOB="000037e94bf3ed2ea400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000010000000000000000000000711815000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 227.844847ms ago: executing program 4 (id=5114): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="08f272f808af"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'vlan0\x00', @remote}) 227.152107ms ago: executing program 0 (id=5115): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000000000000007919c000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="0a00000007000000ff0f000007"], 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0x1, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20000000000000, 0x4}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xd) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x2405, 0x0) (async, rerun: 32) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000880)=""/115, 0xf0, 0x73, 0x1, 0x4}, 0x28) (async, rerun: 32) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0x13, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff80000}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5a83}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xb}, @jmp={0x5, 0x1, 0xb, 0x4, 0x0, 0x30, 0x4}]}, &(0x7f00000004c0)='GPL\x00', 0x2, 0x4c, &(0x7f0000000680)=""/76, 0x40f00, 0x48, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000980)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000a00)={0x4, 0x9, 0x5, 0x2}, 0x10, 0x12e1c, 0xffffffffffffffff, 0x2, &(0x7f0000000a40)=[r0, r0], &(0x7f0000000a80)=[{0x4, 0x4, 0xe}, {0x1, 0x2, 0x8, 0x8}], 0x10, 0x2}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xffffffff, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0xfffffff8, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3b}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000540)={&(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x10}}], 0x10}, 0x4) (async) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b0af8ff00000000bda107000000000026010000f8ffffffb702000008000000b703000000000000850000000800000018010000202070250000000000202020dd1af5ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x94200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000000)='cpu&\t\t') (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async, rerun: 64) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 167.49119ms ago: executing program 3 (id=5116): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xa2f7, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x13c2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x103e40, 0x1, 0x0, 0x0, 0x0, 0x40, 0xfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x13c2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x103e40, 0x1, 0x0, 0x0, 0x0, 0x40, 0xfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, &(0x7f0000000d80)=@framed={{0x18, 0x8}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20400, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x309) (async) ioctl$TUNSETLINK(r4, 0x400454cd, 0x309) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00000061120c00000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xa6, &(0x7f00000003c0)=""/166}, 0x94) 121.973083ms ago: executing program 2 (id=5117): perf_event_open(&(0x7f0000000480)={0x1, 0xba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit, @alu={0x6, 0x1, 0xd, 0xa, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xe7, &(0x7f0000000340)=""/231}, 0x5a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x1b, &(0x7f0000000100), 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x7, 0x60}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 87.384305ms ago: executing program 0 (id=5118): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0xc8, 0x6, 0x7}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x9, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x45}, 0x41) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) close(r1) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0xc8, 0x6, 0x7}]}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x9, 0xe, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x45}, 0x41) (async) 86.974755ms ago: executing program 2 (id=5119): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x47, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaaa8, 0x96}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0x18000000000002a0, 0xe40, 0x0, &(0x7f00000002c0)="f6eb094549002060009b853886dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x210, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x8, 0x0, 0x58c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)="82a0de11d84ef4f82e7b3a0931d19d5c1eec5a41301ceb4753ba44495a2842f5209c684288eff731e46c7bc6be16d83f404db86c8a9f1ab49de4181f7fcc3c5bbcbfce39c9e91068b4c87bc33033948ce28484c961222ba19f089c02c92ad2a99d7e312c82888f388a27a03d783843fd9882b12e03c4b31782e45411ee7be7899ee4cc3e39e889fa563daa76d415", 0x8e}], 0x1, &(0x7f0000000480)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x10}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @rand_addr=0x64010100, @multicast2}}}], 0x68}, 0x8040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYRES16=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', r7, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000)={0x4, 0xe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) close(r9) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110c23003f) write$cgroup_devices(r9, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = gettid() bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) syz_open_procfs$namespace(r11, 0x0) 86.668105ms ago: executing program 1 (id=5120): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x118) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb261a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='c(u&\'\'\t|\t') r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0d0000000500e28ae0eb3f877731432f0b99c821", @ANYRES32, @ANYBLOB="00000100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='kmem_cache_free\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r5, &(0x7f0000000080), &(0x7f00000002c0)=""/218}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x13, 0x10, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="19000000200893fcbb170434eac7005cd400000019fe1ea77d800b69afc8a3ad8a29bc69057d8797f65d765f4e3e8b38ff300520b2cbf009b15baf0cc478e402498d3f3924206818c2634e0cab665281dec59b7e0f22bc2eb93e513c2e36ee4731b0056ddd936f3122d4f83ed3efa89b608ac33639ebfa4337e3917226540c70dbe9e544a4d81ae59d25c9766883db66e700325437b54de3361f586878f5398103d365e2962584ac28013bcea78842c3fedc62b4cf2d49f172043aeeb6a8b2", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000a00000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000ad840000080000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x204, 0x20, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8946, &(0x7f0000000080)) socketpair(0x10, 0x800, 0xc, &(0x7f0000000000)) 86.093925ms ago: executing program 4 (id=5121): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000010000007912"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed009875f37538e486dd0000000003"], 0xfe1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4d) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x2, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bca900000000000035090200000300006e000d0000000000b702000000000000739af0ff00000000c509000035000800c3aaf0ff00000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffd50200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000020000008500000007000000b70000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 346.36µs ago: executing program 3 (id=5122): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB="180800000000000000000000000000008510000005000000850000008b000000a70000000000000018000000000000000000000000000000950000000000000095000000000000009167691cb3ab69e7fb1a4759ed0d4a8f533866f09da06191b68f"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x19, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000050000000000000009000000631127000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0500000005000000020000000400000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000eeffffffffffffff"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r1, &(0x7f0000000300)="4db4d810d6ad44cf781ec7e1aa581ba84d5662603ca6231f0085d404c37cf631863d2de80730103bd6d519a076708d7c148b07ff3f0ba66d2c47f6cfa8348f40798e0d1406c4fb00065b5e7c8d450ad45e34b21cdf221709958cc6d39d3259a581ffc1ac1de841288f3509a5172b7459f7dde3a6a92b3cd77707fdee07457fba4bcc8d67133a309bd4f4433c2828bff77f54580a9e772c34236e5e0baa852331dd4d3db3e1910d0002f3bda96d8be2729d453cc37893b134bdbd7b4ad59b08b0c42a22765a9457", &(0x7f0000000240)=""/24}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b6396132f0e8d6d008ec31f63f81f2cbcf5528d2457b5e04de3a615908b9da0104f6f8c0916ee9f1c3bd26fce56179ce5c16f011917a3e9196ca848daa5416136d4bcbb57c92a2340f76a7ff39c0ba4b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x4, &(0x7f0000000b00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f00800", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000180)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[], 0xffdd) close(r3) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001bc6500850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095", @ANYRES32=r3, @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81ea033200fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x2, 0x0, &(0x7f0000000740)) 0s ago: executing program 4 (id=5123): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r1) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r2, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) close(0x3) close(0x4) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) close(0x4) (fail_nth: 1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.117' (ED25519) to the list of known hosts. [ 22.184364][ T24] audit: type=1400 audit(1769377514.099:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.185373][ T267] cgroup: Unknown subsys name 'net' [ 22.207024][ T24] audit: type=1400 audit(1769377514.099:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.234409][ T24] audit: type=1400 audit(1769377514.129:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.234606][ T267] cgroup: Unknown subsys name 'devices' [ 22.403650][ T267] cgroup: Unknown subsys name 'hugetlb' [ 22.409361][ T267] cgroup: Unknown subsys name 'rlimit' [ 22.547254][ T24] audit: type=1400 audit(1769377514.459:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 22.570474][ T24] audit: type=1400 audit(1769377514.459:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 22.575725][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.595288][ T24] audit: type=1400 audit(1769377514.459:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 22.627033][ T24] audit: type=1400 audit(1769377514.519:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.653172][ T24] audit: type=1400 audit(1769377514.519:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.687713][ T24] audit: type=1400 audit(1769377514.599:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.713575][ T24] audit: type=1400 audit(1769377514.599:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.739786][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.306645][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.313794][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.321043][ T275] device bridge_slave_0 entered promiscuous mode [ 23.328827][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.336015][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.343351][ T275] device bridge_slave_1 entered promiscuous mode [ 23.450386][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.457826][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.465222][ T277] device bridge_slave_0 entered promiscuous mode [ 23.476639][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.483727][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.491295][ T282] device bridge_slave_0 entered promiscuous mode [ 23.499738][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.506910][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.514401][ T277] device bridge_slave_1 entered promiscuous mode [ 23.522935][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.529949][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.537419][ T276] device bridge_slave_0 entered promiscuous mode [ 23.543980][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.550997][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.558318][ T282] device bridge_slave_1 entered promiscuous mode [ 23.572726][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.579778][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.587122][ T276] device bridge_slave_1 entered promiscuous mode [ 23.625116][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.632215][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.639478][ T278] device bridge_slave_0 entered promiscuous mode [ 23.646523][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.653654][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.661031][ T278] device bridge_slave_1 entered promiscuous mode [ 23.732920][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.740050][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.747338][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.754356][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.815005][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.822028][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.829290][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.836352][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.845522][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.852653][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.859934][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.866989][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.882207][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.889544][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.896862][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.903916][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.913192][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.920222][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.927488][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.934528][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.959096][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.966542][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.974066][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.981510][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.989158][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.996369][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.003587][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.010701][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.017943][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.025094][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.032357][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.066368][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.074382][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 24.081709][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.089855][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.098657][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.105777][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.113412][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.121476][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.128501][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.135798][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.144093][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.151091][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.158451][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.166602][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.173630][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.181037][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.188988][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.196912][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.205132][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.213270][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.220349][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.227779][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.236030][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.243063][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.250916][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.284698][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.293376][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.301029][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.311579][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.320968][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.328975][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.337233][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.344818][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.352942][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.361101][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.368184][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.375719][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.383993][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.391002][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.398369][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.406657][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.414761][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.423004][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.430699][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.438282][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.446500][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.453533][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.460931][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.473407][ T275] device veth0_vlan entered promiscuous mode [ 24.482386][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.490752][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.499834][ T278] device veth0_vlan entered promiscuous mode [ 24.509043][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.516597][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.524835][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 24.533103][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.543675][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.551939][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.563851][ T278] device veth1_macvtap entered promiscuous mode [ 24.574386][ T275] device veth1_macvtap entered promiscuous mode [ 24.582065][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.590424][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.598031][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.606523][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.615299][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.623317][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.633756][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.641400][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.648840][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.657325][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.677193][ T276] device veth0_vlan entered promiscuous mode [ 24.683507][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 24.691672][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.700205][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.709137][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.717959][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.726561][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.735005][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.743199][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.751076][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.758512][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.766446][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.774942][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.783539][ T277] device veth0_vlan entered promiscuous mode [ 24.796616][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 24.801542][ T277] device veth1_macvtap entered promiscuous mode [ 24.814540][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.815847][ T282] device veth0_vlan entered promiscuous mode [ 24.837692][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.846791][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.855434][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.864502][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.873768][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.881829][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.890722][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.899473][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.907837][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.924720][ T276] device veth1_macvtap entered promiscuous mode [ 24.936798][ T282] device veth1_macvtap entered promiscuous mode [ 24.945595][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.953499][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.961014][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.969638][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.978452][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.982090][ C0] hrtimer: interrupt took 31226 ns [ 24.986696][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.999837][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.008174][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.039644][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.048090][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.057004][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.066075][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.074733][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.083396][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.121096][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.137650][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.146767][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.155360][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.220904][ T304] device syzkaller0 entered promiscuous mode [ 25.905633][ T313] device sit0 entered promiscuous mode [ 26.440546][ T336] device syzkaller0 entered promiscuous mode [ 26.962596][ T347] cgroup: syz.3.12 (347) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.990430][ T347] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 27.209124][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 27.209135][ T24] audit: type=1400 audit(1769377519.119:117): avc: denied { write } for pid=377 comm="syz.3.23" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.373109][ T382] device bridge0 entered promiscuous mode [ 27.472409][ T24] audit: type=1400 audit(1769377519.159:118): avc: denied { open } for pid=377 comm="syz.3.23" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.744591][ T24] audit: type=1400 audit(1769377519.269:119): avc: denied { read } for pid=376 comm="syz.0.22" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.900000][ T24] audit: type=1400 audit(1769377519.769:120): avc: denied { create } for pid=404 comm="syz.3.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 27.968497][ T24] audit: type=1400 audit(1769377519.789:121): avc: denied { setopt } for pid=406 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.990188][ T412] device sit0 left promiscuous mode [ 28.126351][ T415] Ÿë: port 1(veth0_to_team) entered blocking state [ 28.146116][ T24] audit: type=1400 audit(1769377520.059:122): avc: denied { append } for pid=420 comm="syz.3.35" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.199817][ T415] Ÿë: port 1(veth0_to_team) entered disabled state [ 28.235141][ T24] audit: type=1400 audit(1769377520.089:123): avc: denied { create } for pid=420 comm="syz.3.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.306907][ T24] audit: type=1400 audit(1769377520.219:124): avc: denied { ioctl } for pid=422 comm="syz.0.36" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.398372][ T415] device veth0_to_team entered promiscuous mode [ 28.671867][ T24] audit: type=1400 audit(1769377520.579:125): avc: denied { create } for pid=448 comm="syz.3.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 28.980063][ T24] audit: type=1400 audit(1769377520.889:126): avc: denied { create } for pid=462 comm="syz.3.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 29.876237][ T522] device syzkaller0 entered promiscuous mode [ 30.379023][ T526] device sit0 entered promiscuous mode [ 30.674274][ T566] ------------[ cut here ]------------ [ 30.744981][ T566] trace type BPF program uses run-time allocation [ 30.812606][ T566] WARNING: CPU: 0 PID: 566 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 31.252598][ T566] Modules linked in: [ 31.256621][ T566] CPU: 1 PID: 566 Comm: syz.2.78 Not tainted syzkaller #0 [ 31.282455][ T566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 31.284989][ T590] syzkaller0: tun_chr_ioctl cmd 35108 [ 31.365107][ T566] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 31.445706][ T566] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 e4 ad 4b 05 01 48 c7 c7 e0 ce 25 85 e8 6a d0 04 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 31.539468][ T566] RSP: 0018:ffffc900012a7448 EFLAGS: 00010246 [ 31.545679][ T566] RAX: 31727061fe51d200 RBX: 0000000000000001 RCX: 0000000000080000 [ 31.555120][ T566] RDX: ffffc90002d11000 RSI: 0000000000002b96 RDI: 0000000000002b97 [ 31.600031][ T566] RBP: ffffc900012a7490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 31.650657][ T566] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff888117890000 [ 31.712223][ T566] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888114bde800 [ 31.766449][ T566] FS: 00007fc2c8f286c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 31.857052][ T566] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 31.892378][ T566] CR2: 00007fefbd0f7ff8 CR3: 00000001147a1000 CR4: 00000000003506b0 [ 31.900386][ T566] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.970086][ T566] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 32.083894][ T566] Call Trace: [ 32.134903][ T566] ? __fdget+0x1a1/0x230 [ 32.220426][ T566] resolve_pseudo_ldimm64+0x55e/0x1060 [ 32.242846][ T566] ? bpf_check+0xdb10/0xdb10 [ 32.247566][ T566] ? kvmalloc_node+0x88/0x130 [ 32.294565][ T566] bpf_check+0x9058/0xdb10 [ 32.342176][ T566] ? bpf_get_btf_vmlinux+0x60/0x60 [ 32.405888][ T566] ? is_bpf_text_address+0x177/0x190 [ 32.457274][ T566] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.508652][ T566] ? __kernel_text_address+0xa0/0x100 [ 32.514200][ T566] ? unwind_get_return_address+0x4d/0x90 [ 32.523229][ T566] ? stack_trace_save+0xf0/0xf0 [ 32.528093][ T566] ? arch_stack_walk+0xee/0x140 [ 32.533296][ T566] ? stack_trace_save+0xa6/0xf0 [ 32.538531][ T566] ? stack_trace_snprint+0xf0/0xf0 [ 32.544819][ T566] ? __kasan_slab_alloc+0x69/0xf0 [ 32.549843][ T566] ? pcpu_block_update+0x1ce/0x900 [ 32.562477][ T566] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.570455][ T566] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.576200][ T566] ? __kasan_kmalloc+0xec/0x110 [ 32.581258][ T566] ? __kasan_kmalloc+0xda/0x110 [ 32.644254][ T566] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 32.699033][ T566] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.792779][ T566] ? security_bpf_prog_alloc+0x62/0x90 [ 32.874081][ T566] ? bpf_prog_load+0x9d8/0x14a0 [ 32.886858][ T642] FAULT_INJECTION: forcing a failure. [ 32.886858][ T642] name failslab, interval 1, probability 0, space 0, times 1 [ 32.941584][ T566] ? __se_sys_bpf+0x49a/0x740 [ 32.995909][ T566] ? __x64_sys_bpf+0x7b/0x90 [ 33.042368][ T642] CPU: 0 PID: 642 Comm: syz.1.103 Not tainted syzkaller #0 [ 33.049595][ T642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 33.059651][ T642] Call Trace: [ 33.062935][ T642] __dump_stack+0x21/0x24 [ 33.067261][ T642] dump_stack_lvl+0x1a7/0x208 [ 33.071926][ T642] ? show_regs_print_info+0x18/0x18 [ 33.077655][ T642] dump_stack+0x15/0x1c [ 33.081807][ T642] should_fail+0x3c1/0x510 [ 33.086229][ T642] ? kvmalloc_node+0x88/0x130 [ 33.090911][ T642] __should_failslab+0xa4/0xe0 [ 33.095679][ T642] should_failslab+0x9/0x20 [ 33.100293][ T642] __kmalloc+0x60/0x330 [ 33.104437][ T642] kvmalloc_node+0x88/0x130 [ 33.108934][ T642] alloc_netdev_mqs+0x88/0xc80 [ 33.113692][ T642] ? strlcpy+0x89/0xd0 [ 33.117790][ T642] ? IP6_ECN_decapsulate+0x18c0/0x18c0 [ 33.123245][ T642] ip6_tnl_locate+0x5ad/0x710 [ 33.127898][ T642] ? cap_capable+0x19c/0x220 [ 33.132547][ T642] ? ip6_tnl_link_config+0x9c0/0x9c0 [ 33.137808][ T642] ? memcpy+0x56/0x70 [ 33.141976][ T642] ip6_tnl_ioctl+0x75a/0xf70 [ 33.146563][ T642] ? memset+0x35/0x40 [ 33.150635][ T642] ? ip6_tnl_start_xmit+0x13d0/0x13d0 [ 33.155992][ T642] ? full_name_hash+0xa0/0xf0 [ 33.160671][ T642] dev_ifsioc+0x6b4/0xa90 [ 33.164993][ T642] ? dev_ioctl+0xb80/0xb80 [ 33.169389][ T642] dev_ioctl+0x5ea/0xb80 [ 33.173623][ T642] sock_ioctl+0x6ce/0x760 [ 33.177942][ T642] ? sock_poll+0x350/0x350 [ 33.182335][ T642] ? __fget_files+0x2c4/0x320 [ 33.186990][ T642] ? security_file_ioctl+0x84/0xa0 [ 33.192164][ T642] ? sock_poll+0x350/0x350 [ 33.196566][ T642] __se_sys_ioctl+0x121/0x1a0 [ 33.201223][ T642] __x64_sys_ioctl+0x7b/0x90 [ 33.205876][ T642] do_syscall_64+0x31/0x40 [ 33.210276][ T642] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.216141][ T642] RIP: 0033:0x7f6e1e874cb9 [ 33.220531][ T642] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 33.240327][ T642] RSP: 002b:00007f6e1d2d1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 33.248724][ T642] RAX: ffffffffffffffda RBX: 00007f6e1eaeffa0 RCX: 00007f6e1e874cb9 [ 33.256718][ T642] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 33.264668][ T642] RBP: 00007f6e1d2d1090 R08: 0000000000000000 R09: 0000000000000000 [ 33.272611][ T642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.280554][ T642] R13: 00007f6e1eaf0038 R14: 00007f6e1eaeffa0 R15: 00007ffd8106cb68 [ 33.295830][ T566] ? do_syscall_64+0x31/0x40 [ 33.304987][ T566] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.312731][ T566] ? memset+0x35/0x40 [ 33.318369][ T644] device wg2 entered promiscuous mode [ 33.323977][ T566] ? bpf_obj_name_cpy+0x193/0x1e0 [ 33.329026][ T566] bpf_prog_load+0xfca/0x14a0 [ 33.335171][ T566] ? map_freeze+0x320/0x320 [ 33.339692][ T566] ? selinux_bpf+0xc7/0xf0 [ 33.344170][ T566] ? security_bpf+0x82/0xa0 [ 33.348720][ T566] __se_sys_bpf+0x49a/0x740 [ 33.370160][ T566] ? __x64_sys_bpf+0x90/0x90 [ 33.376141][ T566] ? __kasan_check_read+0x11/0x20 [ 33.381294][ T566] __x64_sys_bpf+0x7b/0x90 [ 33.385916][ T566] do_syscall_64+0x31/0x40 [ 33.391031][ T566] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.401998][ T566] RIP: 0033:0x7fc2ca4eccb9 [ 33.406696][ T566] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 33.454292][ T566] RSP: 002b:00007fc2c8f28028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 33.462838][ T566] RAX: ffffffffffffffda RBX: 00007fc2ca768090 RCX: 00007fc2ca4eccb9 [ 33.470947][ T566] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 33.479011][ T566] RBP: 00007fc2ca55abf7 R08: 0000000000000000 R09: 0000000000000000 [ 33.487527][ T566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 33.495750][ T566] R13: 00007fc2ca768128 R14: 00007fc2ca768090 R15: 00007ffff146b278 [ 33.504057][ T566] ---[ end trace 8c639f862c3b641e ]--- [ 33.620974][ T670] device syzkaller0 entered promiscuous mode [ 34.172317][ T690] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 34.929100][ T716] device syzkaller0 entered promiscuous mode [ 35.349853][ T739] device veth1_macvtap left promiscuous mode [ 35.458185][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 35.458194][ T24] audit: type=1400 audit(1769377527.369:130): avc: denied { create } for pid=733 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 35.562047][ T24] audit: type=1400 audit(1769377527.449:131): avc: denied { create } for pid=735 comm="syz.3.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 36.196146][ T777] device syzkaller0 entered promiscuous mode [ 36.249427][ T775] device syzkaller0 entered promiscuous mode [ 36.414568][ T786] device sit0 left promiscuous mode [ 36.481243][ T786] device sit0 entered promiscuous mode [ 36.903168][ T821] device syzkaller0 entered promiscuous mode [ 36.973567][ T822] device sit0 left promiscuous mode [ 37.554892][ T842] device wg2 entered promiscuous mode [ 37.572696][ T843] device veth0_vlan left promiscuous mode [ 37.604199][ T843] device veth0_vlan entered promiscuous mode [ 37.737951][ T836] device sit0 entered promiscuous mode [ 38.010391][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.054615][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.075145][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.379727][ T894] device sit0 left promiscuous mode [ 38.924956][ T922] device sit0 entered promiscuous mode [ 40.018507][ T24] audit: type=1400 audit(1769377531.879:132): avc: denied { create } for pid=1001 comm="syz.4.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 40.275521][ T24] audit: type=1400 audit(1769377532.189:133): avc: denied { create } for pid=1035 comm="syz.4.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 40.810130][ T1088] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 40.836738][ T1088] syzkaller0: linktype set to 0 [ 42.350839][ T1166] bridge0: port 3(syz_tun) entered blocking state [ 42.427577][ T1166] bridge0: port 3(syz_tun) entered disabled state [ 42.551615][ T1166] device syz_tun entered promiscuous mode [ 42.582280][ T1166] bridge0: port 3(syz_tun) entered blocking state [ 42.588740][ T1166] bridge0: port 3(syz_tun) entered forwarding state [ 43.017160][ T1191] device sit0 left promiscuous mode [ 43.840759][ T1208] device syzkaller0 entered promiscuous mode [ 44.791436][ T1264] device syzkaller0 entered promiscuous mode [ 45.031149][ T1298] device syzkaller0 entered promiscuous mode [ 45.187848][ T1318] device syzkaller0 entered promiscuous mode [ 45.211874][ T1320] syz.4.298[1320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.211922][ T1320] syz.4.298[1320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.512164][ T1332] device syzkaller0 entered promiscuous mode [ 45.664646][ T1345] FAULT_INJECTION: forcing a failure. [ 45.664646][ T1345] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 45.684462][ T1346] device syzkaller0 entered promiscuous mode [ 45.705203][ T1345] CPU: 0 PID: 1345 Comm: syz.3.306 Tainted: G W syzkaller #0 [ 45.713890][ T1345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 45.723945][ T1345] Call Trace: [ 45.727325][ T1345] __dump_stack+0x21/0x24 [ 45.731644][ T1345] dump_stack_lvl+0x1a7/0x208 [ 45.736323][ T1345] ? show_regs_print_info+0x18/0x18 [ 45.741515][ T1345] ? vfs_write+0xb27/0xdc0 [ 45.745944][ T1345] dump_stack+0x15/0x1c [ 45.750088][ T1345] should_fail+0x3c1/0x510 [ 45.754504][ T1345] should_fail_usercopy+0x1a/0x20 [ 45.759707][ T1345] _copy_from_user+0x20/0xd0 [ 45.764292][ T1345] __se_sys_bpf+0x1bb/0x740 [ 45.768786][ T1345] ? __x64_sys_bpf+0x90/0x90 [ 45.773390][ T1345] ? debug_smp_processor_id+0x17/0x20 [ 45.778756][ T1345] __x64_sys_bpf+0x7b/0x90 [ 45.783170][ T1345] do_syscall_64+0x31/0x40 [ 45.787593][ T1345] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.793474][ T1345] RIP: 0033:0x7f7983581cb9 [ 45.797873][ T1345] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 45.817498][ T1345] RSP: 002b:00007f7981fde028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.825886][ T1345] RAX: ffffffffffffffda RBX: 00007f79837fcfa0 RCX: 00007f7983581cb9 [ 45.833832][ T1345] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 45.841777][ T1345] RBP: 00007f7981fde090 R08: 0000000000000000 R09: 0000000000000000 [ 45.849721][ T1345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.857702][ T1345] R13: 00007f79837fd038 R14: 00007f79837fcfa0 R15: 00007ffc81adcb18 [ 45.927284][ T24] audit: type=1400 audit(1769377537.839:134): avc: denied { create } for pid=1355 comm="syz.3.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 46.335774][ T1386] device syzkaller0 entered promiscuous mode [ 46.730862][ T1415] device syzkaller0 entered promiscuous mode [ 47.256351][ T1430] device pim6reg1 entered promiscuous mode [ 47.438546][ T1444] device syzkaller0 entered promiscuous mode [ 48.823042][ T1511] device veth1_macvtap left promiscuous mode [ 48.886013][ T1515] device veth1_macvtap entered promiscuous mode [ 48.893577][ T1515] device macsec0 entered promiscuous mode [ 48.902595][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 50.591551][ T24] audit: type=1400 audit(1769377542.499:135): avc: denied { create } for pid=1591 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 50.829994][ T1602] device syzkaller0 entered promiscuous mode [ 51.141498][ T24] audit: type=1400 audit(1769377543.049:136): avc: denied { ioctl } for pid=1627 comm="syz.1.396" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 51.310807][ T24] audit: type=1400 audit(1769377543.219:137): avc: denied { create } for pid=1627 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 52.824201][ T1699] device sit0 entered promiscuous mode [ 54.513870][ T24] audit: type=1400 audit(1769377546.429:138): avc: denied { create } for pid=1766 comm="syz.2.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 54.758756][ T1781] device syzkaller0 entered promiscuous mode [ 55.368806][ T1814] device syzkaller0 entered promiscuous mode [ 55.398795][ T1786] device sit0 entered promiscuous mode [ 56.250571][ T1849] device syzkaller0 entered promiscuous mode [ 56.420603][ T1869] device syzkaller0 entered promiscuous mode [ 56.586118][ T1887] device syzkaller0 left promiscuous mode [ 56.679908][ T1893] device veth0_vlan left promiscuous mode [ 56.687079][ T1893] device veth0_vlan entered promiscuous mode [ 57.316629][ T24] audit: type=1400 audit(1769377549.219:139): avc: denied { create } for pid=1903 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 57.445162][ T24] audit: type=1400 audit(1769377549.359:140): avc: denied { create } for pid=1925 comm="syz.2.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 57.991498][ T1951] : port 1(ip6gretap0) entered blocking state [ 58.010249][ T1951] : port 1(ip6gretap0) entered disabled state [ 58.057380][ T1951] device ip6gretap0 entered promiscuous mode [ 58.278408][ T24] audit: type=1400 audit(1769377550.179:141): avc: denied { create } for pid=1966 comm="syz.2.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 58.539329][ T1987] device pim6reg1 entered promiscuous mode [ 59.017624][ T2001] FAULT_INJECTION: forcing a failure. [ 59.017624][ T2001] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 59.161878][ T2001] CPU: 0 PID: 2001 Comm: syz.4.506 Tainted: G W syzkaller #0 [ 59.170573][ T2001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 59.180722][ T2001] Call Trace: [ 59.184022][ T2001] __dump_stack+0x21/0x24 [ 59.188336][ T2001] dump_stack_lvl+0x1a7/0x208 [ 59.193001][ T2001] ? show_regs_print_info+0x18/0x18 [ 59.198275][ T2001] ? path_openat+0x2970/0x31c0 [ 59.203030][ T2001] dump_stack+0x15/0x1c [ 59.207172][ T2001] should_fail+0x3c1/0x510 [ 59.211582][ T2001] should_fail_usercopy+0x1a/0x20 [ 59.216595][ T2001] _copy_from_user+0x20/0xd0 [ 59.221169][ T2001] __copy_msghdr_from_user+0xc9/0x630 [ 59.226531][ T2001] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 59.231896][ T2001] ? __fsnotify_parent+0x6d2/0x7c0 [ 59.236997][ T2001] ___sys_sendmsg+0x19a/0x2e0 [ 59.241663][ T2001] ? __sys_sendmsg+0x280/0x280 [ 59.246497][ T2001] ? rw_verify_area+0x1c0/0x360 [ 59.251341][ T2001] ? __fdget+0x1a1/0x230 [ 59.255574][ T2001] __x64_sys_sendmsg+0x1f9/0x2c0 [ 59.260583][ T2001] ? fput+0x1a/0x20 [ 59.264433][ T2001] ? ___sys_sendmsg+0x2e0/0x2e0 [ 59.269277][ T2001] ? debug_smp_processor_id+0x17/0x20 [ 59.274639][ T2001] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 59.280695][ T2001] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 59.286323][ T2001] do_syscall_64+0x31/0x40 [ 59.290728][ T2001] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 59.296605][ T2001] RIP: 0033:0x7fefbe6bccb9 [ 59.301010][ T2001] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 59.320703][ T2001] RSP: 002b:00007fefbd119028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 59.329201][ T2001] RAX: ffffffffffffffda RBX: 00007fefbe937fa0 RCX: 00007fefbe6bccb9 [ 59.337170][ T2001] RDX: 0000000020000000 RSI: 0000200000000100 RDI: 0000000000000006 [ 59.345130][ T2001] RBP: 00007fefbd119090 R08: 0000000000000000 R09: 0000000000000000 [ 59.353088][ T2001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 59.361050][ T2001] R13: 00007fefbe938038 R14: 00007fefbe937fa0 R15: 00007ffdb8a86ef8 [ 59.609208][ T2034] cgroup: fork rejected by pids controller in /syz0 [ 59.750189][ T24] audit: type=1400 audit(1769377551.659:142): avc: denied { create } for pid=2037 comm="syz.2.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 60.568024][ T24] audit: type=1400 audit(1769377552.479:143): avc: denied { ioctl } for pid=2187 comm="syz.2.533" path="socket:[21656]" dev="sockfs" ino=21656 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 60.621076][ T2194] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.628298][ T2194] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.696437][ T2194] device bridge0 left promiscuous mode [ 60.706599][ T2199] device bridge_slave_1 left promiscuous mode [ 60.724280][ T2199] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.763189][ T2199] device bridge_slave_0 left promiscuous mode [ 60.769531][ T2199] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.214244][ T2226] device syzkaller0 entered promiscuous mode [ 61.867041][ T2252] device sit0 left promiscuous mode [ 62.461120][ T2248] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.468370][ T2248] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.475838][ T2248] device bridge_slave_0 entered promiscuous mode [ 62.482817][ T2248] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.491214][ T2248] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.499174][ T2248] device bridge_slave_1 entered promiscuous mode [ 62.625995][ T24] audit: type=1400 audit(1769377554.539:144): avc: denied { create } for pid=2248 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.652773][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.693981][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.698219][ T24] audit: type=1400 audit(1769377554.539:145): avc: denied { write } for pid=2248 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.701453][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.749591][ T24] audit: type=1400 audit(1769377554.539:146): avc: denied { read } for pid=2248 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.788852][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.797199][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.804257][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.811860][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.821042][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.831109][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.838337][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.850919][ T2311] device veth1_macvtap left promiscuous mode [ 62.857338][ T2311] device macsec0 left promiscuous mode [ 62.867307][ T2316] device veth1_macvtap entered promiscuous mode [ 62.879348][ T2316] device macsec0 entered promiscuous mode [ 62.890021][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.932708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.945657][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.954503][ T2322] @ÿ: renamed from bond_slave_0 [ 62.975312][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 63.000042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 63.035875][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 63.045738][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 63.054431][ T2248] device veth0_vlan entered promiscuous mode [ 63.119160][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 63.130528][ T2248] device veth1_macvtap entered promiscuous mode [ 63.155583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 63.183566][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.232775][ T24] audit: type=1400 audit(1769377555.149:147): avc: denied { create } for pid=2338 comm="syz.2.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 63.291124][ T24] audit: type=1400 audit(1769377555.149:148): avc: denied { create } for pid=2338 comm="syz.2.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 63.631498][ T112] device bridge_slave_1 left promiscuous mode [ 63.637770][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.645491][ T112] device bridge_slave_0 left promiscuous mode [ 63.651664][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.661957][ T112] device veth1_macvtap left promiscuous mode [ 63.670302][ T112] device veth0_vlan left promiscuous mode [ 63.727722][ T24] audit: type=1400 audit(1769377555.639:149): avc: denied { create } for pid=2372 comm="syz.3.589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 64.534101][ T2430] FAULT_INJECTION: forcing a failure. [ 64.534101][ T2430] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.587996][ T2430] CPU: 1 PID: 2430 Comm: syz.3.608 Tainted: G W syzkaller #0 [ 64.596696][ T2430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 64.606749][ T2430] Call Trace: [ 64.610045][ T2430] __dump_stack+0x21/0x24 [ 64.614366][ T2430] dump_stack_lvl+0x1a7/0x208 [ 64.619032][ T2430] ? show_regs_print_info+0x18/0x18 [ 64.624320][ T2430] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 64.630127][ T2430] dump_stack+0x15/0x1c [ 64.634274][ T2430] should_fail+0x3c1/0x510 [ 64.638682][ T2430] should_fail_usercopy+0x1a/0x20 [ 64.643698][ T2430] _copy_from_user+0x20/0xd0 [ 64.648297][ T2430] generic_map_update_batch+0x4ad/0x760 [ 64.653847][ T2430] ? bpf_enable_instrumentation+0x50/0x50 [ 64.659796][ T2430] ? bpf_enable_instrumentation+0x50/0x50 [ 64.665508][ T2430] bpf_map_do_batch+0x463/0x5f0 [ 64.670350][ T2430] __se_sys_bpf+0x5bf/0x740 [ 64.674847][ T2430] ? __x64_sys_bpf+0x90/0x90 [ 64.679443][ T2430] ? debug_smp_processor_id+0x17/0x20 [ 64.684805][ T2430] __x64_sys_bpf+0x7b/0x90 [ 64.689221][ T2430] do_syscall_64+0x31/0x40 [ 64.693636][ T2430] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 64.699520][ T2430] RIP: 0033:0x7f7983581cb9 [ 64.703928][ T2430] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 64.723533][ T2430] RSP: 002b:00007f7981fde028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 64.731947][ T2430] RAX: ffffffffffffffda RBX: 00007f79837fcfa0 RCX: 00007f7983581cb9 [ 64.739998][ T2430] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 64.747959][ T2430] RBP: 00007f7981fde090 R08: 0000000000000000 R09: 0000000000000000 [ 64.755928][ T2430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 64.763986][ T2430] R13: 00007f79837fd038 R14: 00007f79837fcfa0 R15: 00007ffc81adcb18 [ 65.748933][ T2503] FAULT_INJECTION: forcing a failure. [ 65.748933][ T2503] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 65.977749][ T2503] CPU: 0 PID: 2503 Comm: syz.1.629 Tainted: G W syzkaller #0 [ 65.986449][ T2503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 65.996582][ T2503] Call Trace: [ 65.999878][ T2503] __dump_stack+0x21/0x24 [ 66.004214][ T2503] dump_stack_lvl+0x1a7/0x208 [ 66.008968][ T2503] ? show_regs_print_info+0x18/0x18 [ 66.014243][ T2503] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 66.020027][ T2503] dump_stack+0x15/0x1c [ 66.024154][ T2503] should_fail+0x3c1/0x510 [ 66.028546][ T2503] should_fail_usercopy+0x1a/0x20 [ 66.033543][ T2503] _copy_from_user+0x20/0xd0 [ 66.038109][ T2503] generic_map_update_batch+0x45b/0x760 [ 66.043631][ T2503] ? bpf_enable_instrumentation+0x50/0x50 [ 66.049523][ T2503] ? bpf_enable_instrumentation+0x50/0x50 [ 66.055216][ T2503] bpf_map_do_batch+0x463/0x5f0 [ 66.060041][ T2503] __se_sys_bpf+0x5bf/0x740 [ 66.064545][ T2503] ? __x64_sys_bpf+0x90/0x90 [ 66.069114][ T2503] ? debug_smp_processor_id+0x17/0x20 [ 66.074469][ T2503] __x64_sys_bpf+0x7b/0x90 [ 66.078964][ T2503] do_syscall_64+0x31/0x40 [ 66.083358][ T2503] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 66.089586][ T2503] RIP: 0033:0x7f6e1e874cb9 [ 66.093981][ T2503] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 66.113650][ T2503] RSP: 002b:00007f6e1d2b0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 66.122042][ T2503] RAX: ffffffffffffffda RBX: 00007f6e1eaf0090 RCX: 00007f6e1e874cb9 [ 66.130087][ T2503] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 66.138124][ T2503] RBP: 00007f6e1d2b0090 R08: 0000000000000000 R09: 0000000000000000 [ 66.146088][ T2503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 66.154036][ T2503] R13: 00007f6e1eaf0128 R14: 00007f6e1eaf0090 R15: 00007ffd8106cb68 [ 68.814094][ T2597] device sit0 entered promiscuous mode [ 71.606732][ T2726] FAULT_INJECTION: forcing a failure. [ 71.606732][ T2726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 71.620153][ T2726] CPU: 1 PID: 2726 Comm: syz.1.698 Tainted: G W syzkaller #0 [ 71.629002][ T2726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 71.639063][ T2726] Call Trace: [ 71.642350][ T2726] __dump_stack+0x21/0x24 [ 71.646654][ T2726] dump_stack_lvl+0x1a7/0x208 [ 71.651564][ T2726] ? show_regs_print_info+0x18/0x18 [ 71.656743][ T2726] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 71.662638][ T2726] dump_stack+0x15/0x1c [ 71.666781][ T2726] should_fail+0x3c1/0x510 [ 71.671178][ T2726] should_fail_usercopy+0x1a/0x20 [ 71.676183][ T2726] _copy_from_user+0x20/0xd0 [ 71.680756][ T2726] generic_map_update_batch+0x4ad/0x760 [ 71.686278][ T2726] ? bpf_enable_instrumentation+0x50/0x50 [ 71.691971][ T2726] ? bpf_enable_instrumentation+0x50/0x50 [ 71.697691][ T2726] bpf_map_do_batch+0x463/0x5f0 [ 71.702618][ T2726] __se_sys_bpf+0x5bf/0x740 [ 71.707189][ T2726] ? __x64_sys_bpf+0x90/0x90 [ 71.711761][ T2726] ? debug_smp_processor_id+0x17/0x20 [ 71.717201][ T2726] __x64_sys_bpf+0x7b/0x90 [ 71.721590][ T2726] do_syscall_64+0x31/0x40 [ 71.725982][ T2726] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 71.731846][ T2726] RIP: 0033:0x7f6e1e874cb9 [ 71.736237][ T2726] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 71.755943][ T2726] RSP: 002b:00007f6e1d2d1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 71.764508][ T2726] RAX: ffffffffffffffda RBX: 00007f6e1eaeffa0 RCX: 00007f6e1e874cb9 [ 71.772464][ T2726] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 71.780413][ T2726] RBP: 00007f6e1d2d1090 R08: 0000000000000000 R09: 0000000000000000 [ 71.788446][ T2726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 71.796393][ T2726] R13: 00007f6e1eaf0038 R14: 00007f6e1eaeffa0 R15: 00007ffd8106cb68 [ 73.483146][ T2747] device sit0 entered promiscuous mode [ 75.386422][ T2831] device syzkaller0 entered promiscuous mode [ 75.422677][ T2831] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 75.635530][ T2853] FAULT_INJECTION: forcing a failure. [ 75.635530][ T2853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.654481][ T2853] CPU: 1 PID: 2853 Comm: syz.1.738 Tainted: G W syzkaller #0 [ 75.663167][ T2853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 75.673213][ T2853] Call Trace: [ 75.676502][ T2853] __dump_stack+0x21/0x24 [ 75.680817][ T2853] dump_stack_lvl+0x1a7/0x208 [ 75.685579][ T2853] ? show_regs_print_info+0x18/0x18 [ 75.690768][ T2853] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 75.696703][ T2853] dump_stack+0x15/0x1c [ 75.700864][ T2853] should_fail+0x3c1/0x510 [ 75.705307][ T2853] should_fail_usercopy+0x1a/0x20 [ 75.710335][ T2853] _copy_from_user+0x20/0xd0 [ 75.714926][ T2853] generic_map_update_batch+0x4ad/0x760 [ 75.720911][ T2853] ? bpf_enable_instrumentation+0x50/0x50 [ 75.726709][ T2853] ? bpf_enable_instrumentation+0x50/0x50 [ 75.732422][ T2853] bpf_map_do_batch+0x463/0x5f0 [ 75.737277][ T2853] __se_sys_bpf+0x5bf/0x740 [ 75.741778][ T2853] ? __x64_sys_bpf+0x90/0x90 [ 75.746373][ T2853] ? debug_smp_processor_id+0x17/0x20 [ 75.751734][ T2853] __x64_sys_bpf+0x7b/0x90 [ 75.756136][ T2853] do_syscall_64+0x31/0x40 [ 75.760650][ T2853] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 75.766548][ T2853] RIP: 0033:0x7f6e1e874cb9 [ 75.770956][ T2853] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 75.790554][ T2853] RSP: 002b:00007f6e1d2d1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 75.799058][ T2853] RAX: ffffffffffffffda RBX: 00007f6e1eaeffa0 RCX: 00007f6e1e874cb9 [ 75.807393][ T2853] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 75.815357][ T2853] RBP: 00007f6e1d2d1090 R08: 0000000000000000 R09: 0000000000000000 [ 75.823328][ T2853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 75.831292][ T2853] R13: 00007f6e1eaf0038 R14: 00007f6e1eaeffa0 R15: 00007ffd8106cb68 [ 75.909420][ T2864] device lo entered promiscuous mode [ 76.051687][ T2881] device syzkaller0 entered promiscuous mode [ 76.739830][ T24] audit: type=1400 audit(1769377568.649:150): avc: denied { create } for pid=2896 comm="syz.1.751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 77.209651][ T2906] ÿÿÿÿÿÿ: renamed from vlan1 [ 77.222150][ T2942] device bond_slave_1 entered promiscuous mode [ 77.234757][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 77.243017][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.396996][ T2959] device syzkaller0 entered promiscuous mode [ 77.437416][ T2959] device syzkaller0 left promiscuous mode [ 79.496699][ T24] audit: type=1400 audit(1769377571.409:151): avc: denied { create } for pid=3105 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 79.594870][ T3109] device syzkaller0 entered promiscuous mode [ 79.629771][ T3123] device syzkaller0 entered promiscuous mode [ 79.676982][ T3128] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 79.692743][ T3128] syzkaller0: linktype set to 804 [ 80.549151][ T3167] : renamed from veth0_vlan [ 80.633250][ T3172] device syzkaller0 entered promiscuous mode [ 81.141186][ T3201] device wg2 entered promiscuous mode [ 82.843629][ T24] audit: type=1400 audit(1769377574.719:152): avc: denied { create } for pid=3289 comm="syz.2.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 83.044666][ T3318] Â: renamed from pim6reg1 [ 84.856915][ T3394] device syzkaller0 entered promiscuous mode [ 86.023186][ T3435] device syzkaller0 entered promiscuous mode [ 87.985216][ T3457] device syzkaller0 entered promiscuous mode [ 88.023663][ T991] syzkaller0: tun_net_xmit 48 [ 89.906787][ T3498] device sit0 entered promiscuous mode [ 90.725753][ T3528] device sit0 left promiscuous mode [ 90.804544][ T3534] device pim6reg1 entered promiscuous mode [ 90.860119][ T3528] device sit0 entered promiscuous mode [ 91.006829][ T24] audit: type=1400 audit(1769377582.919:153): avc: denied { setattr } for pid=3539 comm="syz.0.946" path="pipe:[20805]" dev="pipefs" ino=20805 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 91.338279][ T3573] bridge0: port 3(veth0) entered blocking state [ 91.351400][ T3573] bridge0: port 3(veth0) entered disabled state [ 91.369880][ T3573] device veth0 entered promiscuous mode [ 91.414132][ T3576] device veth0 left promiscuous mode [ 91.419603][ T3576] bridge0: port 3(veth0) entered disabled state [ 91.451064][ T3580] device syzkaller0 entered promiscuous mode [ 91.584542][ T3585] device sit0 left promiscuous mode [ 91.854114][ T3596] tap0: tun_chr_ioctl cmd 1074025677 [ 91.863913][ T3596] tap0: linktype set to 768 [ 91.868635][ T3598] device sit0 left promiscuous mode [ 92.141158][ T3598] device sit0 entered promiscuous mode [ 92.776899][ T3618] device veth0_vlan left promiscuous mode [ 92.898639][ T3618] device veth0_vlan entered promiscuous mode [ 93.416796][ T3626] device sit0 entered promiscuous mode [ 94.342708][ T3682] !6±ÿ: renamed from team_slave_1 [ 94.592622][ T3685] device veth1_macvtap left promiscuous mode [ 94.746487][ T3695] device wg2 entered promiscuous mode [ 94.756483][ T3696] device veth1_macvtap entered promiscuous mode [ 94.781702][ T3696] device macsec0 entered promiscuous mode [ 96.434400][ T3753] device wg2 left promiscuous mode [ 97.165332][ T3806] device sit0 left promiscuous mode [ 98.306210][ T3843] device sit0 left promiscuous mode [ 98.326041][ T3837] device syzkaller0 entered promiscuous mode [ 98.825966][ T3847] device sit0 entered promiscuous mode [ 99.333265][ T3880] device sit0 left promiscuous mode [ 99.916498][ T3941] device sit0 left promiscuous mode [ 100.708513][ T3997] device sit0 entered promiscuous mode [ 101.477919][ T4002] device veth0_vlan left promiscuous mode [ 101.646431][ T4002] device veth0_vlan entered promiscuous mode [ 102.944747][ T4037] device syzkaller0 entered promiscuous mode [ 104.097236][ T4064] device bridge_slave_0 entered promiscuous mode [ 104.510557][ T4072] batadv0: tun_chr_ioctl cmd 2148553947 [ 104.936598][ T4094] device sit0 left promiscuous mode [ 105.283161][ T4092] device wg2 left promiscuous mode [ 105.305292][ T4096] device wg2 entered promiscuous mode [ 105.483383][ T4094] device sit0 entered promiscuous mode [ 106.980827][ T4176] device sit0 left promiscuous mode [ 107.583277][ T4188] device sit0 entered promiscuous mode [ 110.847015][ T4312] device sit0 left promiscuous mode [ 111.013565][ T4312] device sit0 entered promiscuous mode [ 111.047347][ T4326] device syzkaller0 entered promiscuous mode [ 113.183281][ T4367] device sit0 entered promiscuous mode [ 113.503929][ T4388] device syzkaller0 entered promiscuous mode [ 114.938489][ T4434] device syzkaller0 entered promiscuous mode [ 115.607042][ T4442] Ÿë: port 1(veth0_to_team) entered blocking state [ 115.640002][ T4442] Ÿë: port 1(veth0_to_team) entered disabled state [ 115.739232][ T4442] device veth0_to_team entered promiscuous mode [ 117.604551][ T4550] device syzkaller0 entered promiscuous mode [ 117.659365][ T4552] device sit0 left promiscuous mode [ 117.775291][ T4552] device sit0 entered promiscuous mode [ 118.017772][ T4583] device syzkaller0 entered promiscuous mode [ 119.128188][ T4624] device syzkaller0 entered promiscuous mode [ 119.650697][ T24] audit: type=1400 audit(1769377611.559:154): avc: denied { create } for pid=4646 comm="syz.4.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 121.353489][ T4678] device syzkaller0 entered promiscuous mode [ 122.600719][ T4689] device sit0 entered promiscuous mode [ 123.169972][ T4697] device sit0 left promiscuous mode [ 123.487170][ T4723] device veth0_vlan left promiscuous mode [ 123.608843][ T4723] device veth0_vlan entered promiscuous mode [ 123.713646][ T4713] device sit0 entered promiscuous mode [ 124.344732][ T4746] device syzkaller0 entered promiscuous mode [ 124.980993][ T4766] lo: mtu less than device minimum [ 125.056777][ T4766] device syzkaller0 entered promiscuous mode [ 125.650122][ T4801] device sit0 left promiscuous mode [ 125.841094][ T4816] device sit0 entered promiscuous mode [ 125.953182][ T4833] syzkaller0: refused to change device tx_queue_len [ 129.324584][ T4956] device syzkaller0 entered promiscuous mode [ 132.098411][ T5025] gretap0: refused to change device tx_queue_len [ 132.126880][ T5035] device sit0 left promiscuous mode [ 138.978250][ T5179] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.985475][ T5179] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.056458][ T5179] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.063532][ T5179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.070810][ T5179] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.077856][ T5179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.242384][ T5179] device bridge0 entered promiscuous mode [ 140.338065][ T5240] device syzkaller0 entered promiscuous mode [ 141.840164][ T5268] device sit0 left promiscuous mode [ 142.183559][ T5275] device sit0 entered promiscuous mode [ 142.268440][ T5283] device sit0 left promiscuous mode [ 143.423634][ T5285] device sit0 entered promiscuous mode [ 144.360636][ T5323] device syzkaller0 entered promiscuous mode [ 144.691714][ T5340] device syzkaller0 entered promiscuous mode [ 145.749783][ T5384] tun0: tun_chr_ioctl cmd 1074812117 [ 146.544936][ T5422] device sit0 left promiscuous mode [ 148.593762][ T5527] tap0: tun_chr_ioctl cmd 2147767521 [ 148.599266][ T5528] tap0: tun_chr_ioctl cmd 2147767521 [ 148.605551][ T5526] tap0: tun_chr_ioctl cmd 1074025688 [ 149.168336][ T5560] pimreg0: tun_chr_ioctl cmd 35111 [ 150.431031][ T5617] device sit0 left promiscuous mode [ 150.461505][ T5613] device syzkaller0 entered promiscuous mode [ 150.613514][ T5626] tap0: tun_chr_ioctl cmd 1074025677 [ 150.633294][ T5626] tap0: linktype set to 24 [ 151.791351][ T5654] device sit0 entered promiscuous mode [ 152.444770][ T5673] device syzkaller0 entered promiscuous mode [ 157.312894][ T5754] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 157.336667][ T5757] device sit0 left promiscuous mode [ 157.398458][ T5757] device sit0 entered promiscuous mode [ 157.465202][ T5770] : renamed from bond_slave_0 [ 158.979239][ T5843] device syzkaller0 entered promiscuous mode [ 160.001441][ T5888] cgroup: fork rejected by pids controller in /syz3 [ 160.876055][ T6022] device syzkaller0 entered promiscuous mode [ 160.894602][ T276] bridge0: port 3(syz_tun) entered disabled state [ 160.902673][ T276] device syz_tun left promiscuous mode [ 160.908225][ T276] bridge0: port 3(syz_tun) entered disabled state [ 161.006899][ T6040] device sit0 left promiscuous mode [ 161.624842][ T6066] device wg2 entered promiscuous mode [ 161.990289][ T6081] device syzkaller0 entered promiscuous mode [ 162.177057][ T6057] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.184299][ T6057] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.191755][ T6057] device bridge_slave_0 entered promiscuous mode [ 162.301972][ T6057] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.313414][ T6057] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.329214][ T6057] device bridge_slave_1 entered promiscuous mode [ 162.382659][ T6057] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.389724][ T6057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.397016][ T6057] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.404149][ T6057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.439108][ T6096] tap0: tun_chr_ioctl cmd 1074025677 [ 162.444510][ T6096] tap0: linktype set to 768 [ 162.453575][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.461474][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.468949][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.484506][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.492833][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.499864][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.518737][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.527454][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.534532][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.745946][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.755029][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.764954][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.899610][ T6057] device veth0_vlan entered promiscuous mode [ 162.910273][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 162.918677][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.926896][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.934479][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.068514][ T6057] device veth1_macvtap entered promiscuous mode [ 163.081549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.090062][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.098796][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 163.109504][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 163.119508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 163.320679][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 163.339515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 163.526594][ T6112] device syzkaller0 entered promiscuous mode [ 163.618231][ T6115] device syzkaller0 entered promiscuous mode [ 164.628094][ T2327] device bridge_slave_1 left promiscuous mode [ 164.634299][ T2327] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.685494][ T2327] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.697089][ T2327] device veth1_macvtap left promiscuous mode [ 168.173805][ T6267] device syzkaller0 entered promiscuous mode [ 169.308586][ T24] audit: type=1400 audit(1769377661.219:155): avc: denied { create } for pid=6360 comm="syz.3.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 170.282580][ T6395] device syzkaller0 entered promiscuous mode [ 171.179409][ T6414] device veth0_vlan left promiscuous mode [ 171.223993][ T6414] device veth0_vlan entered promiscuous mode [ 171.365122][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.377818][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.385735][ T2327] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 171.700481][ T6461] device syzkaller0 entered promiscuous mode [ 172.180135][ T6490] device syzkaller0 entered promiscuous mode [ 172.753342][ T6515] device wg2 left promiscuous mode [ 172.914696][ T6525] device wg2 entered promiscuous mode [ 173.438111][ T6538] device veth1_macvtap left promiscuous mode [ 173.447672][ T6538] device macsec0 left promiscuous mode [ 173.485021][ T6538] device veth1_macvtap entered promiscuous mode [ 173.562438][ T6538] device macsec0 entered promiscuous mode [ 173.578025][ T6540] device syzkaller0 entered promiscuous mode [ 173.903263][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 173.993430][ T6556] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.000619][ T6556] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.116183][ T6557] device bridge_slave_1 left promiscuous mode [ 174.206315][ T6557] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.273399][ T6557] device bridge_slave_0 left promiscuous mode [ 174.279654][ T6557] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.439059][ T6590] device syzkaller0 entered promiscuous mode [ 175.516825][ T6609] device sit0 left promiscuous mode [ 178.211685][ T24] audit: type=1400 audit(1769377670.119:156): avc: denied { create } for pid=6726 comm="syz.4.1844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 178.513453][ T6749] device veth1_macvtap left promiscuous mode [ 178.519635][ T6749] device macsec0 left promiscuous mode [ 179.114947][ T24] audit: type=1400 audit(1769377671.019:157): avc: denied { create } for pid=6783 comm="syz.2.1861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 180.626699][ T6851] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 180.645917][ T6851] device syzkaller0 entered promiscuous mode [ 181.218726][ T6911] device syzkaller0 entered promiscuous mode [ 183.740932][ T7001] device wg2 entered promiscuous mode [ 186.171158][ T7110] device syzkaller0 entered promiscuous mode [ 187.364777][ T7155] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 187.370628][ T7155] syzkaller0: linktype set to 0 [ 187.479691][ T7166] ªªªªªª™™: renamed from vlan0 [ 187.515437][ T7158] device wg2 left promiscuous mode [ 187.642234][ T7167] device wg2 entered promiscuous mode [ 188.053959][ T7186] tap0: tun_chr_ioctl cmd 1074025677 [ 188.112132][ T7186] tap0: linktype set to 24 [ 188.240022][ T7197] device wg2 left promiscuous mode [ 188.755458][ T7214] device syzkaller0 entered promiscuous mode [ 191.736930][ T7362] syz.4.2045[7362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.736984][ T7362] syz.4.2045[7362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.923869][ T7362] device veth0_vlan left promiscuous mode [ 191.942443][ T7362] device veth0_vlan entered promiscuous mode [ 192.372480][ T24] audit: type=1400 audit(1769377684.289:158): avc: denied { setattr } for pid=7390 comm="syz.4.2053" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 195.614503][ T7546] device sit0 entered promiscuous mode [ 197.614050][ T7621] device sit0 entered promiscuous mode [ 199.402128][ T7670] device sit0 left promiscuous mode [ 199.755484][ T7685] device sit0 left promiscuous mode [ 199.998392][ T7685] device sit0 entered promiscuous mode [ 207.050256][ T7916] device syzkaller0 entered promiscuous mode [ 207.580829][ T7959] device syzkaller0 entered promiscuous mode [ 208.047358][ T7993] 7B’ç÷ï: renamed from syzkaller0 [ 208.658015][ T8040] syz.4.2238[8040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.658066][ T8040] syz.4.2238[8040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.952951][ T8054] device syzkaller0 entered promiscuous mode [ 209.442725][ T8074] ÿ: renamed from bond_slave_0 [ 213.918373][ T8300] syzkaller1: tun_chr_ioctl cmd 1074812118 [ 214.035956][ T8306] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 215.164605][ T8354] ªªªªªª™™: renamed from vlan0 [ 217.584826][ T8402] device sit0 entered promiscuous mode [ 218.583284][ T8475] device syzkaller0 entered promiscuous mode [ 220.203771][ T8516] pimreg: tun_chr_ioctl cmd 1074025677 [ 220.232098][ T8516] pimreg: linktype set to 6 [ 220.459024][ T8519] gretap0: refused to change device tx_queue_len [ 220.619507][ T8521] syzkaller1: tun_chr_ioctl cmd 21731 [ 220.625596][ T8521] syzkaller1: tun_chr_ioctl cmd 1074812118 [ 220.633099][ T8521] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 221.520794][ T8559] device wg2 left promiscuous mode [ 221.653865][ T24] audit: type=1400 audit(1769377713.569:159): avc: denied { create } for pid=8566 comm="syz.3.2387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 221.798425][ T8559] device wg2 entered promiscuous mode [ 222.581615][ T8583] device wg2 left promiscuous mode [ 224.488134][ T8616] device syzkaller0 entered promiscuous mode [ 224.923226][ T8629] device sit0 left promiscuous mode [ 225.255145][ T8629] device sit0 entered promiscuous mode [ 225.912406][ T8665] lo: mtu less than device minimum [ 226.268270][ T8676] device sit0 entered promiscuous mode [ 226.952144][ T8710] device sit0 left promiscuous mode [ 227.082753][ T8710] device sit0 entered promiscuous mode [ 227.419442][ T8735] device sit0 left promiscuous mode [ 227.807943][ T8735] device sit0 entered promiscuous mode [ 229.948880][ T8819] device syzkaller0 entered promiscuous mode [ 230.145500][ T8833] device syzkaller0 entered promiscuous mode [ 230.465574][ T8859] device sit0 left promiscuous mode [ 230.581277][ T8859] device sit0 entered promiscuous mode [ 230.729293][ T8870] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 230.896492][ T8875] device sit0 left promiscuous mode [ 230.933576][ T8875] device sit0 entered promiscuous mode [ 231.131247][ T24] audit: type=1400 audit(1769377723.039:160): avc: denied { create } for pid=8886 comm="syz.4.2482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 231.824407][ T8906] device sit0 entered promiscuous mode [ 231.839322][ T24] audit: type=1400 audit(1769377723.749:161): avc: denied { read } for pid=8911 comm="syz.1.2490" dev="nsfs" ino=4026532287 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 231.906129][ T24] audit: type=1400 audit(1769377723.749:162): avc: denied { open } for pid=8911 comm="syz.1.2490" path="net:[4026532287]" dev="nsfs" ino=4026532287 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 232.121953][ T8924] device syzkaller0 entered promiscuous mode [ 236.188359][ T8963] device sit0 left promiscuous mode [ 236.964935][ T8965] device sit0 entered promiscuous mode [ 237.055855][ T8990] device sit0 left promiscuous mode [ 238.658681][ T9027] device pim6reg1 entered promiscuous mode [ 239.261229][ T9036] device sit0 left promiscuous mode [ 240.384096][ T9074] !6±ÿ: renamed from team_slave_1 [ 243.783737][ T9164] GPL: port 1(erspan0) entered blocking state [ 243.789848][ T9164] GPL: port 1(erspan0) entered disabled state [ 243.814708][ T9164] device erspan0 entered promiscuous mode [ 243.835282][ T9166] GPL: port 1(erspan0) entered blocking state [ 243.841408][ T9166] GPL: port 1(erspan0) entered forwarding state [ 243.849969][ T9169] device sit0 left promiscuous mode [ 244.476764][ T9169] device sit0 entered promiscuous mode [ 245.795296][ T9240] device sit0 left promiscuous mode [ 246.326847][ T9240] device sit0 entered promiscuous mode [ 246.902546][ T9304] device syzkaller0 entered promiscuous mode [ 247.267239][ T9323] device wg2 entered promiscuous mode [ 248.300643][ T9392] device syzkaller0 entered promiscuous mode [ 248.755158][ T9413] device syzkaller0 entered promiscuous mode [ 248.922564][ T9420] device veth1_macvtap left promiscuous mode [ 250.094168][ T9469] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.101417][ T9469] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.109396][ T9469] device bridge_slave_0 entered promiscuous mode [ 250.136479][ T9469] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.144151][ T9469] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.152827][ T9469] device bridge_slave_1 entered promiscuous mode [ 250.418583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.426163][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.464250][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.474914][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.486557][ T361] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.493622][ T361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.538379][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.554355][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.565017][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.580315][ T361] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.587398][ T361] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.612112][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.630133][ T361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.676592][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.689538][ T9469] device veth0_vlan entered promiscuous mode [ 250.707489][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 250.728051][ T9469] device veth1_macvtap entered promiscuous mode [ 250.740966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.749771][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 250.772662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 250.803186][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.832568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.085920][ T9708] device syzkaller0 entered promiscuous mode [ 256.882540][ T9732] device sit0 entered promiscuous mode [ 257.436022][ T9785] gretap0: refused to change device tx_queue_len [ 257.447049][ T9786] gretap0: refused to change device tx_queue_len [ 259.234428][ T9835] device sit0 left promiscuous mode [ 259.654305][ T9826] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.661482][ T9826] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.669372][ T9826] device bridge_slave_0 entered promiscuous mode [ 259.923114][ T9826] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.930227][ T9826] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.937688][ T9826] device bridge_slave_1 entered promiscuous mode [ 260.034477][ T9826] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.041562][ T9826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.048871][ T9826] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.055912][ T9826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.086442][ T9876] device syzkaller0 entered promiscuous mode [ 260.294190][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.304212][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.321760][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.329347][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.552302][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.561444][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.569643][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.576672][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.584596][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.593792][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.602226][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.609368][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.617101][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.626252][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.634547][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.642904][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.651077][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.659772][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.668337][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.676622][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.685003][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.692695][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.704075][ T9826] device veth0_vlan entered promiscuous mode [ 260.971634][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.980606][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.053538][ T9826] device veth1_macvtap entered promiscuous mode [ 261.332064][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.341392][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.350384][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.360085][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.375701][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.398640][ T9897] device syzkaller0 entered promiscuous mode [ 262.001322][ T9912] device wg2 entered promiscuous mode [ 263.153882][ T7] GPL: port 1(erspan0) entered disabled state [ 263.197690][ T7] device erspan0 left promiscuous mode [ 263.224259][ T7] GPL: port 1(erspan0) entered disabled state [ 263.719884][ T7] device veth0_to_team left promiscuous mode [ 263.728261][ T7] Ÿë: port 1(veth0_to_team) entered disabled state [ 263.749571][ T7] device bridge_slave_1 left promiscuous mode [ 263.762108][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.777365][ T7] device bridge_slave_0 left promiscuous mode [ 263.803104][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.024642][ T9997] device syzkaller0 entered promiscuous mode [ 265.752164][T10016] device syzkaller0 entered promiscuous mode [ 265.766334][T10019] syz.3.2823[10019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.766389][T10019] syz.3.2823[10019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.989320][T10097] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.212733][T10097] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.323231][T10097] device bridge_slave_0 entered promiscuous mode [ 268.429168][T10097] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.522044][T10097] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.593595][T10097] device bridge_slave_1 entered promiscuous mode [ 268.977161][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.990028][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.002879][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 269.011348][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.053158][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.060418][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.084600][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.177823][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.268143][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.275231][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.443793][ T7] device ip6gretap0 left promiscuous mode [ 269.469899][ T7] : port 1(ip6gretap0) entered disabled state [ 269.652335][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 269.681118][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.712324][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.720415][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.731399][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.932536][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.025970][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.053027][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.072127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.087958][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.102101][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.116281][T10097] device veth0_vlan entered promiscuous mode [ 270.154215][T10097] device veth1_macvtap entered promiscuous mode [ 270.189142][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.224793][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.283024][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.343567][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.376625][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.423007][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.431688][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.763336][ T7] device veth0_to_team left promiscuous mode [ 270.769632][ T7] Ÿë: port 1(veth0_to_team) entered disabled state [ 271.689778][T10210] device syzkaller0 entered promiscuous mode [ 271.728260][T10207] device syzkaller0 entered promiscuous mode [ 272.202187][T10243] device wg2 left promiscuous mode [ 274.470980][T10307] device sit0 entered promiscuous mode [ 275.099625][ T24] audit: type=1400 audit(1769377767.009:163): avc: denied { ioctl } for pid=10337 comm="syz.2.2911" path="net:[4026533052]" dev="nsfs" ino=4026533052 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 275.245666][T10350] device syzkaller0 entered promiscuous mode [ 276.091038][ T24] audit: type=1400 audit(1769377767.999:164): avc: denied { getattr } for pid=10451 comm="syz.2.2953" path="net:[4026533052]" dev="nsfs" ino=4026533052 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 276.519492][T10477] device syzkaller0 entered promiscuous mode [ 276.819358][T10489] ªªªªªª: renamed from vlan0 [ 278.056154][T10540] device wg2 left promiscuous mode [ 278.314423][T10561] device wg2 entered promiscuous mode [ 278.319920][T10561] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 278.330697][T10563] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.101758][T10571] device sit0 entered promiscuous mode [ 279.571257][T10587] device sit0 left promiscuous mode [ 279.844983][T10587] device sit0 entered promiscuous mode [ 280.632076][T10633] device sit0 left promiscuous mode [ 281.674961][T10651] syz.2.3009 (10651) used obsolete PPPIOCDETACH ioctl [ 282.013007][T10676] FAULT_INJECTION: forcing a failure. [ 282.013007][T10676] name failslab, interval 1, probability 0, space 0, times 0 [ 282.034601][T10676] CPU: 0 PID: 10676 Comm: syz.2.3016 Tainted: G W syzkaller #0 [ 282.043468][T10676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 282.053622][T10676] Call Trace: [ 282.056922][T10676] __dump_stack+0x21/0x24 [ 282.061237][T10676] dump_stack_lvl+0x1a7/0x208 [ 282.065925][T10676] ? thaw_kernel_threads+0x220/0x220 [ 282.071376][T10676] ? show_regs_print_info+0x18/0x18 [ 282.076576][T10676] dump_stack+0x15/0x1c [ 282.080822][T10676] should_fail+0x3c1/0x510 [ 282.085230][T10676] ? security_inode_alloc+0x33/0x110 [ 282.090595][T10676] __should_failslab+0xa4/0xe0 [ 282.095352][T10676] should_failslab+0x9/0x20 [ 282.099856][T10676] kmem_cache_alloc+0x3d/0x2d0 [ 282.104711][T10676] ? debug_smp_processor_id+0x17/0x20 [ 282.110077][T10676] ? perf_trace_kmem_alloc+0x4b/0x140 [ 282.115806][T10676] security_inode_alloc+0x33/0x110 [ 282.120916][T10676] inode_init_always+0x70a/0x9b0 [ 282.125846][T10676] iget_locked+0x1d7/0x7d0 [ 282.130347][T10676] kernfs_get_inode+0x4b/0x6f0 [ 282.135101][T10676] cgroup_attach_permissions+0x20a/0x940 [ 282.140726][T10676] cgroup_procs_write+0x269/0x320 [ 282.145831][T10676] ? cgroup_procs_next+0xa0/0xa0 [ 282.150767][T10676] cgroup_file_write+0x2a5/0x570 [ 282.155717][T10676] ? cgroup_seqfile_stop+0xc0/0xc0 [ 282.160825][T10676] ? mutex_lock+0x92/0xf0 [ 282.165588][T10676] ? mutex_trylock+0xa0/0xa0 [ 282.170177][T10676] ? __kasan_check_write+0x14/0x20 [ 282.175282][T10676] kernfs_fop_write_iter+0x2c5/0x400 [ 282.180562][T10676] ? cgroup_seqfile_stop+0xc0/0xc0 [ 282.185664][T10676] vfs_write+0x758/0xdc0 [ 282.189903][T10676] ? kernel_write+0x3c0/0x3c0 [ 282.194570][T10676] ? mutex_trylock+0xa0/0xa0 [ 282.199159][T10676] ? __fget_files+0x2c4/0x320 [ 282.203826][T10676] ? __fdget_pos+0x2d2/0x380 [ 282.208579][T10676] ? ksys_write+0x71/0x250 [ 282.212987][T10676] ksys_write+0x149/0x250 [ 282.217306][T10676] ? __ia32_sys_read+0x90/0x90 [ 282.222064][T10676] ? debug_smp_processor_id+0x17/0x20 [ 282.227424][T10676] __x64_sys_write+0x7b/0x90 [ 282.232045][T10676] do_syscall_64+0x31/0x40 [ 282.236455][T10676] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 282.242439][T10676] RIP: 0033:0x7f59bafb6cb9 [ 282.246864][T10676] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.266478][T10676] RSP: 002b:00007f59b9a13028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 282.274884][T10676] RAX: ffffffffffffffda RBX: 00007f59bb231fa0 RCX: 00007f59bafb6cb9 [ 282.282867][T10676] RDX: 0000000000000012 RSI: 0000200000000080 RDI: 0000000000000004 [ 282.290902][T10676] RBP: 00007f59b9a13090 R08: 0000000000000000 R09: 0000000000000000 [ 282.298941][T10676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.306890][T10676] R13: 00007f59bb232038 R14: 00007f59bb231fa0 R15: 00007ffd7964c0d8 [ 282.365256][T10686] device syzkaller0 entered promiscuous mode [ 282.646127][T10721] FAULT_INJECTION: forcing a failure. [ 282.646127][T10721] name failslab, interval 1, probability 0, space 0, times 0 [ 282.659077][T10721] CPU: 1 PID: 10721 Comm: syz.4.3031 Tainted: G W syzkaller #0 [ 282.667920][T10721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 282.677950][T10721] Call Trace: [ 282.681215][T10721] __dump_stack+0x21/0x24 [ 282.685535][T10721] dump_stack_lvl+0x1a7/0x208 [ 282.690180][T10721] ? show_regs_print_info+0x18/0x18 [ 282.695366][T10721] dump_stack+0x15/0x1c [ 282.699491][T10721] should_fail+0x3c1/0x510 [ 282.703873][T10721] ? find_css_set+0x966/0x1620 [ 282.708611][T10721] __should_failslab+0xa4/0xe0 [ 282.713351][T10721] should_failslab+0x9/0x20 [ 282.717859][T10721] kmem_cache_alloc_trace+0x3a/0x2e0 [ 282.723329][T10721] find_css_set+0x966/0x1620 [ 282.727889][T10721] ? fsnotify_destroy_marks+0x78/0x570 [ 282.733319][T10721] ? cgroup_migrate_prepare_dst+0x8c0/0x8c0 [ 282.739296][T10721] ? evict+0x881/0x930 [ 282.743337][T10721] cgroup_migrate_prepare_dst+0xcc/0x8c0 [ 282.748941][T10721] cgroup_attach_task+0x298/0x520 [ 282.753947][T10721] ? cgroup_migrate_execute+0x1020/0x1020 [ 282.759660][T10721] ? cgroup_attach_permissions+0x46b/0x940 [ 282.765440][T10721] ? __kasan_check_write+0x14/0x20 [ 282.770518][T10721] ? revert_creds+0xb8/0x1c0 [ 282.775081][T10721] cgroup_procs_write+0x2a0/0x320 [ 282.780073][T10721] ? cgroup_procs_next+0xa0/0xa0 [ 282.784985][T10721] cgroup_file_write+0x2a5/0x570 [ 282.789910][T10721] ? cgroup_seqfile_stop+0xc0/0xc0 [ 282.794993][T10721] ? mutex_lock+0x92/0xf0 [ 282.799289][T10721] ? mutex_trylock+0xa0/0xa0 [ 282.804136][T10721] ? __kasan_check_write+0x14/0x20 [ 282.809274][T10721] kernfs_fop_write_iter+0x2c5/0x400 [ 282.814548][T10721] ? cgroup_seqfile_stop+0xc0/0xc0 [ 282.820186][T10721] vfs_write+0x758/0xdc0 [ 282.824407][T10721] ? kernel_write+0x3c0/0x3c0 [ 282.829079][T10721] ? mutex_trylock+0xa0/0xa0 [ 282.833648][T10721] ? __fget_files+0x2c4/0x320 [ 282.838297][T10721] ? __fdget_pos+0x2d2/0x380 [ 282.842859][T10721] ? ksys_write+0x71/0x250 [ 282.847248][T10721] ksys_write+0x149/0x250 [ 282.851673][T10721] ? __ia32_sys_read+0x90/0x90 [ 282.856429][T10721] ? debug_smp_processor_id+0x17/0x20 [ 282.861779][T10721] __x64_sys_write+0x7b/0x90 [ 282.866343][T10721] do_syscall_64+0x31/0x40 [ 282.870737][T10721] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 282.876603][T10721] RIP: 0033:0x7fecaf23acb9 [ 282.880993][T10721] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.900682][T10721] RSP: 002b:00007fecadc97028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 282.909174][T10721] RAX: ffffffffffffffda RBX: 00007fecaf4b5fa0 RCX: 00007fecaf23acb9 [ 282.917146][T10721] RDX: 0000000000000012 RSI: 0000200000000080 RDI: 0000000000000004 [ 282.925324][T10721] RBP: 00007fecadc97090 R08: 0000000000000000 R09: 0000000000000000 [ 282.933296][T10721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.941339][T10721] R13: 00007fecaf4b6038 R14: 00007fecaf4b5fa0 R15: 00007ffe2516b178 [ 283.035044][T10738] device syzkaller0 entered promiscuous mode [ 284.875912][T10774] FAULT_INJECTION: forcing a failure. [ 284.875912][T10774] name failslab, interval 1, probability 0, space 0, times 0 [ 284.901999][T10774] CPU: 1 PID: 10774 Comm: syz.4.3046 Tainted: G W syzkaller #0 [ 284.910865][T10774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 284.920913][T10774] Call Trace: [ 284.924198][T10774] __dump_stack+0x21/0x24 [ 284.928544][T10774] dump_stack_lvl+0x1a7/0x208 [ 284.933209][T10774] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 284.939438][T10774] ? show_regs_print_info+0x18/0x18 [ 284.944633][T10774] dump_stack+0x15/0x1c [ 284.948776][T10774] should_fail+0x3c1/0x510 [ 284.953185][T10774] ? allocate_cgrp_cset_links+0xdc/0x380 [ 284.958812][T10774] __should_failslab+0xa4/0xe0 [ 284.963655][T10774] should_failslab+0x9/0x20 [ 284.968150][T10774] kmem_cache_alloc_trace+0x3a/0x2e0 [ 284.973429][T10774] allocate_cgrp_cset_links+0xdc/0x380 [ 284.978960][T10774] find_css_set+0x988/0x1620 [ 284.983642][T10774] ? fsnotify_destroy_marks+0x78/0x570 [ 284.989089][T10774] ? cgroup_migrate_prepare_dst+0x8c0/0x8c0 [ 284.994965][T10774] ? evict+0x881/0x930 [ 284.999018][T10774] cgroup_migrate_prepare_dst+0xcc/0x8c0 [ 285.004717][T10774] cgroup_attach_task+0x298/0x520 [ 285.009727][T10774] ? cgroup_migrate_execute+0x1020/0x1020 [ 285.015557][T10774] ? cgroup_attach_permissions+0x46b/0x940 [ 285.021341][T10774] ? __kasan_check_write+0x14/0x20 [ 285.026435][T10774] ? revert_creds+0xb8/0x1c0 [ 285.031007][T10774] cgroup_procs_write+0x2a0/0x320 [ 285.036002][T10774] ? cgroup_procs_next+0xa0/0xa0 [ 285.041008][T10774] cgroup_file_write+0x2a5/0x570 [ 285.045918][T10774] ? cgroup_seqfile_stop+0xc0/0xc0 [ 285.051035][T10774] ? mutex_lock+0x92/0xf0 [ 285.055336][T10774] ? mutex_trylock+0xa0/0xa0 [ 285.059996][T10774] ? __kasan_check_write+0x14/0x20 [ 285.065185][T10774] kernfs_fop_write_iter+0x2c5/0x400 [ 285.070527][T10774] ? cgroup_seqfile_stop+0xc0/0xc0 [ 285.075620][T10774] vfs_write+0x758/0xdc0 [ 285.079835][T10774] ? perf_trace_kmem_free+0x3f/0x110 [ 285.085091][T10774] ? kernel_write+0x3c0/0x3c0 [ 285.089740][T10774] ? mutex_trylock+0xa0/0xa0 [ 285.094655][T10774] ? __fget_files+0x2c4/0x320 [ 285.099317][T10774] ? __fdget_pos+0x2d2/0x380 [ 285.103880][T10774] ? ksys_write+0x71/0x250 [ 285.108268][T10774] ksys_write+0x149/0x250 [ 285.112573][T10774] ? __ia32_sys_read+0x90/0x90 [ 285.117314][T10774] ? debug_smp_processor_id+0x17/0x20 [ 285.122655][T10774] __x64_sys_write+0x7b/0x90 [ 285.127223][T10774] do_syscall_64+0x31/0x40 [ 285.131612][T10774] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 285.137485][T10774] RIP: 0033:0x7fecaf23acb9 [ 285.141874][T10774] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 285.161982][T10774] RSP: 002b:00007fecadc97028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 285.170366][T10774] RAX: ffffffffffffffda RBX: 00007fecaf4b5fa0 RCX: 00007fecaf23acb9 [ 285.178309][T10774] RDX: 0000000000000012 RSI: 0000200000000080 RDI: 0000000000000004 [ 285.186253][T10774] RBP: 00007fecadc97090 R08: 0000000000000000 R09: 0000000000000000 [ 285.194207][T10774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.202154][T10774] R13: 00007fecaf4b6038 R14: 00007fecaf4b5fa0 R15: 00007ffe2516b178 [ 287.282709][T10783] device sit0 entered promiscuous mode [ 287.813607][T10805] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.992943][T10845] device sit0 left promiscuous mode [ 289.161449][T10856] device syzkaller0 entered promiscuous mode [ 289.176296][T10845] device sit0 entered promiscuous mode [ 289.252374][T10863] device syzkaller0 entered promiscuous mode [ 289.853606][T10885] device sit0 entered promiscuous mode [ 290.346266][T10928] device sit0 left promiscuous mode [ 290.475667][T10932] pimreg0: tun_chr_ioctl cmd 35111 [ 290.482430][T10932] pimreg0: tun_chr_ioctl cmd 1074812117 [ 290.497993][T10936] device pim6reg1 entered promiscuous mode [ 290.605507][T10945] device syzkaller0 entered promiscuous mode [ 291.594692][T11010] device sit0 left promiscuous mode [ 291.950379][T11035] -: renamed from syzkaller0 [ 292.923138][T11051] device sit0 left promiscuous mode [ 293.211211][T11060] device sit0 entered promiscuous mode [ 297.002524][T11158] device syzkaller0 entered promiscuous mode [ 298.206338][T11181] device sit0 entered promiscuous mode [ 300.453020][T11256] device sit0 left promiscuous mode [ 301.486654][T11258] device sit0 entered promiscuous mode [ 302.451269][T11283] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.458467][T11283] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.326576][T11300] device sit0 entered promiscuous mode [ 303.667755][T11324] device sit0 left promiscuous mode [ 304.499623][T11365] @0Ù: renamed from bond_slave_1 [ 305.472348][T11407] syzkaller0: create flow: hash 2838567927 index 1 [ 306.184358][T11399] syzkaller0: delete flow: hash 2838567927 index 1 [ 306.985718][T11451] device syzkaller0 entered promiscuous mode [ 307.810736][T11505] device sit0 left promiscuous mode [ 308.415215][T11505] device sit0 entered promiscuous mode [ 310.308624][T11590] device veth0_vlan left promiscuous mode [ 310.314728][T11590] device veth0_vlan entered promiscuous mode [ 310.337302][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.367259][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.374702][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.462050][T11610] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 310.479957][T11608] syzkaller0: tun_chr_ioctl cmd 35108 [ 310.488494][T11610] syzkaller0: tun_chr_ioctl cmd 35108 [ 310.516612][T11608] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 311.092221][T11639] device sit0 left promiscuous mode [ 311.176207][T11642] device sit0 entered promiscuous mode [ 312.242366][ T24] audit: type=1400 audit(1769377804.149:165): avc: denied { associate } for pid=11658 comm="syz.2.3307" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 312.443415][T11661] device veth0_vlan left promiscuous mode [ 312.524919][T11661] device veth0_vlan entered promiscuous mode [ 315.867093][ T24] audit: type=1400 audit(1769377807.779:166): avc: denied { create } for pid=11751 comm="syz.1.3337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 316.081749][T11763] device syzkaller0 entered promiscuous mode [ 317.024674][T11827] device sit0 left promiscuous mode [ 317.067041][T11804] device xfrm0 entered promiscuous mode [ 317.443707][T11834] device dummy0 entered promiscuous mode [ 317.572213][T11836] device sit0 entered promiscuous mode [ 317.627111][T11847] device syzkaller0 entered promiscuous mode [ 318.432724][ T24] audit: type=1400 audit(1769377810.349:167): avc: denied { create } for pid=11865 comm="syz.0.3372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 318.481628][T11868] device sit0 left promiscuous mode [ 318.490384][T11870] device sit0 left promiscuous mode [ 318.575053][T11873] device sit0 left promiscuous mode [ 318.780783][T11892] device veth1_macvtap left promiscuous mode [ 318.791550][T11892] device macsec0 entered promiscuous mode [ 319.389120][T11926] device syzkaller0 entered promiscuous mode [ 324.685048][T12150] device sit0 entered promiscuous mode [ 325.019586][T12185] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.026823][T12185] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.040834][T12185] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.048000][T12185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.055329][T12185] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.062363][T12185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.083859][T12185] device bridge0 entered promiscuous mode [ 325.273114][T12203] IPv6: …: Disabled Multicast RS [ 325.337639][T12209] device sit0 left promiscuous mode [ 325.441841][T12211] ÿ: renamed from bond_slave_0 [ 326.134640][T12248] device syzkaller0 entered promiscuous mode [ 326.403201][T12258] bridge0: port 3(syz_tun) entered blocking state [ 326.409778][T12258] bridge0: port 3(syz_tun) entered disabled state [ 326.417107][T12258] device syz_tun entered promiscuous mode [ 326.423745][T12258] bridge0: port 3(syz_tun) entered blocking state [ 326.430202][T12258] bridge0: port 3(syz_tun) entered forwarding state [ 326.460648][T12266] ÿ: renamed from team_slave_1 [ 326.551738][T12273] device syzkaller0 entered promiscuous mode [ 326.856054][T12296] device wg2 entered promiscuous mode [ 327.035498][T12311] syz.0.3509[12311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.035553][T12311] syz.0.3509[12311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.105497][T12314] ÿ: renamed from team_slave_1 [ 327.336457][T12317] device veth0_vlan left promiscuous mode [ 327.440645][T12317] device veth0_vlan entered promiscuous mode [ 327.448985][T12322] gretap0: refused to change device tx_queue_len [ 327.455686][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 327.468915][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 327.559050][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 327.577113][T12302] device sit0 entered promiscuous mode [ 328.327694][T12366] device syzkaller0 entered promiscuous mode [ 328.565782][ T24] audit: type=1400 audit(1769377820.479:168): avc: denied { ioctl } for pid=12388 comm="syz.1.3533" path="" dev="cgroup2" ino=329 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 329.457692][T12428] device sit0 left promiscuous mode [ 330.449675][T12488] device syzkaller0 entered promiscuous mode [ 332.377645][T12554] device sit0 entered promiscuous mode [ 334.309091][T12648] device sit0 entered promiscuous mode [ 337.717665][T12698] tun1: tun_chr_ioctl cmd 1074812118 [ 339.971934][T12738] device syzkaller0 entered promiscuous mode [ 341.187878][T12820] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.195079][T12820] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.202839][T12820] device bridge_slave_0 entered promiscuous mode [ 341.212318][T12820] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.219532][T12820] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.227425][T12820] device bridge_slave_1 entered promiscuous mode [ 341.294119][T12820] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.301174][T12820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.308457][T12820] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.315492][T12820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.334501][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 341.342139][ T7651] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.349470][ T7651] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.375643][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 341.397254][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.404352][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.411881][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 341.420978][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.428277][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.440392][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.463557][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.632378][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.643386][T12851] device veth0_vlan left promiscuous mode [ 341.649892][T12851] device veth0_vlan entered promiscuous mode [ 341.664061][T12820] device veth0_vlan entered promiscuous mode [ 341.672373][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.693105][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.701776][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.715505][T12820] device veth1_macvtap entered promiscuous mode [ 341.736056][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.761649][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.783610][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 341.858474][ T9] device bridge_slave_1 left promiscuous mode [ 341.867993][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.913304][ T9] device bridge_slave_0 left promiscuous mode [ 341.940969][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.050862][ T9] device veth1_macvtap left promiscuous mode [ 344.080704][T12932] device sit0 entered promiscuous mode [ 345.021362][T12984] device sit0 entered promiscuous mode [ 345.505142][T13048] device sit0 left promiscuous mode [ 345.540312][T13048] device sit0 entered promiscuous mode [ 347.496280][T13099] device sit0 left promiscuous mode [ 347.730269][T13108] device veth1_macvtap left promiscuous mode [ 347.738714][T13108] device veth1_macvtap entered promiscuous mode [ 347.745147][T13108] device macsec0 entered promiscuous mode [ 347.751561][T13109] device sit0 entered promiscuous mode [ 347.874773][T13117] device wg2 left promiscuous mode [ 347.889624][T13117] device wg2 entered promiscuous mode [ 347.975511][ T24] audit: type=1400 audit(1769377839.889:169): avc: denied { create } for pid=13127 comm="syz.2.3745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 348.020406][T13146] device sit0 left promiscuous mode [ 348.610338][T13146] device sit0 entered promiscuous mode [ 349.722066][T13192] device sit0 left promiscuous mode [ 349.867060][T13193] device sit0 entered promiscuous mode [ 350.989020][T13214] device sit0 left promiscuous mode [ 351.221095][T13214] device sit0 entered promiscuous mode [ 351.234394][T13226] GPL: port 1(dummy0) entered blocking state [ 351.262142][T13226] GPL: port 1(dummy0) entered disabled state [ 351.269041][T13226] device dummy0 entered promiscuous mode [ 351.843371][T13271] device sit0 left promiscuous mode [ 352.513629][T13271] device sit0 entered promiscuous mode [ 353.015275][T13306] @ÿ: renamed from bond_slave_0 [ 354.159974][T13331] device sit0 entered promiscuous mode [ 354.462563][T13384] IPv6: …: Disabled Multicast RS [ 354.594759][T13382] device sit0 left promiscuous mode [ 355.150601][T13396] device sit0 entered promiscuous mode [ 355.259764][T13394] device sit0 left promiscuous mode [ 355.611728][T13394] device sit0 entered promiscuous mode [ 356.706936][T13453] device sit0 left promiscuous mode [ 357.432505][T13483] tap0: tun_chr_ioctl cmd 35139 [ 358.155091][T13515] device sit0 entered promiscuous mode [ 359.043057][T13555] syz.2.3861[13555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.043114][T13555] syz.2.3861[13555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.236890][T13555] syz.2.3861[13555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.281660][T13555] syz.2.3861[13555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 359.519102][T13576] device sit0 entered promiscuous mode [ 360.860253][T13649] device syzkaller0 entered promiscuous mode [ 360.982360][T13660] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 364.128560][T13803] device syzkaller0 entered promiscuous mode [ 365.508874][T13838] device wg2 entered promiscuous mode [ 366.746870][T13881] ÿ: renamed from team_slave_1 [ 367.975513][T13926] device veth0_vlan left promiscuous mode [ 368.030092][T13926] device veth0_vlan entered promiscuous mode [ 368.045034][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.057605][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.065421][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.118635][T13931] device sit0 left promiscuous mode [ 368.581107][T13931] device sit0 entered promiscuous mode [ 372.327137][T14040] device sit0 left promiscuous mode [ 372.894576][T14040] device sit0 entered promiscuous mode [ 373.833003][T14085] device sit0 left promiscuous mode [ 374.401049][T14097] device sit0 left promiscuous mode [ 374.422243][T14085] device sit0 entered promiscuous mode [ 375.954484][T14101] device sit0 entered promiscuous mode [ 376.147407][T14146] device syzkaller0 entered promiscuous mode [ 376.345618][T14155] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.663771][T14248] device veth1_macvtap left promiscuous mode [ 378.671014][T14248] device macsec0 left promiscuous mode [ 378.883989][T14253] device veth1_macvtap entered promiscuous mode [ 378.890284][T14253] device macsec0 entered promiscuous mode [ 379.064124][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 384.239141][T14450] device syzkaller0 entered promiscuous mode [ 386.429719][T14497] device syzkaller0 entered promiscuous mode [ 389.572678][T14626] device sit0 left promiscuous mode [ 390.303165][T14633] device sit0 entered promiscuous mode [ 391.062173][T14667] device veth0_vlan left promiscuous mode [ 391.070102][T14667] device veth0_vlan entered promiscuous mode [ 391.087699][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.096058][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.104723][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.291904][T14722] syz.2.4200[14722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.310757][T14722] syz.2.4200[14722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.114901][T14758] device syzkaller0 entered promiscuous mode [ 394.375852][T14781] syz.1.4216[14781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.375901][T14781] syz.1.4216[14781] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.832517][T14819] syz.2.4227 uses obsolete (PF_INET,SOCK_PACKET) [ 395.015736][T14822] device sit0 left promiscuous mode [ 395.335369][T14822] device sit0 entered promiscuous mode [ 395.840321][T14863] device syzkaller0 entered promiscuous mode [ 400.796099][T15013] Ÿë: port 1(veth0_to_team) entered blocking state [ 400.833250][T15013] Ÿë: port 1(veth0_to_team) entered disabled state [ 400.881581][T15013] device veth0_to_team entered promiscuous mode [ 401.494417][T15039] device syzkaller0 entered promiscuous mode [ 402.018848][T15066] device sit0 left promiscuous mode [ 403.948803][T15139] device sit0 left promiscuous mode [ 404.072570][T15139] device sit0 entered promiscuous mode [ 406.326724][T15219] device syzkaller0 entered promiscuous mode [ 407.386201][T15256] device sit0 left promiscuous mode [ 407.751533][T15256] device sit0 entered promiscuous mode [ 409.595934][T15306] device syzkaller0 entered promiscuous mode [ 410.482053][T15328] device sit0 left promiscuous mode [ 410.855154][T15328] device sit0 entered promiscuous mode [ 411.155783][T15355] device wg2 left promiscuous mode [ 411.164827][T15361] device wg2 entered promiscuous mode [ 411.215497][T15374] device sit0 left promiscuous mode [ 411.897067][T15381] device sit0 entered promiscuous mode [ 411.932096][T15384] device sit0 left promiscuous mode [ 411.943959][T15388] device sit0 entered promiscuous mode [ 412.020174][T15393] device sit0 left promiscuous mode [ 412.383466][T15393] device sit0 entered promiscuous mode [ 414.461063][T15471] device sit0 entered promiscuous mode [ 414.662655][T15515] device lo entered promiscuous mode [ 415.237374][T15551] device sit0 left promiscuous mode [ 415.776540][T15551] device sit0 entered promiscuous mode [ 416.723088][T15613] device sit0 left promiscuous mode [ 416.949225][T15613] device sit0 entered promiscuous mode [ 417.476532][T15669] device sit0 left promiscuous mode [ 417.937215][T15669] device sit0 entered promiscuous mode [ 418.345829][T15702] device syzkaller0 entered promiscuous mode [ 418.906761][T15744] device syzkaller0 entered promiscuous mode [ 419.368347][T15777] tap0: tun_chr_ioctl cmd 1074025681 [ 421.390885][T15883] device syzkaller0 entered promiscuous mode [ 422.450512][T15973] device sit0 left promiscuous mode [ 422.619738][T15973] device wg2 entered promiscuous mode [ 423.579360][T16004] device syzkaller0 entered promiscuous mode [ 423.893064][T16044] device wg2 left promiscuous mode [ 424.109221][T16048] device wg2 entered promiscuous mode [ 424.128156][T16049] device syzkaller0 entered promiscuous mode [ 427.490058][T16222] ªªªªªª™™: renamed from vlan0 [ 427.525835][T16221] device syzkaller0 entered promiscuous mode [ 429.876864][T16327] device sit0 entered promiscuous mode [ 429.967596][T16339] bridge0: port 3(syz_tun) entered disabled state [ 429.974296][T16339] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.981393][T16339] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.997865][T16339] device bridge0 left promiscuous mode [ 430.007826][T16339] device syz_tun left promiscuous mode [ 430.091060][T16339] bridge0: port 3(syz_tun) entered disabled state [ 430.157006][T16339] device bridge_slave_1 left promiscuous mode [ 430.163467][T16339] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.178900][T16339] device bridge_slave_0 left promiscuous mode [ 430.185482][T16339] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.146545][T16452] GPL: port 1(dummy0) entered blocking state [ 431.157517][T16452] GPL: port 1(dummy0) entered disabled state [ 431.172860][T16452] device dummy0 entered promiscuous mode [ 431.195482][T16443] device wg2 left promiscuous mode [ 431.229937][T16457] device wg2 entered promiscuous mode [ 431.290799][ T24] audit: type=1400 audit(1769377923.199:170): avc: denied { attach_queue } for pid=16467 comm="syz.4.4709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 431.801956][T16482] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.816648][T16482] device bridge_slave_1 left promiscuous mode [ 431.880200][T16482] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.973445][T16482] device bridge_slave_0 left promiscuous mode [ 432.054875][T16482] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.301116][T16501] device sit0 left promiscuous mode [ 433.202652][T16516] device sit0 entered promiscuous mode [ 436.537719][T16608] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.544912][T16608] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.552499][T16608] device bridge_slave_0 entered promiscuous mode [ 436.559568][T16608] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.566962][T16608] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.574657][T16608] device bridge_slave_1 entered promiscuous mode [ 436.764107][T16645] device syzkaller0 entered promiscuous mode [ 436.780747][T16645] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 436.921443][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 436.932657][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.953567][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 436.972654][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 436.981020][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.988093][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.997443][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 437.005984][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 437.014612][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.021671][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.029437][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 437.037947][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 437.193069][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 437.200808][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 437.223663][T16608] device veth0_vlan entered promiscuous mode [ 437.252379][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 437.260567][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 437.268387][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 437.284262][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 437.293984][T16608] device veth1_macvtap entered promiscuous mode [ 437.358109][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 437.366895][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 437.457927][T16664] device pim6reg1 entered promiscuous mode [ 439.032438][T16761] syz.2.4794[16761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.032485][T16761] syz.2.4794[16761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.581683][T16804] device sit0 left promiscuous mode [ 440.248797][T16807] device sit0 entered promiscuous mode [ 441.156955][T16820] device sit0 left promiscuous mode [ 443.635964][T16892] device syzkaller0 entered promiscuous mode [ 444.252736][T16926] syzkaller1: tun_chr_ioctl cmd 21731 [ 444.277950][T16920] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 447.457643][T16984] device wg2 left promiscuous mode [ 447.653346][T16980] device wg2 entered promiscuous mode [ 449.282607][T17032] device syzkaller0 entered promiscuous mode [ 451.763797][T17089] device sit0 entered promiscuous mode [ 451.804772][T17096] device syzkaller0 entered promiscuous mode [ 451.995567][T17098] device sit0 left promiscuous mode [ 452.389898][T17106] device sit0 left promiscuous mode [ 452.507850][T17111] device sit0 entered promiscuous mode [ 453.005345][T17106] device sit0 entered promiscuous mode [ 455.214563][T17183] device wg2 left promiscuous mode [ 459.633548][T17267] device syzkaller0 entered promiscuous mode [ 462.232937][T17326] device syzkaller0 entered promiscuous mode [ 463.284807][T17341] device syzkaller0 entered promiscuous mode [ 463.801450][T17380] device sit0 left promiscuous mode [ 464.068392][T17380] device sit0 entered promiscuous mode [ 464.371035][T17406] ÿÿÿÿÿÿ: renamed from vlan1 [ 464.835954][T17442] device sit0 left promiscuous mode [ 465.639883][T17442] device sit0 entered promiscuous mode [ 466.671388][T17499] device sit0 left promiscuous mode [ 467.201300][T17504] device sit0 entered promiscuous mode [ 468.774521][T17545] device sit0 entered promiscuous mode [ 469.128179][T17571] device veth0_vlan left promiscuous mode [ 469.140912][T17571] device veth0_vlan entered promiscuous mode [ 469.199150][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 469.212600][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 469.220292][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 469.390073][T17575] : renamed from bond_slave_0 [ 469.959026][T17609] device sit0 left promiscuous mode [ 470.155353][T17606] cgroup: fork rejected by pids controller in /syz2 [ 470.404318][T17609] device sit0 entered promiscuous mode [ 471.381205][T17757] device pim6reg1 entered promiscuous mode [ 471.855053][T17760] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.040629][T17760] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.122405][T17760] device bridge_slave_0 entered promiscuous mode [ 472.212885][T17760] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.246160][T17760] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.253920][T17760] device bridge_slave_1 entered promiscuous mode [ 472.632172][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 472.682151][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 472.755567][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 472.818524][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 472.915054][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.922144][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.968092][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 473.022570][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.041304][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.048379][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.069309][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 473.078176][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 473.096673][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 473.177828][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 473.204374][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 473.296493][T17760] device veth0_vlan entered promiscuous mode [ 473.358719][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 473.394972][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.481219][T17760] device veth1_macvtap entered promiscuous mode [ 473.542360][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.566119][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.612500][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 473.625335][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 473.642137][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 473.649991][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 473.688492][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 473.705815][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 473.815256][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 473.874210][ T297] device bridge_slave_1 left promiscuous mode [ 473.911239][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.925274][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.977850][ T297] device veth1_macvtap left promiscuous mode [ 473.989198][ T297] device veth0_vlan left promiscuous mode [ 476.102955][T17906] syz.4.5083[17906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.103008][T17906] syz.4.5083[17906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.383820][T17906] device veth0_vlan left promiscuous mode [ 476.513208][T17906] device veth0_vlan entered promiscuous mode [ 476.525995][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 476.537582][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 476.559630][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 476.674584][T17938] -: renamed from syzkaller0 [ 477.498340][T17984] device veth0_vlan left promiscuous mode [ 477.670783][T17984] device veth0_vlan entered promiscuous mode [ 478.012954][T18023] device syzkaller0 entered promiscuous mode [ 478.031331][T18030] FAULT_INJECTION: forcing a failure. [ 478.031331][T18030] name failslab, interval 1, probability 0, space 0, times 0 [ 478.044510][T18030] CPU: 1 PID: 18030 Comm: syz.4.5123 Tainted: G W syzkaller #0 [ 478.053351][T18030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 478.063477][T18030] Call Trace: [ 478.066757][T18030] __dump_stack+0x21/0x24 [ 478.071071][T18030] dump_stack_lvl+0x1a7/0x208 [ 478.075723][T18030] ? thaw_kernel_threads+0x220/0x220 [ 478.081173][T18030] ? locks_remove_file+0x369/0xfc0 [ 478.086275][T18030] ? show_regs_print_info+0x18/0x18 [ 478.091461][T18030] ? kasan_save_stack+0x49/0x60 [ 478.096292][T18030] ? kasan_record_aux_stack+0xe/0x10 [ 478.101644][T18030] ? task_work_add+0x27/0x1e0 [ 478.106299][T18030] dump_stack+0x15/0x1c [ 478.110433][T18030] should_fail+0x3c1/0x510 [ 478.114838][T18030] ? bpf_prog_array_alloc+0x41/0x60 [ 478.120098][T18030] __should_failslab+0xa4/0xe0 [ 478.124836][T18030] should_failslab+0x9/0x20 [ 478.129410][T18030] __kmalloc+0x60/0x330 [ 478.133540][T18030] bpf_prog_array_alloc+0x41/0x60 [ 478.138782][T18030] bpf_netns_link_release+0x316/0x5f0 [ 478.144138][T18030] ? radix_tree_delete_item+0x257/0x360 [ 478.149663][T18030] bpf_link_put+0x1f6/0x280 [ 478.154231][T18030] ? bpf_prog_uncharge_memlock+0xc0/0xc0 [ 478.159842][T18030] bpf_link_release+0x3b/0x40 [ 478.164504][T18030] __fput+0x2fb/0x770 [ 478.168462][T18030] ____fput+0x15/0x20 [ 478.172420][T18030] task_work_run+0x127/0x190 [ 478.176987][T18030] exit_to_user_mode_loop+0xcb/0xe0 [ 478.182169][T18030] exit_to_user_mode_prepare+0x76/0xa0 [ 478.187692][T18030] syscall_exit_to_user_mode+0x1d/0x40 [ 478.193126][T18030] do_syscall_64+0x3d/0x40 [ 478.197518][T18030] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 478.203388][T18030] RIP: 0033:0x7fecaf23acb9 [ 478.207794][T18030] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 478.227639][T18030] RSP: 002b:00007fecadc97028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 478.236027][T18030] RAX: 0000000000000000 RBX: 00007fecaf4b5fa0 RCX: 00007fecaf23acb9 [ 478.243973][T18030] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 478.251920][T18030] RBP: 00007fecadc97090 R08: 0000000000000000 R09: 0000000000000000 [ 478.259870][T18030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 478.267823][T18030] R13: 00007fecaf4b6038 R14: 00007fecaf4b5fa0 R15: 00007ffe2516b178 [ 478.277641][ C1] general protection fault, probably for non-canonical address 0xdffffc000000004e: 0000 [#1] PREEMPT SMP KASAN [ 478.289613][ C1] KASAN: null-ptr-deref in range [0x0000000000000270-0x0000000000000277] [ 478.298030][ C1] CPU: 1 PID: 4236 Comm: kworker/1:23 Tainted: G W syzkaller #0 [ 478.307465][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 478.317593][ C1] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 478.323645][ C1] RIP: 0010:__udp6_lib_lookup+0x5c6/0x860 [ 478.329588][ C1] Code: 3c 08 00 74 08 4c 89 ef e8 17 4f 9c fd 4d 8b 6d 00 b8 70 02 00 00 49 01 c5 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 ec 4e 9c fd 49 8b 5d 00 e8 13 7c 7a [ 478.349175][ C1] RSP: 0018:ffffc90000170720 EFLAGS: 00010206 [ 478.355220][ C1] RAX: 000000000000004e RBX: ffffe8ffffd3a438 RCX: dffffc0000000000 [ 478.363343][ C1] RDX: 0000000080000102 RSI: ffffffff865ea838 RDI: ffffc900001707c0 [ 478.371579][ C1] RBP: ffffc90000170878 R08: ffffffff86e78048 R09: ffffffff86e78058 [ 478.379665][ C1] R10: ffffffff86e7805c R11: ffffffff86e78043 R12: ffff8881002bda58 [ 478.388011][ C1] R13: 0000000000000270 R14: 0000000000000000 R15: 0000000000000001 [ 478.396145][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 478.405142][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 478.411852][ C1] CR2: 00007fecaf1106c0 CR3: 0000000116029000 CR4: 00000000003506a0 [ 478.419818][ C1] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 478.427939][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 478.435884][ C1] Call Trace: [ 478.439142][ C1] [ 478.441984][ C1] ? udp_v6_rehash+0x90/0x90 [ 478.446555][ C1] ? ip6t_do_table+0x1405/0x15b0 [ 478.451560][ C1] ? _raw_read_unlock+0x25/0x40 [ 478.456390][ C1] ? raw6_local_deliver+0x5a9/0xee0 [ 478.461573][ C1] __udp6_lib_lookup_skb+0xee/0x130 [ 478.466749][ C1] __udp6_lib_rcv+0x765/0xe30 [ 478.471531][ C1] udpv6_rcv+0x21/0x30 [ 478.475602][ C1] ip6_protocol_deliver_rcu+0x878/0x1340 [ 478.481219][ C1] ip6_input+0xda/0x210 [ 478.485358][ C1] ? ip6_protocol_deliver_rcu+0x1340/0x1340 [ 478.491316][ C1] ? ip6_input+0x210/0x210 [ 478.495711][ C1] ? ip6table_raw_hook+0x6a/0x80 [ 478.500709][ C1] ? ip6table_mangle_net_exit+0x80/0x80 [ 478.506354][ C1] ip6_rcv_finish+0x18c/0x360 [ 478.511095][ C1] ipv6_rcv+0xf0/0x230 [ 478.515165][ C1] ? ip6_rcv_finish+0x360/0x360 [ 478.519999][ C1] ? refcount_add+0x80/0x80 [ 478.524494][ C1] ? __kasan_check_write+0x14/0x20 [ 478.529596][ C1] ? ip6_rcv_finish+0x360/0x360 [ 478.534426][ C1] __netif_receive_skb+0xc8/0x280 [ 478.539436][ C1] process_backlog+0x368/0x600 [ 478.544178][ C1] net_rx_action+0x44d/0xe00 [ 478.548743][ C1] ? net_tx_action+0x530/0x530 [ 478.553602][ C1] __do_softirq+0x255/0x563 [ 478.558080][ C1] asm_call_irq_on_stack+0xf/0x20 [ 478.563075][ C1] [ 478.565990][ C1] do_softirq_own_stack+0x60/0x80 [ 478.570988][ C1] do_softirq+0xb0/0xf0 [ 478.575117][ C1] ? __local_bh_enable_ip+0x80/0x80 [ 478.580291][ C1] __local_bh_enable_ip+0x70/0x80 [ 478.585287][ C1] _raw_read_unlock_bh+0x29/0x30 [ 478.590209][ C1] wg_socket_send_skb_to_peer+0x172/0x1d0 [ 478.595903][ C1] wg_packet_tx_worker+0x1b8/0x450 [ 478.600987][ C1] process_one_work+0x6e1/0xba0 [ 478.605819][ C1] worker_thread+0xa6a/0x13c0 [ 478.610505][ C1] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 478.616041][ C1] ? __kasan_check_read+0x11/0x20 [ 478.621061][ C1] kthread+0x346/0x3d0 [ 478.625108][ C1] ? worker_clr_flags+0x190/0x190 [ 478.630110][ C1] ? kthread_blkcg+0xd0/0xd0 [ 478.634694][ C1] ret_from_fork+0x1f/0x30 [ 478.639176][ C1] Modules linked in: [ 478.643137][ C1] ---[ end trace 8c639f862c3b641f ]--- [ 478.645004][ T24] audit: type=1400 audit(1769377970.559:171): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 478.648719][ C1] RIP: 0010:__udp6_lib_lookup+0x5c6/0x860 [ 478.672317][ T24] audit: type=1400 audit(1769377970.559:172): avc: denied { search } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.676218][ C1] Code: 3c 08 00 74 08 4c 89 ef e8 17 4f 9c fd 4d 8b 6d 00 b8 70 02 00 00 49 01 c5 4c 89 e8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <80> 3c 08 00 74 08 4c 89 ef e8 ec 4e 9c fd 49 8b 5d 00 e8 13 7c 7a [ 478.702062][ T24] audit: type=1400 audit(1769377970.559:173): avc: denied { write } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 478.717166][ C1] RSP: 0018:ffffc90000170720 EFLAGS: 00010206 [ 478.717177][ C1] RAX: 000000000000004e RBX: ffffe8ffffd3a438 RCX: dffffc0000000000 [ 478.717183][ C1] RDX: 0000000080000102 RSI: ffffffff865ea838 RDI: ffffc900001707c0 [ 478.717190][ C1] RBP: ffffc90000170878 R08: ffffffff86e78048 R09: ffffffff86e78058 [ 478.717197][ C1] R10: ffffffff86e7805c R11: ffffffff86e78043 R12: ffff8881002bda58 [ 478.717202][ C1] R13: 0000000000000270 R14: 0000000000000000 R15: 0000000000000001 [ 478.717209][ C1] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 478.717220][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 478.717226][ C1] CR2: 00007fecaf1106c0 CR3: 0000000116029000 CR4: 00000000003506a0 [ 478.717235][ C1] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 478.717242][ C1] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 478.717259][ C1] Kernel panic - not syncing: Fatal exception in interrupt [ 478.717657][ C1] Kernel Offset: disabled [ 478.835875][ C1] Rebooting in 86400 seconds..