last executing test programs: 3.941492616s ago: executing program 4 (id=6591): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800}, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x5, 0x0, 0x0, 0x0, 0xf, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x4}, 0x8, 0x1, 0x0, 0x6, 0x3, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x541b, 0x2000fcc6) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.971800297s ago: executing program 4 (id=6595): r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r0, &(0x7f0000000140)="d07e80e5622cf3492196285ca7179361486c77cfbe7875e9b7d719b75822f56e519d195d534048806da92bc1fe0a28fc1dbb8ebbdec66350bcf88fef36c5d2bc5a962e82bc4e11dd4dc1ffeaf421e1945431e38f44b9a94602ace332329cdb78d56f91fac2920614", &(0x7f00000001c0)=""/128}, 0x20) r1 = perf_event_open(&(0x7f00000010c0)={0x5, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8b282, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xc, 0x7}, 0x410, 0x8, 0x10000, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000600)={0x0, r0}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x3, [@volatile={0x3, 0x0, 0x0, 0x9, 0x1}, @typedef={0xd, 0x0, 0x0, 0x8, 0x4}, @float={0x10, 0x0, 0x0, 0x10, 0x4}, @typedef={0x4, 0x0, 0x0, 0x8, 0x3}, @type_tag={0x7}, @union={0xe, 0x4, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8}, {0x9, 0x5, 0x800}, {0xbb, 0x5, 0x7}, {0xd, 0x3, 0x6}]}, @const={0x9, 0x0, 0x0, 0xa, 0x3}]}, {0x0, [0x30]}}, &(0x7f0000000580)=""/16, 0x9f, 0x10, 0x1, 0x2, 0x10000, @value=r2}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/user\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0xa, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x9}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/159, 0x4e, 0x9f, 0x1}, 0x28) ioctl$TUNSETIFF(r3, 0xb701, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f00000002c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r6}, &(0x7f0000000080), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r6}, 0xc) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 2.86457406s ago: executing program 2 (id=6597): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000002c0)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x20, &(0x7f00000004c0)={&(0x7f0000000380)=""/178, 0xb2, 0x0, &(0x7f0000000440)=""/69, 0x45}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000540)=ANY=[@ANYBLOB="180000d56cffff04010000000000001718110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b50902000f0000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018200000", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b7010000080000004608f0ff76000000bf9800000000000079080000000000008500000005000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.623041268s ago: executing program 2 (id=6598): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000003000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x97, &(0x7f00000001c0)=""/151}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, &(0x7f00000000c0)='\x00', 0x0, 0x2}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000002c0), 0x10000, r2, 0x0, 0x1c000000007400}, 0x38) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x4004743d, 0x110e22fff6) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r3}, 0x8) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000040)) close(r0) 2.034092346s ago: executing program 2 (id=6605): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20110, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x3, 0x3129b7164949479, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20110, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x3, 0x0, 0x3, 0x0, 0x10000000000, 0x8808, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={0x0, 0x6}, 0x4108, 0x3, 0x3, 0x3129b7164949479, 0x7, 0xffffffff, 0x802, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x19) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') (async) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 1.999666447s ago: executing program 4 (id=6607): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc0000000000000048ea5e11212ffa43f39b8625c4f98cfcbaed29471aa2c871928c44b01e01041f18122a50c96de281c007ce86c5b4ba10b64577cde3146bc943c78d75769201c95cfcf2549a8046033aa07451b31c6761b744911c62c2c0c264d9ecbdf4784a6414de960ca85ff45f982dc17015bbbb1f8730160bf55c576a28d6bee8d260e20b0a39c924d9fa0b190fec12a62e2f76adc75cd5b47d70dc1399619308c1523851424babbd72714401ad30a3480cd2f60b43575550f5b7192a924238a99b5667239858f7638410fc7c854e07bdb9", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x100005, 0xb, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xf4240, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0900ffffffff00000000000000001b0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000500"], 0x50) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0900ffffffff00000000000000001b0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000500"], 0x50) 1.954824679s ago: executing program 1 (id=6608): r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400000006}, 0xb4, 0x1000000000000, 0x1, 0x8, 0x0, 0x4, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) socketpair(0x1, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@timestamping={{0x14}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) perf_event_open$cgroup(&(0x7f0000000440)={0x2, 0x80, 0x5e, 0x3, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x82508, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x68a, 0x53}, 0x102000, 0x8b, 0x7fffffff, 0x0, 0x40, 0x7, 0xffff, 0x0, 0xfffffffe}, r2, 0xa, r1, 0x9) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x431, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f00000002c0), &(0x7f0000000280)}, 0xfffffffffffffca0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000680)=""/151}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850020000000000018100000", @ANYRES32, @ANYBLOB="1700000000000000950000000000000045"], 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='@\'{-!:&.^\x00') ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r5}, &(0x7f0000000740), &(0x7f0000000780)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="03000000040000000400"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r9}, &(0x7f0000000280), &(0x7f0000000240)=r7}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f00000000c0)=r10, 0x4) 1.938426329s ago: executing program 4 (id=6610): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x414, 0x2000000, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1a9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x58, &(0x7f00000001c0)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r0) 1.780851884s ago: executing program 0 (id=6612): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x14, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000240)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001f40)={0xffffffffffffffff, 0xe0, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000001c80)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001cc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf9, &(0x7f0000001d00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000001d80), &(0x7f0000001dc0), 0x8, 0x97, 0x8, 0x8, &(0x7f0000001e00)}}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002000)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002100)={0x1f, 0x5, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x6b}, @cb_func={0x18, 0x1}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x7}], &(0x7f00000001c0)='GPL\x00', 0x86fd, 0x1000, &(0x7f0000000c40)=""/4096, 0x41100, 0x0, '\x00', r6, @fallback=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000001f80)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001fc0)={0x3, 0xf, 0x5, 0x6}, 0x10, 0xffffffffffffffff, r5, 0x3, &(0x7f0000002080)=[r1, r0, r3, r0, r3, r7, r0, r4, r0], &(0x7f00000020c0)=[{0x4, 0x2, 0xe, 0xa}, {0x5, 0x3, 0x1, 0xc}, {0x0, 0x4, 0xc, 0x5}], 0x10, 0xfff}, 0x94) sendmsg$inet(r2, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800000000000000000000020000008510"], 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000851000000c0000008500000000000000851000000000000018100000", @ANYRES32, @ANYBLOB="0000000000007b2d55bd4a24296d000085100000faffffff9500000000000000"], &(0x7f0000000080)='GPL\x00'}, 0x80) 1.741787975s ago: executing program 1 (id=6613): bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) (async, rerun: 32) r0 = perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x7ea5, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b20fd75, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r1 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r1, r2, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000020000000000000000000009"], 0x0, 0x4e}, 0x28) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async, rerun: 64) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) r4 = openat$cgroup_procs(r3, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, 0x0, 0x0) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f00000002c0)={'syzkaller0\x00', @link_local}) (async) write$cgroup_subtree(r6, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22ff89"], 0xffbf) (async) r8 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000380), 0x12) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r9) (async, rerun: 32) close(r9) (async, rerun: 32) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) 1.626829609s ago: executing program 0 (id=6615): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x9, 0x1, 0xb0}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x80) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x10, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xc5bf) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x31, 0x0, &(0x7f0000000500)="2077e7dedda60fb505e6394d02d95ae1583b0f97782b80bb0e15fd51433a497e67474911a70c77e53c2086485135099591", 0x0, 0x0, 0x0, 0xfffffffd}, 0x50) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x3) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_type(r2, &(0x7f0000001140), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000001100), 0x9) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r4 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='cpu<=0||!') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x4, &(0x7f0000002240)=ANY=[@ANYBLOB="18000000000000000000000000000000711814000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.484441873s ago: executing program 1 (id=6616): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_tracing={0x1a, 0x17, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000010000000000000030000000950000000000000085100000fcffffff1867000000000000000000000000004018000000fbffffff00000000070000002c4308000000000035a5f0ff0400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000c0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000183800000500000000000000000000000db5f4fff0ffffff9500000000000000"], &(0x7f0000000680)='syzkaller\x00', 0x8, 0x7f, &(0x7f00000006c0)=""/127, 0x41000, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x4, 0x6, 0x9, 0xfffffffb}, 0x10, 0x87cf, 0xffffffffffffffff, 0x1, &(0x7f0000000ac0)=[0xffffffffffffffff], &(0x7f0000000b00)=[{0x0, 0x5, 0x0, 0x5}], 0x10, 0x7}, 0x94) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$LINK_DETACH(0x22, &(0x7f00000014c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="04000000e0000000288b00004000000000000000", @ANYRES32=0x1, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="02000000040000000500"/28], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0xffffffffffffffb1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001280)={r4, &(0x7f0000001200)="817df4b6bdf0", &(0x7f0000001240)=""/34}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=ANY=[@ANYRESHEX=r3, @ANYRES8=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.[h', @ANYRES16], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1900000004000000080000000800000004000100", @ANYRES32=r4, @ANYBLOB="00000005000000000000000000000000000000004372945d74d712dfc4f176057965c781937f9f89f0760d85bbef0176211bb4be20dc2e10eccc77cee8dca168d0f98fbe93f3be53e075183777a59d", @ANYRES32=0x0, @ANYBLOB="fd3b5c690e1ad9bf580966b47096e0fc9721ea047c36c0b945", @ANYBLOB='\x00'/24, @ANYRES32=r0, @ANYRES16=r2], 0x50) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x60, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000c, 0x4000000000000007}, 0x571a, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2f, 0x0, 0x8}, 0x0, 0x20000007, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x11, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="00000000000000000000000000200000000000001050064313cb1dad3a616f8f8c954b9482e6c068016f17fed0db0a9d4f907809c190f2ea802a23826d4487b47853a204a9987fa2a87a82ff8985a4c1a3c713441b0528c3e9734049d5d258dcdb811cb2312da047614cd4b99bcb66c50bb5e799e87e37f976f57775d8b287a4c4b09d61d21da30b2c6212c7018611a136dd3cc94b59c42ec9b7d2a3db7528bd4ce091d69dd9bb73e84b084cac3c1de91350be5dfa15fa381c7ae5eb68e8e27f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r8, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f0000000100)=r10) write$cgroup_devices(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000001440)={0x4, 0x80, 0x3, 0x80, 0x0, 0x81, 0x0, 0x8, 0x200, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext, 0x100, 0x31e, 0x6, 0x8, 0x6, 0x39f1, 0x9, 0x0, 0xa8a, 0x0, 0x4}) 1.156740544s ago: executing program 0 (id=6617): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="05000000050000000200000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000380)}, 0x20) close(0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b000000070000000100010009000000010000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10004000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0006000000000000000000000000000000004100"/29], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r2}, &(0x7f0000000340), &(0x7f0000000640)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r7}, &(0x7f0000000280), &(0x7f0000000240)=r4}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r8, 0x4) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000061c0)=ANY=[@ANYBLOB="180000000000000000000000fdffff1f180100002020692500000000002020207b1ae8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001000100850000000600000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000006000000850000008600000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r12, 0x38, 0xe, 0x0, &(0x7f0000000240)="00000000000800005bdfa092873f", 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r10}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r9) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r13, &(0x7f0000003040)={0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x68}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="b40800000000000073119f00000000008510000002000000b7000000000000009500c20000000000950000120000000079c1221a5629f87281ed8dd57a36c4bf2acc4811c8ac0ea254f2"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) 1.058903717s ago: executing program 2 (id=6618): bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041800f3fe8000000000000000000000000000aafe8000000000000227bfa7b09303960e2f81"], 0xfdef) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r3) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x66) (async) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c77"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000004c0)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x66) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="b40800000000000073113700000000008510000002000000b7000000000000009500c200000000009500e51200000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x64, '\x00', 0x0, @cgroup_skb=0x1, r0}, 0x94) 1.048262307s ago: executing program 0 (id=6619): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8983, &(0x7f0000000080)) 990.983219ms ago: executing program 2 (id=6620): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = gettid() syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/time_for_children\x00') (async) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/time_for_children\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cgroup.freeze\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'veth0_to_bond\x00', 0x1000}) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000140)) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000200)={0x9, &(0x7f0000000180)=[{0xf, 0x0, 0x1, 0x5}, {0xff, 0x2, 0x2, 0x4}, {0x8001, 0xf2, 0x8}, {0x46c, 0x6, 0x82, 0x5}, {0xb, 0x3, 0xe9, 0x9}, {0x1, 0x6, 0xd, 0x2}, {0x7, 0x5, 0x5, 0x754c}, {0xa, 0xff, 0x3, 0xb8e}, {0x4413, 0x7, 0x7, 0x1}]}) recvmsg$unix(r3, &(0x7f0000000480)={&(0x7f0000000240), 0x6e, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/111, 0x6f}, {&(0x7f0000000340)=""/90, 0x5a}], 0x2, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}, 0x10040) write$cgroup_pid(r3, &(0x7f00000004c0)=r5, 0x12) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000500)=0x27c) (async) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000500)=0x27c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000005c0)) write$cgroup_pid(r3, &(0x7f0000000600)=r4, 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0xf, 0xa, 0x3, &(0x7f0000000680)) (async) socketpair(0xf, 0xa, 0x3, &(0x7f0000000680)={0xffffffffffffffff}) r9 = openat$cgroup_ro(r0, &(0x7f00000006c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r9) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000740)={0x6, &(0x7f0000000700)=[{0xb, 0x8, 0xd, 0x7}, {0x8, 0x9, 0x9}, {0x8000, 0xe6, 0x5}, {0x8, 0xff, 0xe, 0x9}, {0x2, 0x0, 0x7, 0x26}, {0xe00, 0x4, 0xf9, 0x6}]}) (async) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000740)={0x6, &(0x7f0000000700)=[{0xb, 0x8, 0xd, 0x7}, {0x8, 0x9, 0x9}, {0x8000, 0xe6, 0x5}, {0x8, 0xff, 0xe, 0x9}, {0x2, 0x0, 0x7, 0x26}, {0xe00, 0x4, 0xf9, 0x6}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x100, 0x8}, 0xc) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0x100, 0x8}, 0xc) sendmsg$unix(r7, &(0x7f0000001b00)={&(0x7f00000007c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000000840)="c1649be8adb578bbd69bff6cfe70f283208b20915982570e3d28ff9c7abd6a625dc8e7a69a9578d4a940ee3d2c83b7d99404225740c3359453665ec8f85333811333ebbea138cac4e0781dd54fbfaad6a8c54e495b990540e19f190421423d11e5ee9a7ea46f8b028474f0008cd612eceacd9e8b85be49fa2f0f8a2de4dd04642cef169022a573c9ada2b4919cb746be2af34966d66468d3403d6925504fb4d2306684d4de247dfa24a6af309607271af66b5ed6d62856e15664a797b4a4787eb2341f66690d45734473f4baefb12f9ef2f730d827a0bc1ec19df49fcc48dd54a0ea03c6b7", 0xe5}, {&(0x7f0000000940)="fa0a07b64fe8dfcec54a517d6b295b6a2d74eef488e2b44907c449e0b3ce5e3c", 0x20}, {&(0x7f0000000980)="97d55cf527a4a63f4bddb2fd2e764de80c6c556d7c6dfee7", 0x18}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000019c0)="3abe502117bd3388f3d50246549a7809af6ee13a316711caa0cafc5bcea5b6c6e515760b98e7319644f2f91267545a69a6e45d3269377cefe6d2715774c648cb81a365f2d13c6933eb69883ec16f5a59e0455ce3db4527a1bff3f0b3fea30c0485b2b5e3ab12d5a5fffdc94ad56c9f2cce81e53ad68a9a45c7e9017fe91185d7", 0x80}, {&(0x7f0000001a40)="bf448defab3cf3ab59747166a25d96", 0xf}], 0x6, 0x0, 0x0, 0x4800}, 0xc000) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f0000001b40)=r9) (async) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f0000001b40)=r9) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001c80)={@fallback=r8, 0x8, 0x1, 0xfffffffc, &(0x7f0000001b80)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000001bc0)=[0x0], &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000001d00)={r9}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001cc0)={@fallback=r3, r3, 0x25, 0x200c, r3, @value=r12, @void, @void, @void, r11}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000001d40)='./cgroup/syz0\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000001d40)='./cgroup/syz0\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000001dc0)=@generic={&(0x7f0000001d80)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001dc0)=@generic={&(0x7f0000001d80)='./file0\x00', 0x0, 0x18}, 0x18) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000001e00)=r3, 0x4) write$cgroup_int(r10, &(0x7f0000001e40)=0x1, 0x12) recvmsg$unix(r6, &(0x7f0000002080)={&(0x7f0000001e80), 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001f00)=""/103, 0x67}], 0x1, &(0x7f0000001fc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}, 0x10020) (async) recvmsg$unix(r6, &(0x7f0000002080)={&(0x7f0000001e80), 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001f00)=""/103, 0x67}], 0x1, &(0x7f0000001fc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xb0}, 0x10020) 770.994636ms ago: executing program 3 (id=6621): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791210000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 734.375457ms ago: executing program 3 (id=6622): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x19, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000061114c00000000008500000063000000950000f9ffffff00"], &(0x7f0000000080)='syzkaller\x00', 0x5, 0xb2, &(0x7f000000cf3d)=""/178, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xb}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x10001, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x2}, 0x50) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0xc, r0}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r0, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], 0x0, 0xed, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000700)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r0}, 0x20) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@generic={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_ext={0x1c, 0x14, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_fd={0x18, 0x5, 0x1, 0x0, r3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @ldst={0x3, 0x1, 0x4, 0xd, 0x1, 0xfffffffffffffd7c, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='syzkaller\x00', 0x2, 0x2a, &(0x7f00000002c0)=""/42, 0x40f00, 0x10, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x4, 0xa, 0x9, 0x7}, 0x10, 0x27cf5, 0xffffffffffffffff, 0x1, &(0x7f00000007c0)=[r5, r6], &(0x7f0000000800)=[{0x4, 0x5, 0x8, 0x11}], 0x10, 0x2}, 0x94) 687.874118ms ago: executing program 3 (id=6623): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0xffffffff, 0x80800000, 0x3, 0x24008, r0, 0x5, '\x00', r1, r2, 0x1, 0x5, 0x0, 0x8}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100011, 0x0, 0x0, 0x0, 0x0, 0xffff8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={0xffffffffffffffff, 0x27, 0xd, 0x0, &(0x7f0000000000)="f8ad1dcc02cb29dcc800320081", 0x0, 0x4002, 0xf2ffffff, 0x0, 0x35, 0x0, 0x0}, 0x3f) write$cgroup_subtree(r6, &(0x7f0000000000), 0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000b60100007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000013da0000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 542.931243ms ago: executing program 3 (id=6624): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1946}, 0x24, 0x0, 0x0, 0x4, 0x3fe, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xeffe) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000280)={&(0x7f0000000080), 0x6e, &(0x7f0000000140)=[{&(0x7f0000000100)=""/43, 0x2b}], 0x1}, 0x40002000) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x89a2, &(0x7f0000000040)={'bridge0\x00', @random="0400"}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000730136000000000095000000000100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="000006aec9af0800000000000000000000000004", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000003000000020000001200000000000000", @ANYRES32, @ANYRES32=r4, @ANYRES64=r3, @ANYRES8=r0, @ANYBLOB="00e7bde8ffffffffffffff000000000000000000000000e60000000000d657"], 0x50) (async) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="b4020000e7ffff1f61118c0000000000850000001c00000095000000000000005af935427d63fb392007c499217ea6de7a68826d24de6af0bf2f131fb5a0f77bd5e8725c309cb28ef469e1bdd7f5d38723bfe2c7bd22d3928c63b99287a344b083ee232fd792fd2f84801e4bacf9794169238a03a2457a5643f6485b6624189975a3bf2ca9a5b49524f60a063a9d484d"], &(0x7f0000000380)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x41, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x820a4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0xc052, 0x200000000000c8, 0x2, 0x9, 0xfffffffffffffff8, 0x80000000, 0xfffb, 0x0, 0xfffffffc, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x12, 0x104, 0x8, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r5, &(0x7f0000000200), 0x0}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, 0x0, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x94) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 440.910646ms ago: executing program 3 (id=6625): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r3, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000300)=r4}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4, r2}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x5, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611214000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a000000030000000400000008"], 0x50) close(0x3) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f0000000040)=[{0xb1, 0x0, 0x1, 0x20}, {0x5, 0xd, 0x4, 0x1}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@cgroup, 0xb, 0x0, 0x80cd, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002840)={0x6, 0x10, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x50000000}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000840)='GPL\x00', 0x9, 0x1000, &(0x7f0000001740)=""/4096, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000002740)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000002780)={0x1, 0x10, 0xc4e8, 0xc5}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000027c0)=[r5, r0, 0xffffffffffffffff, r2], &(0x7f0000002800)=[{0x0, 0x1, 0x7}, {0x1, 0x1, 0xd, 0x9}, {0x1, 0x2, 0xc, 0xa}, {0x3, 0x3, 0xd, 0x5}], 0x10, 0x6}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000680)={@cgroup=r3, r4, 0x12, 0x4, 0x0, @void, @value=r11, @void, @void, r10}, 0x20) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200fa00220000000800000001ea00008000000059446b5e7ed9b587c186160ad30d71a9f83d3f8181d1b1e2caae3ffe0d77032765d0f5ec8bca0d97f6fa7631e82ad56c5ce105b12b4aeaddfc339a5b35935e8edc446342a77d973ff4e3d9f42ef233c4377aa5d84bc360c981029babc95c94b12f37672d04df6fbaebe788f8127921fdf143cf6c3aca1dbab940dcd070", @ANYRES32, @ANYBLOB="0000000000000066dd2c624aa46ea01500000000", @ANYRES32=r8, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r12, &(0x7f0000000000), &(0x7f0000000040)=""/63}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xd, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000000000008500000090000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sock_ops=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 421.556747ms ago: executing program 1 (id=6626): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='cpu<-0||!') bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="000000410000000000000000000023425a27ac98497a1402006ef294d3000000000000394cb0dfdbec388248dfb4d6ab3199c43d0d63cdd88ee6818bd47659e5eba0ff11c39bcd7b7f19897e187664f53db547", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x5, 0x8, &(0x7f0000000280)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000001c0), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x34}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) close(r9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r10, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) 325.86697ms ago: executing program 4 (id=6627): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000bc0)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000980)=@raw=[@call={0x85, 0x0, 0x0, 0x6b}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @map_idx={0x18, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x98dd}}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @generic={0x6, 0x9, 0xf, 0x9}], &(0x7f0000000a40)='GPL\x00', 0x400, 0x2e, &(0x7f0000000a80)=""/46, 0x41100, 0x5, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0x10, 0x9, 0x5}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000b40)=[0x1, 0x1], &(0x7f0000000b80)=[{0x4, 0x1, 0x8, 0x5}], 0x10, 0xe11}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x4, 0x17, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000040850000001700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0xb, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x2, 0x8, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r2, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) (async) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x34}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x70) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000400000000000000020000001810100008000000186400000800000000000000ffff00009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x6c, '\x00', r5, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x5, 0x4, 0xffffffff, 0x2}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r3, r2, r2, r2, r2], &(0x7f0000000680)=[{0x5, 0x1, 0xd, 0x3}, {0x5, 0x1, 0x3}, {0x1, 0x4, 0xc, 0x1f0886d3432d6db5}, {0x3, 0x4, 0xf, 0xf}], 0x10, 0x7fff}, 0x94) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 246.963852ms ago: executing program 0 (id=6628): socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)=@o_path={&(0x7f00000006c0)='./file0\x00', 0x0, 0x4008, r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000740), &(0x7f0000000780)='%-5lx \x00'}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x84, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800, r4}, 0x38) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000940)={0x6, 0x8, &(0x7f0000000400)=@raw=[@alu={0x7, 0x1, 0xc, 0xd, 0x1, 0x8, 0xfffffffffffffff0}, @exit, @map_idx={0x18, 0x5, 0x5, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @exit, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}], &(0x7f0000000440)='GPL\x00', 0x1ff, 0xe3, &(0x7f0000000540)=""/227, 0x40f00, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x2, 0xc, 0x8d, 0x3}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000880)=[r2, r3, r4, r5, 0x1], &(0x7f00000008c0)=[{0x0, 0x4, 0x0, 0x6}, {0x4, 0x1, 0xf}, {0x576, 0x3, 0xb, 0x9}, {0x5, 0x3, 0x10, 0x6}, {0x5, 0x5, 0x7, 0x7}, {0x2, 0x5, 0xa, 0x7}, {0x4, 0x3, 0xf, 0x4}, {0x4, 0x2, 0x10, 0x6}], 0x10, 0x5}, 0x94) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x1, {0x4e23, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000180)="e79372d4e6039d705dbd03d341b67c8ddbe74182d722908b1851de9dd8574a4611aa3fca9a043bb1f7999875acc044fb745506136cddd75a337f7c3234695f2949693522249d5894b8b28f77187464374bb984d6d570264f8055218402df1a1280e04922af7791f6bdbb95757dfccd9b234819759e193b51fb0d34d11abadc27138a72328998a10e2213672e7ea37012fc314655c7bae4b55b3f5bd1abb5a3941872417173cf6b018e5d2fcc3b55bb6f7d93535f481d03a501c2e6851f9215cd7b77bebda30449f83e801180b97f95d5a2fa2b029bfafc14a1d778fb472f18934e061e03a5581a1e29f5048bcbee6a55dce6eb7db6a7", 0xf6}, {&(0x7f0000000280)="d066e3687c000a925f8c9c19a2b47739b625be0cd03f79a822ec8a7be04ef0dd14dfe69789ea26b7a40a66eb1ce3bd08693de2518b66c2f5483fceeb957e869e12792eaae1a9d9e9f5051bd0d5748fc4ac3cfb0879ff2d5077f1788e816ab1b4f027f84b442ad033588f52c6af73f358dc85fdde7775334df194857aedee6f7f7ca166860f68c09832dbf54a3afc284231b895c8bc5e463011046a7b44986a7904c60b81ad590802e76486e6426d72442fcfccd55ba383d2963da75247a0b43c74", 0xc1}], 0x2, 0x0, 0x0, 0x44}, 0xc800) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r6, 0x0, 0x20000000}, 0x20) 246.203942ms ago: executing program 0 (id=6629): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x88702, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x9410, 0x2000000, 0x0, 0x7, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x4, 0x0, 0x9b, 0xd4, 0x0, 0x0, 0x2010e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x4, @perf_config_ext={0xead6, 0x8c}, 0x806, 0xc8, 0x0, 0x4, 0x400, 0x0, 0x0, 0x0, 0x3, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="db871a15"], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40002100) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r6, 0x40047440, 0xf0ff1f00000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ffffffff0000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000800000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1bf8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x88) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="256e65cf537072696f20"], 0xa) write$cgroup_subtree(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="a234707520a69840151acc52fae42dae6fbd13ba71619d89a4a6764dc251f7732f56002c9a9633d5bf5512fae023bc9f8958f82b72cbd62a1ed8832f8c90e88a51ed35ded6c8"], 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x8f}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_tracing={0x1a, 0x28, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000a00000000000000ebbd6d0418110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000009500000000000000184500000600000000000000000000005a7600000000000018280000", @ANYRES32=r2, @ANYBLOB="00000000ffffff7f00000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000850000009500000018450000070000000000000000000000183a0000040000000000000000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000020000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000800)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x1a, r5, 0x8, &(0x7f0000000900)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x5, 0x8, 0x3}, 0x10, 0x16f83, 0xffffffffffffffff, 0x2, &(0x7f0000000d40)=[r5], &(0x7f0000000d80)=[{0x3, 0x2, 0xe, 0x6}, {0x2, 0x5, 0xe, 0x2}]}, 0x94) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) 240.194443ms ago: executing program 1 (id=6630): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800e54, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfff0000000000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000970000000000000046277c0b9d8cf3d4c8c68700b2e589c3a6762c7023cb4e027d0c51a33517de15c30e397dff31cd9bee1303fcde98b386efa90446ebc4d130496d0ba5f35b00b99671e354c63afd962958da93713f8b395223967659b5bf755835d91f969144be0f487ff65a93aecf0a1dc26de521a082e69a"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x8000, 0x40000, 0x8, 0x12150, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xf}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f00000003c0)={r1, r2}, 0xc) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r8}, &(0x7f0000000240), &(0x7f00000003c0)=r5}, 0x20) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) sendmsg$inet(r7, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x4400) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x8b}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) 203.541274ms ago: executing program 3 (id=6631): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'dummy0\x00', @random="7e33cc8e68b1"}) mkdir(0x0, 0x69) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_clone(0x20001000, &(0x7f0000000500), 0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000600)) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x945, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xf1, 0x8, 0x0, 0x0, 0x0, 0x8, 0xa1f94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x3, 0x0, 0xb, 0x2}, r4, 0xa, r3, 0x8) r5 = perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x89, 0xcf, 0xfb, 0xe, 0x0, 0x7, 0x30, 0xe, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x2, 0x41515ce3}, 0x13055, 0x3, 0xb, 0x7, 0x2, 0x2, 0x0, 0x0, 0x4, 0x0, 0x6}, r4, 0x4, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x81, 0x4, 0xf8, 0x81, 0x0, 0x3, 0x10400, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x8014, 0x3, 0x1, 0x3, 0x400, 0x2, 0x37, 0x0, 0x9}, r4, 0xb, r5, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3, 0x0, 0x0, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0xe9, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x15, 0x8, 0x40, 0x42, 0x1, 0x0, '\x00', r6}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xdf, 0x5, 0x5648, 0x9039, 0xffffffffffffffff, 0x100, '\x00', r6, 0xffffffffffffffff, 0x83, 0x0, 0x0, 0x8}, 0x50) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r7, 0x60, 0xfffffffffffffffc}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002440)={r2, 0xe0, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000002180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f00000021c0)=[0x0, 0x0, 0x0], &(0x7f0000002200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000002240)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000002280), &(0x7f00000022c0), 0x8, 0x84, 0x8, 0x8, &(0x7f0000002300)}}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002500)={{r1, 0xffffffffffffffff}, &(0x7f0000002480), &(0x7f00000024c0)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002580)={0xf, 0x11, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff9}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='GPL\x00', 0xfc000000, 0x1000, &(0x7f0000001140)=""/4096, 0x41000, 0x1, '\x00', r6, @fallback=0x23, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002140)={0x2, 0xe, 0x2, 0x1}, 0x10, r8, 0xffffffffffffffff, 0x0, &(0x7f0000002540)=[r1, r1, r1, 0x1, r9, r1, r10], 0x0, 0x10, 0x9}, 0x94) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x10}, 0x410, 0x2000001, 0x0, 0x8}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="25b096f681cd731c3f3a9badc4e3cf5edeae1f3b5082d7ab3a97c053df68744e7c7e24d0b59997bab4bccff8363b275de3510b0ebe4275d8d2f153395668e3d608e358fc2294263c03f8dc4f8bf194e4fde4600a2dec2f483a914e2fde0cbc344a2b9fc18dd198966045a6d4d4eb8571e8bb69e6724e37fcbaa6e4c64050b47256b9bb17f5c0aa5101e015ecdcb62fec46fc0205512535", 0xfed7}, {&(0x7f0000000280)="d3a88bea5916e313729a3989393caca70c74cd74e62e524bdd37be131ad827f911027e70ccf679d8e7c0cd3333095f83d6d473db345ded2ac8acaa87503de74c82431758e8e11e3ecb7bce02d6cd65f4eb88cc49ceb9e39f7117eb0f62323dc9b80dea447b0c96a383f14281bb87b09de0a6153ceeaae2b50a2b0f0f41810f379f9c3a1f3938461829d716a4bda86ab11b41f754bc15d71b", 0xfed0}], 0x12}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 118.087816ms ago: executing program 4 (id=6632): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000880)=ANY=[@ANYBLOB="18001e0003000000000000000040000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000050000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r0}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000400)=""/136) r3 = syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, r4, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='cpu<-0||!') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f00000001c0), 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000380), 0x12) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r9) close(r9) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000002c0), 0x4) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=ANY=[@ANYBLOB="040000000400000004000000050001000008"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r10, 0x58, &(0x7f0000000340)}, 0x10) close(0xffffffffffffffff) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) 117.701616ms ago: executing program 2 (id=6633): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x24}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x19, 0x4, 0x8, 0x9}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r1}, &(0x7f0000000d00), &(0x7f0000000d40)=r0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="013301300508"}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000005c0)={r3}, 0xc) 0s ago: executing program 1 (id=6634): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r5}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) recvmsg(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)=""/156, 0x9c}], 0x1}, 0x8000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r5, &(0x7f00000007c0)}, 0x20) write$cgroup_pid(r3, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000640)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2a}, @printk={@llu, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x9b}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) kernel console output (not intermixed with test programs): T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.591886][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.598972][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 18.606260][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 18.613893][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 18.621290][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 18.646615][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 18.657059][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 18.665365][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.672387][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.680708][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 18.688786][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.695809][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.706003][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 18.713557][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 18.721644][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.728635][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.753398][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 18.761318][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 18.769384][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.776413][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.784052][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 18.792600][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.799603][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.806984][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 18.815090][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.822142][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.829497][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 18.837738][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.844783][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.852131][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 18.860125][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 18.868205][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.875224][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.882588][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 18.912182][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 18.919753][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 18.928114][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 18.936670][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 18.944746][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 18.952672][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 18.960836][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 18.967842][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 18.975207][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 18.983361][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 18.990393][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 18.997751][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.005748][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.013698][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 19.021708][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.029563][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.037934][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.048860][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.063400][ T286] device veth0_vlan entered promiscuous mode [ 19.072709][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.080861][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.088799][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.096419][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.113536][ T283] device veth0_vlan entered promiscuous mode [ 19.120541][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 19.128587][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 19.136553][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 19.144698][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 19.152796][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.161051][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.169516][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.177555][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.184989][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.203007][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.211488][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.219691][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 19.228176][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 19.236433][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.244406][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.252355][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.260190][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.268029][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 19.276011][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 19.284129][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.291669][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.299062][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.306674][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.314157][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 19.321640][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 19.335241][ T286] device veth1_macvtap entered promiscuous mode [ 19.342315][ T280] device veth0_vlan entered promiscuous mode [ 19.351015][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.359077][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.367482][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 19.375770][ T285] device veth0_vlan entered promiscuous mode [ 19.382532][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.390839][ T279] device veth0_vlan entered promiscuous mode [ 19.404057][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.412363][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.421097][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 19.429339][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.440630][ T283] device veth1_macvtap entered promiscuous mode [ 19.448080][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.456195][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.464482][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 19.472962][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.481892][ T279] device veth1_macvtap entered promiscuous mode [ 19.493612][ T285] device veth1_macvtap entered promiscuous mode [ 19.502330][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 19.510100][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 19.517582][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 19.526018][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.534462][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 19.542815][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.553665][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.567715][ T280] device veth1_macvtap entered promiscuous mode [ 19.574545][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 19.583092][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 19.591394][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 19.604052][ T279] request_module fs-gadgetfs succeeded, but still no fs? [ 19.614776][ T286] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 19.632163][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 19.640499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.655218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 19.664017][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.674064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.682732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 19.691190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 19.699502][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 19.708001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 19.939884][ C1] hrtimer: interrupt took 24372 ns [ 20.349673][ T335] device syzkaller0 entered promiscuous mode [ 20.717795][ T374] IPv6: : Disabled Multicast RS [ 20.875800][ T385] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 20.903691][ T385] device syzkaller0 entered promiscuous mode [ 21.236098][ T393] device syzkaller0 entered promiscuous mode [ 21.458739][ T410] cgroup: syz.0.36 (410) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 21.475320][ T405] device syzkaller0 entered promiscuous mode [ 21.488673][ T410] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 22.395152][ T24] kauditd_printk_skb: 45 callbacks suppressed [ 22.395161][ T24] audit: type=1400 audit(1778842531.420:119): avc: denied { create } for pid=468 comm="syz.3.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 23.093664][ T486] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 23.671657][ T24] audit: type=1400 audit(1778842532.700:120): avc: denied { create } for pid=498 comm="syz.4.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 24.775724][ T24] audit: type=1400 audit(1778842533.800:121): avc: denied { create } for pid=517 comm="syz.3.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 24.963755][ T520] device wg2 entered promiscuous mode [ 25.468247][ T24] audit: type=1400 audit(1778842534.490:122): avc: denied { write } for pid=522 comm="syz.4.65" name="cgroup.subtree_control" dev="cgroup2" ino=164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 25.910662][ T24] audit: type=1400 audit(1778842534.660:123): avc: denied { open } for pid=522 comm="syz.4.65" path="" dev="cgroup2" ino=164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 27.613403][ T24] audit: type=1400 audit(1778842536.630:124): avc: denied { cpu } for pid=553 comm="syz.3.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.669380][ T24] audit: type=1400 audit(1778842536.690:125): avc: denied { tracepoint } for pid=552 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.733906][ T547] device syzkaller0 entered promiscuous mode [ 27.753648][ T551] device syzkaller0 entered promiscuous mode [ 27.908676][ T562] device syzkaller0 entered promiscuous mode [ 29.284486][ T24] audit: type=1400 audit(1778842538.310:126): avc: denied { create } for pid=621 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 29.502334][ T24] audit: type=1400 audit(1778842538.530:127): avc: denied { create } for pid=634 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 30.283102][ T677] ------------[ cut here ]------------ [ 30.311127][ T677] trace type BPF program uses run-time allocation [ 30.352207][ T677] WARNING: CPU: 0 PID: 677 at kernel/bpf/verifier.c:10518 check_map_prog_compatibility+0x5d6/0x740 [ 30.414217][ T677] Modules linked in: [ 30.418159][ T677] CPU: 0 PID: 677 Comm: syz.4.109 Not tainted syzkaller #0 [ 30.560003][ T677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 30.788686][ T677] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 30.885316][ T677] Code: 85 e9 14 fe ff ff e8 99 d1 ef ff 31 c0 e9 15 fe ff ff e8 8d d1 ef ff c6 05 06 b8 4b 05 01 48 c7 c7 c0 d2 25 85 e8 3a 25 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 30.979014][ T677] RSP: 0018:ffffc90000b47448 EFLAGS: 00010246 [ 30.985173][ T677] RAX: ca7a8e31db020c00 RBX: 0000000000000001 RCX: 0000000000080000 [ 30.994098][ T677] RDX: ffffc90004506000 RSI: 0000000000002ca5 RDI: 0000000000002ca6 [ 31.003206][ T677] RBP: ffffc90000b47490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 31.016837][ T677] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff888118af8000 [ 31.024989][ T677] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811dad5000 [ 31.028696][ T24] audit: type=1400 audit(1778842540.050:128): avc: denied { create } for pid=713 comm="syz.2.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 31.046730][ T677] FS: 00007facb071d6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 31.089219][ T677] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 31.096804][ T24] audit: type=1400 audit(1778842540.090:129): avc: denied { create } for pid=713 comm="syz.2.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 31.118562][ T677] CR2: 0000000100000000 CR3: 000000010f40a000 CR4: 00000000003506a0 [ 31.120698][ T714] : port 1(vlan1) entered blocking state [ 31.132619][ T714] : port 1(vlan1) entered disabled state [ 31.140303][ T714] device vlan1 entered promiscuous mode [ 31.146006][ T677] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 31.164263][ T677] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 31.197589][ T677] Call Trace: [ 31.201056][ T677] ? __fdget+0x1a1/0x230 [ 31.210096][ T677] resolve_pseudo_ldimm64+0x55e/0x1060 [ 31.235043][ T677] ? bpf_check+0xdb10/0xdb10 [ 31.250489][ T677] ? kvmalloc_node+0x88/0x130 [ 31.256767][ T677] bpf_check+0x9058/0xdb10 [ 31.266857][ T677] ? bpf_get_btf_vmlinux+0x60/0x60 [ 31.329780][ T677] ? is_bpf_text_address+0x177/0x190 [ 31.369251][ T677] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.398560][ T677] ? __kernel_text_address+0xa0/0x100 [ 31.433194][ T677] ? unwind_get_return_address+0x4d/0x90 [ 31.446195][ T677] ? stack_trace_save+0xf0/0xf0 [ 31.452045][ T677] ? arch_stack_walk+0xee/0x140 [ 31.457148][ T677] ? stack_trace_save+0xa6/0xf0 [ 31.462597][ T677] ? stack_trace_snprint+0xf0/0xf0 [ 31.467712][ T677] ? __kasan_slab_alloc+0x69/0xf0 [ 31.472928][ T677] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.478417][ T677] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.489965][ T677] ? __kasan_kmalloc+0xec/0x110 [ 31.500064][ T677] ? __kasan_kmalloc+0xda/0x110 [ 31.505384][ T677] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 31.530691][ T677] ? selinux_bpf_prog_alloc+0x51/0x140 [ 31.546951][ T677] ? security_bpf_prog_alloc+0x62/0x90 [ 31.569958][ T677] ? bpf_prog_load+0x9d8/0x14a0 [ 31.579237][ T677] ? __se_sys_bpf+0x49a/0x740 [ 31.631672][ T677] ? __x64_sys_bpf+0x7b/0x90 [ 31.636282][ T677] ? do_syscall_64+0x31/0x40 [ 31.689963][ T677] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.696067][ T677] ? memset+0x35/0x40 [ 31.763959][ T677] ? bpf_obj_name_cpy+0x193/0x1e0 [ 31.769030][ T677] bpf_prog_load+0xfca/0x14a0 [ 31.773975][ T677] ? map_freeze+0x320/0x320 [ 31.778555][ T677] ? selinux_bpf+0xc7/0xf0 [ 31.786794][ T677] ? security_bpf+0x82/0xa0 [ 31.791434][ T677] __se_sys_bpf+0x49a/0x740 [ 31.796031][ T677] ? __x64_sys_bpf+0x90/0x90 [ 31.800723][ T677] ? ____fput+0x15/0x20 [ 31.804928][ T677] ? __kasan_check_read+0x11/0x20 [ 31.810110][ T677] __x64_sys_bpf+0x7b/0x90 [ 31.814630][ T677] do_syscall_64+0x31/0x40 [ 31.819108][ T677] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 31.825463][ T677] RIP: 0033:0x7facb1cc2e59 [ 31.853212][ T677] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 31.878916][ T677] RSP: 002b:00007facb071d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 31.896531][ T677] RAX: ffffffffffffffda RBX: 00007facb1f3bfa0 RCX: 00007facb1cc2e59 [ 31.913733][ T677] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 31.927859][ T677] RBP: 00007facb1d58d6f R08: 0000000000000000 R09: 0000000000000000 [ 31.945691][ T751] device syzkaller0 entered promiscuous mode [ 31.993814][ T677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 32.001958][ T677] R13: 00007facb1f3c038 R14: 00007facb1f3bfa0 R15: 00007ffc40f0a488 [ 32.052623][ T677] ---[ end trace 635dac29216f0075 ]--- [ 32.094942][ T24] audit: type=1400 audit(1778842541.120:130): avc: denied { ioctl } for pid=761 comm="syz.3.130" path="" dev="cgroup2" ino=191 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 32.270540][ T24] audit: type=1400 audit(1778842541.300:131): avc: denied { write } for pid=784 comm="syz.3.136" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 32.388702][ T24] audit: type=1400 audit(1778842541.410:132): avc: denied { create } for pid=818 comm="syz.1.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.157887][ T24] audit: type=1400 audit(1778842542.180:133): avc: denied { create } for pid=885 comm="syz.4.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 34.550459][ T24] audit: type=1400 audit(1778842543.580:134): avc: denied { create } for pid=932 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 35.956014][ T24] audit: type=1400 audit(1778842544.980:135): avc: denied { create } for pid=967 comm="syz.3.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 36.050061][ T24] audit: type=1400 audit(1778842545.000:136): avc: denied { create } for pid=955 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 36.498996][ T1002] syz.1.195 uses obsolete (PF_INET,SOCK_PACKET) [ 36.640843][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 36.649642][ T1008] IPv6: : Disabled Multicast RS [ 37.130141][ T1046] cgroup: fork rejected by pids controller in /syz1 [ 37.215356][ T1055] IPv6: : Disabled Multicast RS [ 37.221291][ T1057] @0: renamed from bond_slave_1 [ 37.565462][ T1077] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.581179][ T24] audit: type=1400 audit(1778842546.610:137): avc: denied { create } for pid=1087 comm="syz.4.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 37.621749][ T1077] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.633922][ T1077] device bridge_slave_0 entered promiscuous mode [ 37.671710][ T1077] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.688590][ T1077] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.709086][ T1077] device bridge_slave_1 entered promiscuous mode [ 38.317495][ T24] audit: type=1400 audit(1778842547.340:138): avc: denied { create } for pid=1077 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.360340][ T24] audit: type=1400 audit(1778842547.370:139): avc: denied { write } for pid=1077 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.380859][ T24] audit: type=1400 audit(1778842547.370:140): avc: denied { read } for pid=1077 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.408016][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.440236][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.466482][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.481913][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.490234][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.497280][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.534342][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 38.547308][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.564124][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.606616][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.613689][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.621164][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.629233][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.637487][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 38.645653][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 38.653964][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 38.663503][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 38.676341][ T1077] device veth0_vlan entered promiscuous mode [ 38.695669][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 38.703853][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 38.711902][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 38.735890][ T1129] geneve1: tun_chr_ioctl cmd 1074025672 [ 38.741537][ T1129] geneve1: ignored: set checksum enabled [ 38.779803][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.792926][ T1077] device veth1_macvtap entered promiscuous mode [ 38.800456][ T7] device bridge_slave_1 left promiscuous mode [ 38.810273][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.817832][ T7] device bridge_slave_0 left promiscuous mode [ 38.824232][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.834480][ T7] device veth1_macvtap left promiscuous mode [ 38.844178][ T7] device veth0_vlan left promiscuous mode [ 38.965057][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.976398][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.141456][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 39.153497][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.226590][ T1165] device syzkaller0 entered promiscuous mode [ 39.517726][ T1196] device veth1_macvtap left promiscuous mode [ 39.578969][ T24] audit: type=1400 audit(1778842548.600:141): avc: denied { create } for pid=1204 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 39.773173][ T24] audit: type=1400 audit(1778842548.800:142): avc: denied { create } for pid=1211 comm="syz.4.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 39.993807][ T1233] : renamed from team_slave_1 [ 41.734794][ T1285] device veth1_to_bond entered promiscuous mode [ 44.660407][ T1351] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 44.669177][ T1351] device syzkaller0 entered promiscuous mode [ 45.447915][ T1367] device syzkaller0 entered promiscuous mode [ 46.007953][ T1387] IPv6: : Disabled Multicast RS [ 46.029967][ T1399] device syzkaller0 entered promiscuous mode [ 47.914044][ T1511] device veth0_vlan left promiscuous mode [ 48.034839][ T1511] device veth0_vlan entered promiscuous mode [ 48.292776][ T1499] bridge0: port 3(gretap0) entered blocking state [ 48.330008][ T1499] bridge0: port 3(gretap0) entered disabled state [ 48.515979][ T1499] device gretap0 entered promiscuous mode [ 48.538027][ T1499] bridge0: port 3(gretap0) entered blocking state [ 48.545985][ T1499] bridge0: port 3(gretap0) entered forwarding state [ 50.076018][ T1600] device syzkaller0 entered promiscuous mode [ 50.521329][ T1612] device syzkaller0 entered promiscuous mode [ 50.527408][ T1612] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 52.090467][ T1639] bridge0: port 3(gretap0) entered blocking state [ 52.096903][ T1639] bridge0: port 3(gretap0) entered disabled state [ 52.120975][ T1639] device gretap0 entered promiscuous mode [ 52.127160][ T1639] bridge0: port 3(gretap0) entered blocking state [ 52.133610][ T1639] bridge0: port 3(gretap0) entered forwarding state [ 54.093121][ T1740] -1: renamed from syzkaller0 [ 54.528190][ T24] audit: type=1400 audit(1778842563.550:143): avc: denied { create } for pid=1763 comm="syz.2.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 54.657572][ T24] audit: type=1400 audit(1778842563.680:144): avc: denied { create } for pid=1774 comm="syz.3.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 55.418172][ T1781] device syzkaller0 entered promiscuous mode [ 55.695604][ T1823] device syzkaller0 entered promiscuous mode [ 55.710643][ T24] audit: type=1400 audit(1778842564.740:145): avc: denied { create } for pid=1833 comm="syz.4.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 55.779266][ T1839] -1: renamed from syzkaller0 [ 55.821387][ T24] audit: type=1400 audit(1778842564.850:146): avc: denied { create } for pid=1845 comm="syz.3.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 56.839255][ T1925] device syzkaller0 entered promiscuous mode [ 56.863829][ T290] syzkaller0: tun_net_xmit 48 [ 56.917686][ T1935] device syzkaller0 entered promiscuous mode [ 57.471976][ T1980] device syzkaller0 entered promiscuous mode [ 58.205141][ T2052] device sit0 entered promiscuous mode [ 60.026504][ T2116] device veth0_vlan left promiscuous mode [ 60.035339][ T2116] device veth0_vlan entered promiscuous mode [ 60.062800][ T24] audit: type=1400 audit(1778842569.090:147): avc: denied { create } for pid=2132 comm="syz.2.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 60.101875][ T2116] device sit0 entered promiscuous mode [ 60.165662][ T24] audit: type=1400 audit(1778842569.190:148): avc: denied { create } for pid=2141 comm="syz.4.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 60.471503][ T2172] bridge0: port 3(gretap0) entered blocking state [ 60.485121][ T2172] bridge0: port 3(gretap0) entered disabled state [ 60.499205][ T2172] device gretap0 entered promiscuous mode [ 60.600370][ T2172] bridge0: port 3(gretap0) entered blocking state [ 60.606912][ T2172] bridge0: port 3(gretap0) entered forwarding state [ 60.991015][ T24] audit: type=1400 audit(1778842570.020:149): avc: denied { create } for pid=2226 comm="syz.2.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 62.183664][ T2266] device syzkaller0 entered promiscuous mode [ 62.238286][ T2265] syzkaller0: tun_net_xmit 1280 [ 62.243701][ T2265] syzkaller0: create flow: hash 755661257 index 1 [ 62.331386][ T2264] syzkaller0: delete flow: hash 755661257 index 1 [ 63.221290][ T2297] device syzkaller0 entered promiscuous mode [ 63.426197][ T24] audit: type=1400 audit(1778842572.450:150): avc: denied { create } for pid=2303 comm="syz.1.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 63.731936][ T2307] device syzkaller0 entered promiscuous mode [ 72.276529][ T2531] device wg2 entered promiscuous mode [ 72.392544][ T2536] device syzkaller0 entered promiscuous mode [ 73.825131][ T24] audit: type=1400 audit(1778842582.840:151): avc: denied { create } for pid=2604 comm="syz.0.662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 80.184886][ T2877] bridge0: port 3(gretap0) entered blocking state [ 80.328104][ T2877] bridge0: port 3(gretap0) entered disabled state [ 80.350314][ T2877] device gretap0 entered promiscuous mode [ 80.356129][ T2877] bridge0: port 3(gretap0) entered blocking state [ 80.362569][ T2877] bridge0: port 3(gretap0) entered forwarding state [ 82.355692][ T2951] device syzkaller0 entered promiscuous mode [ 82.968160][ T24] audit: type=1400 audit(1778842591.990:152): avc: denied { create } for pid=2993 comm="syz.0.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 83.794293][ T24] audit: type=1400 audit(1778842592.820:153): avc: denied { create } for pid=3036 comm="syz.4.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 84.736470][ T3088] device veth0_vlan left promiscuous mode [ 84.796632][ T3088] device veth0_vlan entered promiscuous mode [ 84.983496][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 84.991796][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 84.999319][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.047278][ T3097] device sit0 entered promiscuous mode [ 86.089757][ T3139] device veth0_vlan left promiscuous mode [ 86.101563][ T3139] device veth0_vlan entered promiscuous mode [ 86.127711][ T3145] device syzkaller0 entered promiscuous mode [ 86.330464][ T3154] @0: renamed from bond_slave_1 [ 86.353332][ T3156] device syzkaller0 entered promiscuous mode [ 86.987418][ T3200] device syzkaller0 entered promiscuous mode [ 87.140514][ T3212] bridge0: port 3(gretap0) entered disabled state [ 87.147009][ T3212] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.154161][ T3212] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.287538][ T3215] : renamed from pim6reg1 [ 87.732527][ T3254] device syzkaller0 entered promiscuous mode [ 88.337791][ T3293] device syzkaller0 entered promiscuous mode [ 89.488146][ T24] audit: type=1400 audit(1778842598.510:154): avc: denied { create } for pid=3340 comm="syz.0.871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 89.684656][ T3344] device syzkaller0 entered promiscuous mode [ 91.562106][ T24] audit: type=1400 audit(1778842600.590:155): avc: denied { create } for pid=3442 comm="syz.0.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 91.711063][ T24] audit: type=1400 audit(1778842600.740:156): avc: denied { create } for pid=3456 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 94.440282][ T3588] device sit0 left promiscuous mode [ 94.487721][ T3588] device sit0 entered promiscuous mode [ 95.957618][ T3642] device veth1_macvtap left promiscuous mode [ 96.610650][ T3757] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.626703][ T3757] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.641732][ T3757] device bridge_slave_0 entered promiscuous mode [ 96.658592][ T3757] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.683820][ T3757] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.698889][ T3757] device bridge_slave_1 entered promiscuous mode [ 96.916075][ T3757] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.923230][ T3757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.930497][ T3757] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.937515][ T3757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.294832][ T3812] bridge0: port 3(gretap0) entered blocking state [ 97.352805][ T3812] bridge0: port 3(gretap0) entered disabled state [ 97.359660][ T3812] device gretap0 entered promiscuous mode [ 97.533745][ T3812] bridge0: port 3(gretap0) entered blocking state [ 97.540217][ T3812] bridge0: port 3(gretap0) entered forwarding state [ 97.588808][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.630126][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 97.755191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 97.790588][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 97.882265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 97.922694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.016676][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.023757][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.109977][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 98.161879][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.211004][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.218099][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.307936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 98.380222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 98.400049][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 98.458655][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 98.579302][ T3757] device veth0_vlan entered promiscuous mode [ 98.661572][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 98.685692][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 98.810349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 98.871653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 98.895632][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 98.914925][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 98.954579][ T3757] device veth1_macvtap entered promiscuous mode [ 99.012459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.054748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.107974][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.295379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.310409][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.408291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.441734][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.283342][ T1208] device gretap0 left promiscuous mode [ 100.289033][ T1208] bridge0: port 3(gretap0) entered disabled state [ 100.671608][ T1208] device bridge_slave_1 left promiscuous mode [ 100.690105][ T1208] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.703018][ T1208] device bridge_slave_0 left promiscuous mode [ 100.790090][ T1208] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.523605][ T3918] IPv6: pim6reg1: Disabled Multicast RS [ 102.315245][ T3974] device veth1_macvtap left promiscuous mode [ 102.355610][ T3974] device macsec0 entered promiscuous mode [ 102.371971][ T3974] device veth1_macvtap entered promiscuous mode [ 103.583326][ T24] audit: type=1400 audit(1778842612.610:157): avc: denied { create } for pid=4053 comm="syz.0.1035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 104.041793][ T4093] device syzkaller0 entered promiscuous mode [ 105.692274][ T4140] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 105.781473][ T4140] device syzkaller0 entered promiscuous mode [ 107.207351][ T4194] device syzkaller0 entered promiscuous mode [ 107.797053][ T4200] device syzkaller0 entered promiscuous mode [ 108.612700][ T4225] device syzkaller0 entered promiscuous mode [ 110.259026][ T4285] device syzkaller0 entered promiscuous mode [ 110.669470][ T4300] device syzkaller0 entered promiscuous mode [ 112.329440][ T4355] device syzkaller0 entered promiscuous mode [ 115.628169][ T4498] tap0: tun_chr_ioctl cmd 1074025677 [ 115.690519][ T4498] tap0: linktype set to 769 [ 115.761817][ T4501] ref_ctr_offset mismatch. inode: 0x4d6 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 117.372507][ T4582] device wg2 entered promiscuous mode [ 118.018673][ T4671] FAULT_INJECTION: forcing a failure. [ 118.018673][ T4671] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 118.031906][ T4671] CPU: 0 PID: 4671 Comm: syz.4.1219 Tainted: G W syzkaller #0 [ 118.040647][ T4671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 118.050685][ T4671] Call Trace: [ 118.053960][ T4671] __dump_stack+0x21/0x24 [ 118.058262][ T4671] dump_stack_lvl+0x1a7/0x208 [ 118.062914][ T4671] ? show_regs_print_info+0x18/0x18 [ 118.068087][ T4671] ? finish_task_switch+0x1b7/0x5a0 [ 118.073257][ T4671] dump_stack+0x15/0x1c [ 118.077384][ T4671] should_fail+0x3c1/0x510 [ 118.081772][ T4671] should_fail_usercopy+0x1a/0x20 [ 118.086769][ T4671] _copy_to_user+0x20/0x90 [ 118.091159][ T4671] ip6gre_tunnel_ioctl+0x4b1/0xe90 [ 118.096245][ T4671] ? ip6gre_tunnel_init+0x160/0x160 [ 118.101426][ T4671] ? full_name_hash+0xa0/0xf0 [ 118.106075][ T4671] dev_ifsioc+0x6b4/0xa90 [ 118.110378][ T4671] ? dev_ioctl+0xb80/0xb80 [ 118.114768][ T4671] dev_ioctl+0x5ea/0xb80 [ 118.118980][ T4671] sock_ioctl+0x6ce/0x760 [ 118.124063][ T4671] ? sock_poll+0x350/0x350 [ 118.128446][ T4671] ? __fget_files+0x2c4/0x320 [ 118.133099][ T4671] ? security_file_ioctl+0x84/0xa0 [ 118.138183][ T4671] ? sock_poll+0x350/0x350 [ 118.142569][ T4671] __se_sys_ioctl+0x121/0x1a0 [ 118.147216][ T4671] __x64_sys_ioctl+0x7b/0x90 [ 118.151778][ T4671] do_syscall_64+0x31/0x40 [ 118.156162][ T4671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 118.162038][ T4671] RIP: 0033:0x7facb1cc2e59 [ 118.166440][ T4671] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.186014][ T4671] RSP: 002b:00007facb071d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 118.194399][ T4671] RAX: ffffffffffffffda RBX: 00007facb1f3bfa0 RCX: 00007facb1cc2e59 [ 118.202343][ T4671] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 118.210290][ T4671] RBP: 00007facb071d090 R08: 0000000000000000 R09: 0000000000000000 [ 118.218235][ T4671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.226197][ T4671] R13: 00007facb1f3c038 R14: 00007facb1f3bfa0 R15: 00007ffc40f0a488 [ 118.263704][ T4679] lo: mtu less than device minimum [ 118.331905][ T4688] device syzkaller0 entered promiscuous mode [ 118.421624][ T4697] device syzkaller0 entered promiscuous mode [ 118.497836][ T4702] FAULT_INJECTION: forcing a failure. [ 118.497836][ T4702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.510990][ T4702] CPU: 0 PID: 4702 Comm: syz.1.1231 Tainted: G W syzkaller #0 [ 118.519736][ T4702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 118.529779][ T4702] Call Trace: [ 118.533047][ T4702] __dump_stack+0x21/0x24 [ 118.537350][ T4702] dump_stack_lvl+0x1a7/0x208 [ 118.541994][ T4702] ? show_regs_print_info+0x18/0x18 [ 118.547161][ T4702] ? netdev_refcnt_read+0x1d0/0x1d0 [ 118.552339][ T4702] ? dev_ifsioc+0x6b4/0xa90 [ 118.556813][ T4702] dump_stack+0x15/0x1c [ 118.560940][ T4702] should_fail+0x3c1/0x510 [ 118.565350][ T4702] should_fail_usercopy+0x1a/0x20 [ 118.570343][ T4702] _copy_to_user+0x20/0x90 [ 118.574732][ T4702] sock_ioctl+0x702/0x760 [ 118.579026][ T4702] ? sock_poll+0x350/0x350 [ 118.583412][ T4702] ? __fget_files+0x2c4/0x320 [ 118.588059][ T4702] ? security_file_ioctl+0x84/0xa0 [ 118.593141][ T4702] ? sock_poll+0x350/0x350 [ 118.597521][ T4702] __se_sys_ioctl+0x121/0x1a0 [ 118.602174][ T4702] __x64_sys_ioctl+0x7b/0x90 [ 118.606733][ T4702] do_syscall_64+0x31/0x40 [ 118.611122][ T4702] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 118.616990][ T4702] RIP: 0033:0x7f20e1066e59 [ 118.621387][ T4702] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 118.640973][ T4702] RSP: 002b:00007f20dfac1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 118.649358][ T4702] RAX: ffffffffffffffda RBX: 00007f20e12dffa0 RCX: 00007f20e1066e59 [ 118.657302][ T4702] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 118.665247][ T4702] RBP: 00007f20dfac1090 R08: 0000000000000000 R09: 0000000000000000 [ 118.673194][ T4702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.681135][ T4702] R13: 00007f20e12e0038 R14: 00007f20e12dffa0 R15: 00007ffcb4cdb858 [ 119.390414][ T4732] device sit0 left promiscuous mode [ 119.875676][ T4740] device sit0 entered promiscuous mode [ 125.965433][ T4906] device syzkaller0 entered promiscuous mode [ 127.982147][ T24] audit: type=1400 audit(1778842637.010:158): avc: denied { create } for pid=4983 comm="syz.0.1306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 128.043514][ T4987] device syzkaller0 entered promiscuous mode [ 128.920796][ T24] audit: type=1400 audit(1778842637.950:159): avc: denied { read } for pid=5013 comm="syz.0.1316" dev="nsfs" ino=4026532379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 129.026992][ T24] audit: type=1400 audit(1778842637.970:160): avc: denied { open } for pid=5013 comm="syz.0.1316" path="net:[4026532379]" dev="nsfs" ino=4026532379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 129.535547][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 129.565566][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 130.728895][ T5071] device syzkaller0 entered promiscuous mode [ 131.340767][ T5093] ref_ctr_offset mismatch. inode: 0x146 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 133.413156][ T5152] device syzkaller0 entered promiscuous mode [ 134.410796][ T1067] syzkaller0: tun_net_xmit 76 [ 134.415590][ T1067] syzkaller0: tun_net_xmit 48 [ 134.439920][ C0] syzkaller0: tun_net_xmit 76 [ 138.534824][ T24] audit: type=1400 audit(1778842647.560:161): avc: denied { ioctl } for pid=5342 comm="syz.0.1408" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 139.109339][ T5372] bridge0: port 3(gretap0) entered disabled state [ 139.115849][ T5372] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.122996][ T5372] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.573320][ T5419] : renamed from bond_slave_0 [ 140.590435][ T5421] device syzkaller0 entered promiscuous mode [ 140.839581][ T24] audit: type=1400 audit(1778842649.860:162): avc: denied { append } for pid=5423 comm="syz.0.1428" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 141.880639][ T5459] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 141.904504][ T5459] pim6reg0: linktype set to 776 [ 142.276008][ T24] audit: type=1400 audit(1778842651.300:163): avc: denied { create } for pid=5479 comm="syz.3.1444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 143.671787][ T24] audit: type=1400 audit(1778842652.700:164): avc: denied { ioctl } for pid=5555 comm="syz.1.1464" path="socket:[33386]" dev="sockfs" ino=33386 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 146.445422][ T5658] device syzkaller0 entered promiscuous mode [ 147.163288][ T5695] device wg2 left promiscuous mode [ 147.302545][ T5695] device wg2 entered promiscuous mode [ 152.281085][ T5932] device veth1_macvtap left promiscuous mode [ 152.355218][ T24] audit: type=1400 audit(1778842661.370:165): avc: denied { create } for pid=5934 comm="syz.0.1565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 152.622030][ T5937] device veth1_macvtap entered promiscuous mode [ 152.652069][ T5937] device macsec0 entered promiscuous mode [ 154.050566][ T6012] device sit0 left promiscuous mode [ 154.193958][ T6012] device sit0 entered promiscuous mode [ 155.102940][ T6030] device wg2 left promiscuous mode [ 155.117015][ T6033] device wg2 entered promiscuous mode [ 155.478450][ T6063] device veth1_to_bond entered promiscuous mode [ 156.448519][ T6154] device veth1_macvtap left promiscuous mode [ 157.068473][ T6172] device syzkaller0 entered promiscuous mode [ 157.318902][ T6172] device wg2 left promiscuous mode [ 157.622675][ T6191] device sit0 left promiscuous mode [ 159.751147][ T6220] device syzkaller0 entered promiscuous mode [ 164.159774][ T24] audit: type=1400 audit(1778842673.180:166): avc: denied { create } for pid=6398 comm="syz.3.1690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 164.379696][ T6401] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 164.821800][ T6431] device veth1_to_bond entered promiscuous mode [ 167.470590][ T6549] device syzkaller0 entered promiscuous mode [ 169.029641][ T6602] device syzkaller0 entered promiscuous mode [ 170.538082][ T1208] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.554246][ T6664] device wg2 entered promiscuous mode [ 170.978278][ T6683] device syzkaller0 entered promiscuous mode [ 172.773214][ T6747] device wg2 left promiscuous mode [ 173.475995][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 176.015576][ T6906] 0: renamed from pim6reg1 [ 177.713366][ T7001] tap0: tun_chr_ioctl cmd 1074025677 [ 177.718684][ T7001] tap0: linktype set to 805 [ 178.058855][ T7014] device syzkaller0 entered promiscuous mode [ 180.012170][ T7057] ref_ctr_offset mismatch. inode: 0x820 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 182.202309][ T7132] : renamed from veth0_vlan [ 183.640118][ T24] audit: type=1400 audit(1778842692.670:167): avc: denied { create } for pid=7189 comm="syz.1.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 183.804929][ T7194] device dummy0 entered promiscuous mode [ 184.574257][ T7276] device syzkaller0 entered promiscuous mode [ 185.058119][ T279] cgroup: fork rejected by pids controller in /syz2 [ 185.223819][ T7347] device syzkaller0 entered promiscuous mode [ 185.507779][ T7358] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.519889][ T7358] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.530520][ T7358] device bridge_slave_0 entered promiscuous mode [ 185.540428][ T7358] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.566917][ T7358] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.582271][ T7358] device bridge_slave_1 entered promiscuous mode [ 185.682666][ T7365] device syzkaller0 entered promiscuous mode [ 185.812483][ T7358] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.819532][ T7358] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.826858][ T7358] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.833909][ T7358] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.910109][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 185.917956][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.950146][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.004030][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.018089][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.025161][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.069950][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.090086][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.097150][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.120872][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.147164][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.200900][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.244977][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.260870][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.288219][ T7358] device veth0_vlan entered promiscuous mode [ 186.297695][ T7396] wg2: mtu less than device minimum [ 186.303758][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.321570][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.366957][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.380122][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.418953][ T7358] device veth1_macvtap entered promiscuous mode [ 186.484008][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.492011][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.505202][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.536025][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.564793][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 186.927272][ T7420] device syzkaller0 entered promiscuous mode [ 187.031940][ T1208] bridge0: port 3(gretap0) entered disabled state [ 187.043971][ T1208] device gretap0 left promiscuous mode [ 187.054058][ T1208] bridge0: port 3(gretap0) entered disabled state [ 187.517020][ T7461] device syzkaller0 entered promiscuous mode [ 187.651512][ T1208] device vlan1 left promiscuous mode [ 187.657170][ T1208] : port 1(vlan1) entered disabled state [ 187.686745][ T1208] device bridge_slave_1 left promiscuous mode [ 187.710497][ T1208] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.740311][ T1208] device bridge_slave_0 left promiscuous mode [ 187.769950][ T1208] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.800789][ T1208] device veth0_vlan left promiscuous mode [ 188.091616][ T7490] device syzkaller0 entered promiscuous mode [ 188.294601][ T7501] device syzkaller0 entered promiscuous mode [ 189.449278][ T7593] device wg2 entered promiscuous mode [ 190.438014][ T7669] device wg2 entered promiscuous mode [ 190.529968][ T24] audit: type=1400 audit(1778842699.550:168): avc: denied { setattr } for pid=7680 comm="syz.2.2039" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 191.511158][ T7725] ref_ctr_offset mismatch. inode: 0x7e2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 191.597120][ T7753] device syzkaller0 entered promiscuous mode [ 192.755324][ T7838] device syzkaller0 entered promiscuous mode [ 192.784260][ T7848] : renamed from bond_slave_0 [ 193.885625][ T7915] device syzkaller0 entered promiscuous mode [ 194.061071][ T7927] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 196.209745][ T8081] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 196.320220][ T8081] pim6reg0: linktype set to 6 [ 196.483153][ T8091] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 196.495507][ T8091] pim6reg0: linktype set to 776 [ 197.502243][ T8182] device syzkaller0 entered promiscuous mode [ 199.211900][ T8254] device syzkaller0 entered promiscuous mode [ 201.501966][ T8354] device syzkaller0 entered promiscuous mode [ 201.778305][ T8369] : renamed from pim6reg1 [ 202.303151][ T8381] device syzkaller0 entered promiscuous mode [ 202.923744][ T8409] device wg2 left promiscuous mode [ 203.055915][ T8410] device wg2 entered promiscuous mode [ 203.076184][ T8413] device wg2 left promiscuous mode [ 203.559136][ T8443] device wg2 entered promiscuous mode [ 205.471484][ T8565] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.478663][ T8565] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.557402][ T8628] device syzkaller0 entered promiscuous mode [ 207.849660][ T8708] device syzkaller0 entered promiscuous mode [ 208.049174][ T24] audit: type=1400 audit(1778842717.070:169): avc: denied { setattr } for pid=8728 comm="syz.4.2349" path="pipe:[14509]" dev="pipefs" ino=14509 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 208.207779][ T8729] device syzkaller0 entered promiscuous mode [ 208.742233][ T8760] device syzkaller0 entered promiscuous mode [ 209.324707][ T8807] geneve1: tun_chr_ioctl cmd 1074025672 [ 209.350756][ T8807] geneve1: ignored: set checksum enabled [ 209.356522][ T8811] lo: mtu less than device minimum [ 210.119786][ T8849] device vlan0 entered promiscuous mode [ 212.722918][ T8898] device syzkaller0 entered promiscuous mode [ 214.187955][ T24] audit: type=1400 audit(1778842723.210:170): avc: denied { attach_queue } for pid=8952 comm="syz.1.2414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 215.367240][ T9052] device syzkaller0 entered promiscuous mode [ 215.436961][ T9062] device syzkaller0 entered promiscuous mode [ 215.463928][ T9063] device vlan0 entered promiscuous mode [ 215.790052][ T9197] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.797111][ T9197] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.805331][ T9197] device bridge_slave_0 entered promiscuous mode [ 215.842363][ T9197] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.849525][ T9197] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.857286][ T9197] device bridge_slave_1 entered promiscuous mode [ 215.912654][ T9197] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.919739][ T9197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.927017][ T9197] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.934051][ T9197] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.968595][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.978598][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.004488][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.064779][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.076383][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.083652][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.125633][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.140693][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.147777][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.192719][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.217319][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.232070][ T9197] device veth0_vlan entered promiscuous mode [ 216.264405][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.274697][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.283525][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 216.291653][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.341833][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.381453][ T9197] device veth1_macvtap entered promiscuous mode [ 216.415099][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.437639][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.705349][ T9278] device syzkaller0 entered promiscuous mode [ 216.808866][ T9301] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 217.223391][ T7] device bridge_slave_1 left promiscuous mode [ 217.230622][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.266650][ T7] device bridge_slave_0 left promiscuous mode [ 217.282025][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.308863][ T7] device veth1_macvtap left promiscuous mode [ 217.322597][ T7] device veth0_vlan left promiscuous mode [ 218.590547][ T9358] ref_ctr_offset mismatch. inode: 0xa81 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 225.132266][ T9449] lo: mtu less than device minimum [ 225.137485][ T9450] lo: mtu less than device minimum [ 225.695153][ T9454] bridge0: port 4(ip6gretap0) entered blocking state [ 225.726992][ T9454] bridge0: port 4(ip6gretap0) entered disabled state [ 225.931776][ T9454] device ip6gretap0 entered promiscuous mode [ 225.949090][ T9454] bridge0: port 4(ip6gretap0) entered blocking state [ 225.957687][ T9454] bridge0: port 4(ip6gretap0) entered forwarding state [ 226.611245][ T24] audit: type=1400 audit(1778842735.640:171): avc: denied { create } for pid=9480 comm="syz.2.2540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 229.712446][ T9610] : renamed from vlan1 [ 233.363245][ T9714] device sit0 entered promiscuous mode [ 235.415389][ T9796] device syzkaller0 entered promiscuous mode [ 236.360862][ T9828] -: renamed from syzkaller0 [ 241.355487][T10048] device syzkaller0 entered promiscuous mode [ 241.962162][T10085] device gretap0 left promiscuous mode [ 241.982106][T10085] bridge0: port 3(gretap0) entered disabled state [ 242.060124][T10085] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.078001][ T24] audit: type=1400 audit(1778842751.090:172): avc: denied { create } for pid=10091 comm="syz.1.2709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 242.122704][T10085] device bridge_slave_0 left promiscuous mode [ 242.146788][T10085] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.424260][T10099] device syzkaller0 entered promiscuous mode [ 245.074969][T10212] device syzkaller0 entered promiscuous mode [ 245.330062][T10236] bridge0: port 3(gretap0) entered blocking state [ 245.337202][T10236] bridge0: port 3(gretap0) entered disabled state [ 245.419110][T10236] device gretap0 entered promiscuous mode [ 246.064046][T10300] device syzkaller0 entered promiscuous mode [ 246.070706][ T7313] syzkaller0: tun_net_xmit 48 [ 246.323170][T10316] device veth1_macvtap left promiscuous mode [ 246.329287][T10316] device macsec0 left promiscuous mode [ 246.336204][T10316] device macsec0 entered promiscuous mode [ 246.342082][T10316] device veth1_macvtap entered promiscuous mode [ 247.165567][T10386] device aaaaaaaaaaaaaaa entered promiscuous mode [ 247.175209][T10383] device veth0_vlan left promiscuous mode [ 247.266090][T10383] device veth0_vlan entered promiscuous mode [ 248.869492][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.888350][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.917459][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.086756][T10455] device syzkaller0 entered promiscuous mode [ 250.261051][T10475] geneve0: tun_chr_ioctl cmd 1074025677 [ 250.297623][T10475] geneve0: linktype set to 804 [ 251.655892][T10500] device syzkaller0 entered promiscuous mode [ 253.431364][T10586] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 253.586503][T10586] pim6reg0: linktype set to 825 [ 255.634632][T10674] device syzkaller0 entered promiscuous mode [ 256.282927][T10684] device wg2 left promiscuous mode [ 257.898608][T10718] geneve1: tun_chr_ioctl cmd 2147767517 [ 259.193012][T10752] device sit0 entered promiscuous mode [ 260.370208][T10831] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 260.375913][T10831] pim6reg0: linktype set to 774 [ 261.434039][T10869] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.448990][T10869] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.466709][T10869] device bridge_slave_0 entered promiscuous mode [ 261.475421][T10869] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.509959][T10869] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.517455][T10869] device bridge_slave_1 entered promiscuous mode [ 261.693431][T10869] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.700494][T10869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 261.707737][T10869] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.714777][T10869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 261.824010][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 261.876219][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.926175][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 261.990135][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.065269][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.130736][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.137790][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.510119][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.518229][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.564656][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.593001][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.681210][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.722788][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.759195][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 262.800460][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.843381][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.878935][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.887337][T10869] device veth0_vlan entered promiscuous mode [ 262.923824][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.937411][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.252603][T10869] device veth1_macvtap entered promiscuous mode [ 263.275095][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.283084][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.291745][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.467468][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.477760][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.594528][T10948] sock: sock_set_timeout: `syz.2.2951' (pid 10948) tries to set negative timeout [ 264.184062][T10987] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 264.202985][T10987] device syzkaller0 entered promiscuous mode [ 264.763141][ T7] bridge0: port 4(ip6gretap0) entered disabled state [ 264.782352][ T7] device ip6gretap0 left promiscuous mode [ 264.788189][ T7] bridge0: port 4(ip6gretap0) entered disabled state [ 265.073879][T11010] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.089751][T11010] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.105237][T11010] device bridge_slave_0 entered promiscuous mode [ 265.131814][T11010] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.146530][T11010] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.162477][T11010] device bridge_slave_1 entered promiscuous mode [ 265.364156][T11010] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.371249][T11010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.378501][T11010] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.385539][T11010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.520393][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.570262][ T1208] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.600637][ T1208] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.622187][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.630924][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.639070][ T1208] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.646117][ T1208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.654132][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.662700][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.671829][ T1208] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.678857][ T1208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.687935][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.696440][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.712925][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.720979][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.737023][ T7] bridge0: port 3(gretap0) entered disabled state [ 265.744326][ T7] device gretap0 left promiscuous mode [ 265.752795][ T7] bridge0: port 3(gretap0) entered disabled state [ 265.786043][T11089] device syzkaller0 entered promiscuous mode [ 265.800063][T11075] syzkaller0: tun_net_xmit 48 [ 265.823848][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 265.832807][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.841355][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.849297][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.857544][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.865318][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.873964][T11010] device veth0_vlan entered promiscuous mode [ 265.887129][T11091] syzkaller0: tun_net_xmit 1280 [ 265.898889][T11091] syzkaller0: create flow: hash 755661257 index 1 [ 265.907679][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.919073][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.946447][T11010] device veth1_macvtap entered promiscuous mode [ 265.964872][ T7] device bridge_slave_1 left promiscuous mode [ 265.980042][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.987598][ T7] device bridge_slave_0 left promiscuous mode [ 265.999966][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.012618][ T7] device veth1_macvtap left promiscuous mode [ 266.344294][T11088] syzkaller0: delete flow: hash 755661257 index 1 [ 266.396079][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.423860][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.465039][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.498548][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.521022][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.538693][T11106] device syzkaller0 entered promiscuous mode [ 266.733104][T11121] device syzkaller0 entered promiscuous mode [ 266.821083][T11128] device syzkaller0 entered promiscuous mode [ 267.301363][T11188] device syzkaller0 entered promiscuous mode [ 268.089056][T11236] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 268.143728][T11236] pim6reg0: linktype set to 825 [ 268.312630][T11236] device syzkaller0 entered promiscuous mode [ 268.546839][T11275] device dummy0 entered promiscuous mode [ 268.652475][T11282] geneve0: tun_chr_ioctl cmd 35108 [ 269.351755][T11300] device syzkaller0 entered promiscuous mode [ 270.575595][T11321] device syzkaller0 entered promiscuous mode [ 272.880836][T11403] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 273.165976][T11420] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 273.294499][T11424] device syzkaller0 entered promiscuous mode [ 274.260664][T11444] device veth0_vlan left promiscuous mode [ 274.330551][T11444] device veth0_vlan entered promiscuous mode [ 275.232084][T11487] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.259703][T11487] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.300263][T11487] device bridge_slave_0 entered promiscuous mode [ 275.340471][T11487] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.347616][T11487] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.449761][T11487] device bridge_slave_1 entered promiscuous mode [ 275.685699][T11487] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.692780][T11487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.700060][T11487] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.707072][T11487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.035649][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.044279][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.057677][T11520] bridge0: port 3(gretap0) entered blocking state [ 276.067804][T11520] bridge0: port 3(gretap0) entered disabled state [ 276.166842][T11520] device gretap0 entered promiscuous mode [ 276.196065][T11520] bridge0: port 3(gretap0) entered blocking state [ 276.202574][T11520] bridge0: port 3(gretap0) entered forwarding state [ 276.344521][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.366787][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.375885][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.384405][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.392844][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.399909][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.407655][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.459135][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.477738][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.484814][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.500757][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.508954][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.517478][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.526553][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.602134][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 276.610614][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.624015][T11487] device veth0_vlan entered promiscuous mode [ 276.650710][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.658792][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.671118][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.691241][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.739698][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.850186][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.869276][T11487] device veth1_macvtap entered promiscuous mode [ 276.997774][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.006155][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.114422][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.138398][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.153176][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.856309][T11618] geneve1: tun_chr_ioctl cmd 2147767517 [ 278.167503][ T7] bridge0: port 3(gretap0) entered disabled state [ 278.204249][ T7] device gretap0 left promiscuous mode [ 278.209747][ T7] bridge0: port 3(gretap0) entered disabled state [ 278.564712][ T7] device bridge_slave_1 left promiscuous mode [ 278.610835][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.690075][ T7] device bridge_slave_0 left promiscuous mode [ 278.779949][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.865729][ T7] device veth1_macvtap left promiscuous mode [ 281.986748][T11724] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.993938][T11724] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.576208][T11744] device sit0 entered promiscuous mode [ 283.463220][T11761] device syzkaller0 entered promiscuous mode [ 283.745727][T11771] device syzkaller0 entered promiscuous mode [ 284.475165][T11822] device gretap0 left promiscuous mode [ 284.487907][T11822] bridge0: port 3(gretap0) entered disabled state [ 284.570322][T11822] device bridge_slave_1 left promiscuous mode [ 284.620410][T11822] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.716158][T11822] device bridge_slave_0 left promiscuous mode [ 284.729476][T11822] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.858702][T11836] device syzkaller0 entered promiscuous mode [ 284.959075][T11839] device syzkaller0 entered promiscuous mode [ 285.511477][T11871] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 285.543026][T11871] pim6reg0: linktype set to 776 [ 285.559122][T11876] device sit0 left promiscuous mode [ 285.584315][T11876] device sit0 entered promiscuous mode [ 288.626168][T11948] device syzkaller0 entered promiscuous mode [ 289.693013][T11969] device sit0 left promiscuous mode [ 290.095193][T12000] device syzkaller0 entered promiscuous mode [ 290.423510][T12010] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 291.719521][T12044] device syzkaller0 entered promiscuous mode [ 292.000108][T12044] bridge0: port 4(veth0_vlan) entered blocking state [ 292.041094][T12044] bridge0: port 4(veth0_vlan) entered disabled state [ 292.101937][T12044] bridge0: port 4(veth0_vlan) entered blocking state [ 292.108654][T12044] bridge0: port 4(veth0_vlan) entered forwarding state [ 293.367291][T12083] geneve0: tun_chr_ioctl cmd 2147767507 [ 293.737465][T12096] device syzkaller0 entered promiscuous mode [ 293.796878][T12094] device syzkaller0 entered promiscuous mode [ 294.881890][T12133] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 295.009782][T12140] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.028211][T12140] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.604757][T12289] device syzkaller0 entered promiscuous mode [ 301.632037][T12305] device sit0 left promiscuous mode [ 301.810026][T12308] device sit0 entered promiscuous mode [ 302.925835][T12323] device syzkaller0 entered promiscuous mode [ 303.338821][T12346] device syzkaller0 entered promiscuous mode [ 303.901554][T12370] device syzkaller0 entered promiscuous mode [ 304.775020][T12408] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 304.793804][T12408] device syzkaller0 entered promiscuous mode [ 306.589999][T12531] device ip6gre0 entered promiscuous mode [ 308.664407][T12556] cgroup: fork rejected by pids controller in /syz0 [ 309.034254][T12568] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.420402][T12592] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.427752][T12592] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.435432][T12592] device bridge_slave_0 entered promiscuous mode [ 309.442549][T12592] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.449569][T12592] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.457510][T12592] device bridge_slave_1 entered promiscuous mode [ 309.573844][T12592] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.580919][T12592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.588203][T12592] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.595242][T12592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.625242][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.633472][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.650136][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.745164][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.773197][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.780277][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.790593][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.798928][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.805978][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.813652][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.841037][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.857372][T12592] device veth0_vlan entered promiscuous mode [ 309.868196][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.877152][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.886156][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.894548][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.932917][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.942913][T12592] device veth1_macvtap entered promiscuous mode [ 309.953784][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 309.971123][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.904288][T12683] device syzkaller0 entered promiscuous mode [ 311.268653][T12691] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 311.462691][T12691] device syzkaller0 entered promiscuous mode [ 311.635979][T12703] device syzkaller0 entered promiscuous mode [ 317.746964][T12936] device syzkaller0 entered promiscuous mode [ 319.109253][T13012] device syzkaller0 entered promiscuous mode [ 320.274830][T13064] device veth1_macvtap left promiscuous mode [ 320.296215][T13064] device macsec0 left promiscuous mode [ 321.210708][T13107] device wg2 entered promiscuous mode [ 321.217135][T13108] geneve1: tun_chr_ioctl cmd 2147767517 [ 321.227991][T13105] geneve1: tun_chr_ioctl cmd 1074025698 [ 324.239653][T13240] device syzkaller0 entered promiscuous mode [ 324.421487][T13248] device syzkaller0 entered promiscuous mode [ 325.244796][T13288] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 325.294341][T13288] pim6reg0: linktype set to 768 [ 325.513362][T13298] device syzkaller0 entered promiscuous mode [ 327.177702][T13365] device syzkaller0 entered promiscuous mode [ 327.809208][T13411] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 328.832942][T13450] : renamed from team_slave_1 [ 329.453892][T13470] ref_ctr_offset mismatch. inode: 0xadc offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 332.974628][T13567] device syzkaller0 entered promiscuous mode [ 333.043493][T13570] device sit0 left promiscuous mode [ 333.115599][T13572] device sit0 entered promiscuous mode [ 333.618444][T13613] device syzkaller0 entered promiscuous mode [ 333.924096][ T24] audit: type=1400 audit(1778842842.950:173): avc: denied { associate } for pid=13624 comm="syz.0.3685" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 334.896037][T13650] device syzkaller0 entered promiscuous mode [ 335.383448][T13676] device syzkaller0 entered promiscuous mode [ 339.210747][T13834] device syzkaller0 entered promiscuous mode [ 339.984172][T13899] device veth1_macvtap left promiscuous mode [ 340.002710][T13899] device macsec0 entered promiscuous mode [ 340.815529][T13938] device syzkaller0 entered promiscuous mode [ 341.794296][T13983] ref_ctr_offset mismatch. inode: 0x1ef offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 341.841979][T13984] ref_ctr_offset mismatch. inode: 0x1ef offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 342.221859][T13994] device syzkaller0 entered promiscuous mode [ 342.786191][T14008] device syzkaller0 entered promiscuous mode [ 344.757807][T14048] device syzkaller0 entered promiscuous mode [ 344.986971][T14062] device syzkaller0 entered promiscuous mode [ 345.136412][T14075] device syzkaller0 entered promiscuous mode [ 345.393986][T14099] device syzkaller0 entered promiscuous mode [ 345.532635][T14107] device syzkaller0 entered promiscuous mode [ 345.562045][ T24] audit: type=1400 audit(1778842854.590:174): avc: denied { read } for pid=14108 comm="syz.1.3819" name="cgroup.subtree_control" dev="cgroup2" ino=350 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 345.677377][T14117] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 345.691053][T14117] pim6reg0: linktype set to 6 [ 346.790500][T14136] device wg2 entered promiscuous mode [ 348.618871][T14228] device syzkaller0 entered promiscuous mode [ 349.708612][ T24] audit: type=1400 audit(1778842858.730:175): avc: denied { create } for pid=14295 comm="syz.3.3871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 352.327709][T14457] device syzkaller0 entered promiscuous mode [ 352.344354][T14458] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 354.398724][T14560] device syzkaller0 entered promiscuous mode [ 356.418096][T14653] device syzkaller0 entered promiscuous mode [ 357.008630][T14698] device syzkaller0 entered promiscuous mode [ 359.269137][T14792] device syzkaller0 entered promiscuous mode [ 360.875589][T14814] device syzkaller0 entered promiscuous mode [ 362.008878][T14876] tun0: tun_chr_ioctl cmd 1074025677 [ 362.070224][T14876] tun0: linktype set to 270 [ 363.259325][T14981] device syzkaller0 entered promiscuous mode [ 363.496175][T15008] @0: renamed from bond_slave_1 [ 365.401143][T15095] device wg2 left promiscuous mode [ 367.510663][T15186] tun0: tun_chr_ioctl cmd 1074025677 [ 367.515975][T15186] tun0: linktype set to 780 [ 367.665375][ T24] audit: type=1400 audit(1778842876.690:176): avc: denied { mounton } for pid=15190 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 367.797137][T15190] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.819932][T15190] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.827381][T15190] device bridge_slave_0 entered promiscuous mode [ 367.867904][T15190] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.899824][T15190] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.930183][T15190] device bridge_slave_1 entered promiscuous mode [ 368.563865][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.583241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.764646][T15216] device syzkaller0 entered promiscuous mode [ 368.834227][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.843579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.852039][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.859090][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.866924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.875504][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.883859][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.890934][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.898433][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 368.906876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.915050][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 368.923243][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.931578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.985121][T15190] device veth0_vlan entered promiscuous mode [ 369.017088][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 369.060136][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.098993][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 369.117573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 369.137990][T15190] device veth1_macvtap entered promiscuous mode [ 369.154552][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 369.255772][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 369.310142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 369.396305][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 369.443169][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 369.527788][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 369.571628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 369.611854][ T24] audit: type=1400 audit(1778842878.640:177): avc: denied { unmount } for pid=15190 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 369.794819][ T24] audit: type=1400 audit(1778842878.820:178): avc: denied { create } for pid=15249 comm="syz.2.4137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 371.128563][T15291] device syzkaller0 entered promiscuous mode [ 371.727069][T15297] syz.0.4154[15297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.727117][T15297] syz.0.4154[15297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.427434][T15389] bridge0: port 3(vlan1) entered blocking state [ 373.453322][T15389] bridge0: port 3(vlan1) entered disabled state [ 373.548365][T15389] device vlan1 entered promiscuous mode [ 373.631222][T15412] device syzkaller0 entered promiscuous mode [ 375.253587][T15525] device syzkaller0 entered promiscuous mode [ 377.845674][T15571] device syzkaller0 entered promiscuous mode [ 378.354917][T15613] device sit0 entered promiscuous mode [ 379.372047][T15669] syz.2.4258 (15669) used obsolete PPPIOCDETACH ioctl [ 380.171200][T15678] device syzkaller0 entered promiscuous mode [ 380.457790][T15676] 8021q: VLANs not supported on  [ 387.290405][T15853] device macsec0 left promiscuous mode [ 387.326724][T15845] device syzkaller0 entered promiscuous mode [ 388.292784][T15909] bY4`Ҙ: renamed from lo [ 388.525374][T15917] device veth0_vlan left promiscuous mode [ 388.559992][T15917] device veth0_vlan entered promiscuous mode [ 388.686678][T15935] device veth0_vlan left promiscuous mode [ 388.789211][T15935] device veth0_vlan entered promiscuous mode [ 388.899839][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.910984][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.938997][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.004634][T15970] device syzkaller0 entered promiscuous mode [ 389.193872][T15974] bridge0: port 3(gretap0) entered blocking state [ 389.257402][T15974] bridge0: port 3(gretap0) entered disabled state [ 389.302504][T15974] device gretap0 entered promiscuous mode [ 389.329949][T15974] bridge0: port 3(gretap0) entered blocking state [ 389.336413][T15974] bridge0: port 3(gretap0) entered forwarding state [ 389.578586][T15988] device syzkaller0 entered promiscuous mode [ 389.930495][T16049] device syzkaller0 entered promiscuous mode [ 390.530716][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.892392][T16150] device syzkaller0 entered promiscuous mode [ 392.795447][T16190] device sit0 entered promiscuous mode [ 393.274609][T16220] device syzkaller0 entered promiscuous mode [ 395.716875][T16308] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.739978][T16308] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.747040][T16308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.867969][T16308] device bridge0 entered promiscuous mode [ 400.205941][T16556] device syzkaller0 entered promiscuous mode [ 400.783945][T16610] device syzkaller0 entered promiscuous mode [ 401.167325][T16639] device syzkaller0 entered promiscuous mode [ 401.913472][T16673] cgroup: fork rejected by pids controller in /syz4 [ 404.295019][T16856] device wg2 entered promiscuous mode [ 404.304878][T16858] device syzkaller0 entered promiscuous mode [ 404.696652][T16855] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.703746][T16855] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.711193][T16855] device bridge_slave_0 entered promiscuous mode [ 404.718222][T16855] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.725322][T16855] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.812861][T16855] device bridge_slave_1 entered promiscuous mode [ 404.996764][T16855] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.003838][T16855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.011140][T16855] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.018157][T16855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.061134][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.069007][T16684] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.078032][T16684] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.092332][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 405.109446][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.144420][T16684] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.151517][T16684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.174924][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 405.190586][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.204775][T16684] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.211849][T16684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.221798][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 405.230214][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.265376][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 405.275614][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.316590][T16855] device veth0_vlan entered promiscuous mode [ 405.324530][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 405.333334][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.344764][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 405.353191][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.406286][T16907] device veth1_macvtap left promiscuous mode [ 405.413224][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.420819][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.428198][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 405.436888][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.445366][T16907] device veth1_macvtap entered promiscuous mode [ 405.451703][T16907] device macsec0 entered promiscuous mode [ 405.460797][T16855] device veth1_macvtap entered promiscuous mode [ 405.475055][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 405.483188][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 405.491799][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 405.514025][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 405.522978][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 405.736421][T16921] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.743929][T16921] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.751510][T16921] device bridge_slave_0 entered promiscuous mode [ 405.759992][T16921] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.767023][T16921] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.774758][T16921] device bridge_slave_1 entered promiscuous mode [ 406.174326][T16959] device macsec0 entered promiscuous mode [ 406.301570][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 406.310068][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.351566][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 406.363365][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 406.406795][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.413880][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.427742][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 406.452002][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.476640][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.483731][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.526198][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 406.547182][T16964] device syzkaller0 entered promiscuous mode [ 406.585614][T16981] device syzkaller0 entered promiscuous mode [ 406.594914][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 406.623774][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 406.650087][T16983] device syzkaller0 entered promiscuous mode [ 406.664123][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 406.675134][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 406.723677][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 406.734605][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 406.751356][T16921] device veth0_vlan entered promiscuous mode [ 406.786272][T16921] device veth1_macvtap entered promiscuous mode [ 406.802402][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 406.819982][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.828513][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 406.837116][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 406.845767][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 406.854410][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.862545][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 407.124464][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 407.136963][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 407.145693][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 407.154336][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 408.079190][ T7] device bridge_slave_1 left promiscuous mode [ 408.085483][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.093218][ T7] device bridge_slave_0 left promiscuous mode [ 408.099393][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.107968][ T7] device veth1_macvtap left promiscuous mode [ 408.114088][ T7] device veth0_vlan left promiscuous mode [ 409.775051][T17126] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 409.783956][T17126] device syzkaller0 entered promiscuous mode [ 413.213737][T17246] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 413.449031][T17246] device syzkaller0 entered promiscuous mode [ 413.630292][T17265] device wg2 entered promiscuous mode [ 413.690971][T17269] tap0: tun_chr_ioctl cmd 1074025673 [ 414.190531][T17287] device wg2 left promiscuous mode [ 415.113328][T17307] device syzkaller0 entered promiscuous mode [ 419.223737][ T24] audit: type=1400 audit(1778842928.250:179): avc: denied { create } for pid=17515 comm="syz.3.4734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 419.466885][T17547] device syzkaller0 entered promiscuous mode [ 419.912667][T17579] device syzkaller0 entered promiscuous mode [ 422.308246][T17676] bridge0: port 3(gretap0) entered disabled state [ 422.314791][T17676] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.321953][T17676] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.335978][T17673] device aaaaaaaaaaaaaaa entered promiscuous mode [ 422.387092][T17679] device gretap0 left promiscuous mode [ 422.392783][T17679] bridge0: port 3(gretap0) entered disabled state [ 422.399674][T17679] device bridge_slave_1 left promiscuous mode [ 422.406136][T17679] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.413611][T17679] device bridge_slave_0 left promiscuous mode [ 422.419810][T17679] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.422185][ T24] audit: type=1400 audit(1778842932.450:180): avc: denied { create } for pid=17704 comm="syz.1.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 423.836941][T17719] device syzkaller0 entered promiscuous mode [ 426.031211][T17794] : renamed from vlan1 [ 426.686324][T17826] device syzkaller0 entered promiscuous mode [ 426.754345][T17831] : port 1(vlan1) entered blocking state [ 426.782935][T17831] : port 1(vlan1) entered disabled state [ 426.793147][T17831] device vlan1 entered promiscuous mode [ 429.819503][T17983] device syzkaller0 entered promiscuous mode [ 433.992935][T18054] tun0: tun_chr_ioctl cmd 1074025677 [ 433.998251][T18054] tun0: linktype set to 820 [ 435.848639][T18103] device syzkaller0 entered promiscuous mode [ 437.266649][T18167] device veth1_macvtap left promiscuous mode [ 439.162160][T18208] : port 1(ip6gretap0) entered blocking state [ 439.168343][T18208] : port 1(ip6gretap0) entered disabled state [ 439.470251][T18208] device ip6gretap0 entered promiscuous mode [ 443.911329][T18332] device ip6tnl0 entered promiscuous mode [ 445.119824][T18385] bridge0: port 3(gretap0) entered blocking state [ 445.203768][T18385] bridge0: port 3(gretap0) entered disabled state [ 445.220210][T18385] device gretap0 entered promiscuous mode [ 445.252777][T18385] bridge0: port 3(gretap0) entered blocking state [ 445.259221][T18385] bridge0: port 3(gretap0) entered forwarding state [ 445.554767][T18423] : renamed from team_slave_1 [ 446.326974][T18487] device syzkaller0 entered promiscuous mode [ 448.055443][T18624] device wg2 entered promiscuous mode [ 448.808054][T18658] device wg2 left promiscuous mode [ 449.230351][T18722] tap0: tun_chr_ioctl cmd 1074025677 [ 449.250118][T18722] tap0: linktype set to 805 [ 449.387671][T18728] device syzkaller0 entered promiscuous mode [ 450.629098][T18805] device syzkaller0 entered promiscuous mode [ 450.823005][T18832] device ip6gretap0 left promiscuous mode [ 450.834698][T18832] : port 1(ip6gretap0) entered disabled state [ 451.281533][T18861] device syzkaller0 entered promiscuous mode [ 451.809319][T18913] device syzkaller0 entered promiscuous mode [ 452.177114][T18946] : renamed from bond_slave_0 [ 452.235972][T18960] device syzkaller0 entered promiscuous mode [ 453.800250][T19060] device syzkaller0 entered promiscuous mode [ 455.432350][T19134] ref_ctr_offset mismatch. inode: 0x9ed offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 456.247135][T19205] device left promiscuous mode [ 456.340362][T19205] bridge0: port 3() entered disabled state [ 456.444439][T19205] device bridge_slave_1 left promiscuous mode [ 456.454206][T19205] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.472208][T19205] device bridge_slave_0 left promiscuous mode [ 456.542839][T19205] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.093721][T19238] device wg2 entered promiscuous mode [ 457.192225][T19233] device wg2 entered promiscuous mode [ 458.694041][ T24] audit: type=1400 audit(1778842967.720:181): avc: denied { create } for pid=19301 comm="syz.2.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 458.758570][T19304] device syzkaller0 entered promiscuous mode [ 458.872080][T19306] device wg2 left promiscuous mode [ 459.004632][T19308] device wg2 entered promiscuous mode [ 459.161601][T19331] gretap0: mtu less than device minimum [ 459.764006][T19367] device syzkaller0 entered promiscuous mode [ 460.212345][T19400] device syzkaller0 entered promiscuous mode [ 461.565003][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 461.573817][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 461.580872][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 463.396145][T19561] device syzkaller0 entered promiscuous mode [ 463.746320][T19565] -1: renamed from syzkaller0 [ 464.203778][T19575] device syzkaller0 entered promiscuous mode [ 464.684284][T19598] device syzkaller0 entered promiscuous mode [ 466.353591][T19682] : port 1(vlan1) entered blocking state [ 466.359583][T19682] : port 1(vlan1) entered disabled state [ 466.380240][T19682] device vlan1 entered promiscuous mode [ 467.002218][T19704] batadv0: tun_chr_ioctl cmd 1074025680 [ 467.198484][T19719] 8021q: VLANs not supported on  [ 470.458917][T19864] device syzkaller0 entered promiscuous mode [ 471.532819][T19909] device syzkaller0 entered promiscuous mode [ 473.311636][T19955] device wg2 left promiscuous mode [ 473.581342][T19955] device wg2 entered promiscuous mode [ 476.002507][T20101] device syzkaller0 entered promiscuous mode [ 476.228489][T20124] device sit0 entered promiscuous mode [ 476.504371][T20144] device syzkaller0 entered promiscuous mode [ 476.611715][T20153] geneve1: tun_chr_ioctl cmd 2147767517 [ 476.778654][T20169] device wg2 left promiscuous mode [ 477.607575][T20230] device syzkaller0 entered promiscuous mode [ 477.765171][T20244] device sit0 entered promiscuous mode [ 478.131617][T20241] device sit0 left promiscuous mode [ 478.304968][T20253] device syzkaller0 entered promiscuous mode [ 478.515337][T20251] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.534410][T20251] bridge0: port 1(bridge_slave_0) entered disabled state [ 478.541988][T20251] device bridge_slave_0 entered promiscuous mode [ 478.553974][T20251] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.561437][T20251] bridge0: port 2(bridge_slave_1) entered disabled state [ 478.568866][T20251] device bridge_slave_1 entered promiscuous mode [ 479.037865][T20251] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.044936][T20251] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.052207][T20251] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.059226][T20251] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.177851][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 479.189457][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.210129][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.283012][T20294] device syzkaller0 entered promiscuous mode [ 479.299020][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 479.307498][ T301] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.314576][ T301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.322205][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 479.330544][ T301] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.337582][ T301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.371331][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 479.384188][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 479.394171][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 479.402587][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 479.425377][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 479.434648][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 479.444676][T20251] device veth0_vlan entered promiscuous mode [ 479.508640][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 479.560194][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 479.635364][T20251] device veth1_macvtap entered promiscuous mode [ 479.681487][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 479.703835][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 479.711423][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 479.719592][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 479.728510][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 479.770809][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 479.779382][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 479.788813][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 479.797871][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 479.877884][T20318] device syzkaller0 entered promiscuous mode [ 480.004851][T20317] device syzkaller0 entered promiscuous mode [ 480.263946][ T7] device bridge_slave_1 left promiscuous mode [ 480.275630][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.309185][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.340628][ T7] device veth0_vlan left promiscuous mode [ 480.524250][T20386] device syzkaller0 entered promiscuous mode [ 484.106562][T20559] device sit0 entered promiscuous mode [ 485.601670][T20590] device syzkaller0 entered promiscuous mode [ 486.009307][T20642] device sit0 left promiscuous mode [ 486.052026][T20642] device sit0 entered promiscuous mode [ 486.224716][T20664] device syzkaller0 entered promiscuous mode [ 486.459401][T20698] device syzkaller0 entered promiscuous mode [ 486.608251][T20715] IPv6: pim6reg1: Disabled Multicast RS [ 486.776035][T20731] gretap0: mtu less than device minimum [ 486.860529][T20733] device syzkaller0 entered promiscuous mode [ 487.494189][T20762] : port 1(ip6gretap0) entered blocking state [ 487.505123][T20762] : port 1(ip6gretap0) entered disabled state [ 487.562214][T20762] device ip6gretap0 entered promiscuous mode [ 487.688608][T20769] device ip6gretap0 left promiscuous mode [ 487.694869][T20769] : port 1(ip6gretap0) entered disabled state [ 487.772369][T20775] device syzkaller0 entered promiscuous mode [ 488.736851][T20877] device syzkaller0 entered promiscuous mode [ 488.983503][T20898] device syzkaller0 entered promiscuous mode [ 489.027460][T20899] ref_ctr_offset mismatch. inode: 0xc31 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 489.127664][T20919] device syzkaller0 entered promiscuous mode [ 489.161953][T20922] pim6reg: tun_chr_ioctl cmd 2147767517 [ 489.863208][T20980] bridge0: port 1(bridge_slave_0) entered blocking state [ 489.870500][T20980] bridge0: port 1(bridge_slave_0) entered disabled state [ 489.889650][T20980] device bridge_slave_0 entered promiscuous mode [ 489.902394][T20980] bridge0: port 2(bridge_slave_1) entered blocking state [ 489.909548][T20980] bridge0: port 2(bridge_slave_1) entered disabled state [ 489.917040][T20980] device bridge_slave_1 entered promiscuous mode [ 489.995049][T20980] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.002123][T20980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.009361][T20980] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.016398][T20980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.087698][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 490.096171][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 490.105366][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 490.113661][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 490.121863][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 490.129329][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 490.154476][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 490.169158][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.177574][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.185183][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.194729][T20980] device veth0_vlan entered promiscuous mode [ 490.207523][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 490.217829][T20980] device veth1_macvtap entered promiscuous mode [ 490.229409][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 490.261090][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 492.430230][T21150] device team_slave_0 entered promiscuous mode [ 492.469034][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 492.539933][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 492.747072][T21161] device veth1_macvtap left promiscuous mode [ 492.761456][T21161] device macsec0 entered promiscuous mode [ 492.780806][T21161] device veth1_macvtap entered promiscuous mode [ 497.034596][T21274] tap0: tun_chr_ioctl cmd 1074025677 [ 497.142212][T21274] tap0: linktype set to 823 [ 499.615696][T21353] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 499.745231][T21358] device dummy0 entered promiscuous mode [ 500.662265][T21403] device syzkaller0 entered promiscuous mode [ 501.370015][T21448] device syzkaller0 entered promiscuous mode [ 501.378329][T21448] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 502.617325][T21524] geneve1: tun_chr_ioctl cmd 2147767517 [ 504.123566][T21623] bridge0: port 3(gretap0) entered blocking state [ 504.277584][T21623] bridge0: port 3(gretap0) entered disabled state [ 504.494063][T21623] device gretap0 entered promiscuous mode [ 504.533589][T21623] bridge0: port 3(gretap0) entered blocking state [ 504.542553][T21623] bridge0: port 3(gretap0) entered forwarding state [ 504.744077][T21641] device syzkaller0 entered promiscuous mode [ 505.134587][T21668] tun0: tun_chr_ioctl cmd 1074025677 [ 505.261743][T21668] tun0: linktype set to 270 [ 506.402850][T21712] device veth1_macvtap left promiscuous mode [ 506.411115][T21712] device macsec0 left promiscuous mode [ 506.553817][T21712] device macsec0 entered promiscuous mode [ 506.559537][T21712] device veth1_macvtap entered promiscuous mode [ 508.550105][T21775] device wg2 entered promiscuous mode [ 508.569030][T21779] device syzkaller0 entered promiscuous mode [ 512.255715][T21903] device syzkaller0 entered promiscuous mode [ 513.015157][T21924] device syzkaller0 entered promiscuous mode [ 513.338140][T21941] device syzkaller0 entered promiscuous mode [ 513.577864][T21966] device syzkaller0 entered promiscuous mode [ 514.792909][T22033] device syzkaller0 entered promiscuous mode [ 514.811081][T22035] device syzkaller0 entered promiscuous mode [ 516.717196][T22170] device syzkaller0 entered promiscuous mode [ 516.980547][T22180] device syzkaller0 entered promiscuous mode [ 518.830738][T22238] device wg2 left promiscuous mode [ 518.865283][T22241] device veth1 entered promiscuous mode [ 519.667996][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 520.609288][T22336] device syzkaller0 entered promiscuous mode [ 523.183201][T22431] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 523.213355][T22431] device syzkaller0 entered promiscuous mode [ 523.224653][T22421] device sit0 left promiscuous mode [ 524.430620][T22471] device syzkaller0 entered promiscuous mode [ 524.823395][T22517] device wg2 entered promiscuous mode [ 526.009919][T22537] device syzkaller0 entered promiscuous mode [ 526.526334][T22557] device syzkaller0 left promiscuous mode [ 529.431185][T22616] device syzkaller0 entered promiscuous mode [ 531.274193][T22715] sock: sock_set_timeout: `syz.4.6202' (pid 22715) tries to set negative timeout [ 532.472288][T22772] device syzkaller0 entered promiscuous mode [ 532.638407][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 533.761494][T22885] device syzkaller0 entered promiscuous mode [ 534.808692][T22945] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 534.938416][T22945] device syzkaller0 entered promiscuous mode [ 535.077745][T22956] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.666794][T23013] device syzkaller0 entered promiscuous mode [ 536.815315][T23009] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.830982][T23009] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.838517][T23009] device bridge_slave_0 entered promiscuous mode [ 536.855498][T23009] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.916773][T23009] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.978118][T23009] device bridge_slave_1 entered promiscuous mode [ 537.205496][T23009] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.212588][T23009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.219859][T23009] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.226873][T23009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.381014][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.409161][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.501005][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 537.520264][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 537.561342][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 537.572880][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 537.581714][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.588740][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.597201][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 537.605812][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 537.614350][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.621390][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.640448][T23062] bridge0: port 4(ip6gretap0) entered blocking state [ 537.647165][T23062] bridge0: port 4(ip6gretap0) entered disabled state [ 537.654560][T23062] device ip6gretap0 entered promiscuous mode [ 537.660834][T23062] bridge0: port 4(ip6gretap0) entered blocking state [ 537.667518][T23062] bridge0: port 4(ip6gretap0) entered forwarding state [ 537.679886][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 537.688803][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 537.696830][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 537.709568][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 537.996355][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 538.008720][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 538.110369][T23009] device veth0_vlan entered promiscuous mode [ 538.120163][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 538.133389][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 538.141442][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 538.148881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 538.233795][T23009] device veth1_macvtap entered promiscuous mode [ 538.386685][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 538.397973][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 538.406205][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 538.580301][T16684] device vlan1 left promiscuous mode [ 538.585772][T16684] : port 1(vlan1) entered disabled state [ 538.681062][T16684] device veth0_vlan left promiscuous mode [ 538.802014][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 538.810474][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 538.828649][T23102] device aaaaaaaaaaaaaaa entered promiscuous mode [ 538.897251][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 538.905559][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 539.632918][T23154] 0: renamed from pim6reg1 [ 539.881555][T23180] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 539.900212][T23180] pim6reg0: linktype set to 774 [ 539.940013][T23187] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 539.999804][T23187] pim6reg0: linktype set to 774 [ 541.918186][T23281] device wg2 entered promiscuous mode [ 544.144669][T23408] device syzkaller0 entered promiscuous mode [ 545.087832][T23429] device syzkaller0 left promiscuous mode [ 547.656339][T23469] device syzkaller0 entered promiscuous mode [ 548.044753][T23478] device syzkaller0 entered promiscuous mode [ 548.090083][T23478] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 548.223442][T23506] tun0: tun_chr_ioctl cmd 2148553947 [ 548.232732][T23506] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 548.238380][T23506] pim6reg0: linktype set to 776 [ 548.469607][T23525] bridge0: port 3(vlan1) entered blocking state [ 548.476449][T23525] bridge0: port 3(vlan1) entered disabled state [ 548.483229][T23525] device vlan1 entered promiscuous mode [ 548.584826][T23535] device syzkaller0 entered promiscuous mode [ 550.693111][T23666] device syzkaller0 entered promiscuous mode [ 550.927145][T23679] IPv6: : Disabled Multicast RS [ 551.355067][T23725] device syzkaller0 entered promiscuous mode [ 551.584096][T23739] device syzkaller0 entered promiscuous mode [ 551.800013][T23751] device syzkaller0 entered promiscuous mode [ 552.743083][T23784] device veth1_to_bond entered promiscuous mode [ 554.740983][ T24] audit: type=1400 audit(1778843063.770:182): avc: denied { create } for pid=23837 comm="syz.2.6518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 554.953718][T23840] cgroup: fork rejected by pids controller in /syz3 [ 555.432855][T23883] device sit0 entered promiscuous mode [ 556.497255][T24094] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.504521][T24094] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.512400][T24094] device bridge_slave_0 entered promiscuous mode [ 556.519437][T24094] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.526541][T24094] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.534894][T24094] device bridge_slave_1 entered promiscuous mode [ 556.587146][T24094] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.594214][T24094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 556.601497][T24094] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.608523][T24094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 556.630318][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 556.644291][T16684] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.661739][T16684] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.691177][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 556.700899][T16684] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.707935][T16684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 556.715843][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 556.724404][T16684] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.731907][T16684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 556.749782][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 556.757802][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 556.782354][ T301] bridge0: port 4(ip6gretap0) entered disabled state [ 556.793556][ T301] device ip6gretap0 left promiscuous mode [ 556.799293][ T301] bridge0: port 4(ip6gretap0) entered disabled state [ 556.824601][T24094] device veth0_vlan entered promiscuous mode [ 556.837795][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 556.846859][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 556.854996][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 556.862523][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 556.886322][T24094] device veth1_macvtap entered promiscuous mode [ 556.893815][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 556.918273][T24113] bridge0: port 1(bridge_slave_0) entered blocking state [ 556.926304][T24113] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.935441][T24113] device bridge_slave_0 entered promiscuous mode [ 556.942637][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 556.957226][T24113] bridge0: port 2(bridge_slave_1) entered blocking state [ 556.964285][T24113] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.971978][T24113] device bridge_slave_1 entered promiscuous mode [ 556.978839][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 557.218318][T24135] device syzkaller0 entered promiscuous mode [ 557.249102][T24135] device syzkaller0 left promiscuous mode [ 557.284380][T24137] device syzkaller0 entered promiscuous mode [ 557.324779][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 557.338931][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 557.370070][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 557.378519][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.387144][ T1208] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.394199][ T1208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.401965][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 557.439496][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 557.448407][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.456853][ T1208] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.463925][ T1208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.472721][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 557.480880][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 557.499446][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 557.530284][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 557.543281][T24113] device veth0_vlan entered promiscuous mode [ 557.551264][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 557.559539][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 557.568002][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 557.617893][ T1208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 557.701954][T24113] device veth1_macvtap entered promiscuous mode [ 557.734470][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 557.746371][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 557.878038][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 558.012920][T16684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 558.039746][T24163] : renamed from team_slave_1 [ 558.053887][T24159] device veth1_macvtap left promiscuous mode [ 558.430639][ T301] bridge0: port 3(gretap0) entered disabled state [ 558.439302][ T301] device gretap0 left promiscuous mode [ 558.444991][ T301] bridge0: port 3(gretap0) entered disabled state [ 558.454671][T24167] device veth1_macvtap entered promiscuous mode [ 558.461126][T24167] device macsec0 entered promiscuous mode [ 558.585971][T24196] device syzkaller0 entered promiscuous mode [ 558.777725][ T301] device bridge_slave_1 left promiscuous mode [ 558.820730][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.940643][ T301] device bridge_slave_0 left promiscuous mode [ 558.984868][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.068873][ T301] device vlan1 left promiscuous mode [ 559.115396][ T301] bridge0: port 3(vlan1) entered disabled state [ 559.174785][ T301] device bridge_slave_1 left promiscuous mode [ 559.247210][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.332958][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.417877][ T301] device veth1_macvtap left promiscuous mode [ 559.423936][ T301] device veth0_vlan left promiscuous mode [ 559.443407][ T301] device veth1_macvtap left promiscuous mode [ 560.245163][T24235] device syzkaller0 entered promiscuous mode [ 564.654447][T24341] device syzkaller0 entered promiscuous mode [ 567.167523][ T7617] ------------[ cut here ]------------ [ 567.173155][ T7617] kernel BUG at kernel/bpf/arraymap.c:993! [ 567.210503][ T7617] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 567.216588][ T7617] CPU: 0 PID: 7617 Comm: kworker/0:28 Tainted: G W syzkaller #0 [ 567.225502][ T7617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 567.235557][ T7617] Workqueue: events prog_array_map_clear_deferred [ 567.241971][ T7617] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 567.248194][ T7617] Code: 61 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 61 e9 ff 0f 0b e9 78 f9 ff ff e8 8c 61 e9 ff 0f 0b e8 85 61 e9 ff <0f> 0b e8 7e 61 e9 ff 0f 0b e8 77 61 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 567.267785][ T7617] RSP: 0018:ffffc90001447c18 EFLAGS: 00010293 [ 567.273830][ T7617] RAX: ffffffff817b560b RBX: ffff88810cf70290 RCX: ffff888117e98000 [ 567.281775][ T7617] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 567.289760][ T7617] RBP: ffffc90001447c98 R08: ffffffff864ea6c7 R09: 1ffffffff0c9d4d8 [ 567.297708][ T7617] R10: dffffc0000000000 R11: fffffbfff0c9d4d9 R12: 00000000fffffff0 [ 567.305740][ T7617] R13: ffff88810be81480 R14: 0000000000000001 R15: ffff88810be81400 [ 567.313693][ T7617] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 567.322595][ T7617] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 567.329149][ T7617] CR2: 0000000100000001 CR3: 0000000103fac000 CR4: 00000000003506b0 [ 567.337094][ T7617] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 567.345036][ T7617] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 567.352982][ T7617] Call Trace: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 567.356255][ T7617] ? bpf_prog_2c953d72039e662e+0xb/0x2a4 [ 567.361873][ T7617] fd_array_map_delete_elem+0x14c/0x250 [ 567.367403][ T7617] prog_array_map_clear_deferred+0x9e/0x140 [ 567.373271][ T7617] process_one_work+0x6e1/0xba0 [ 567.378094][ T7617] worker_thread+0xa6a/0x13c0 [ 567.382746][ T7617] kthread+0x346/0x3d0 [ 567.386784][ T7617] ? worker_clr_flags+0x190/0x190 [ 567.391788][ T7617] ? kthread_blkcg+0xd0/0xd0 [ 567.396442][ T7617] ret_from_fork+0x1f/0x30 [ 567.400842][ T7617] Modules linked in: [ 567.415632][ T24] audit: type=1400 audit(1778843076.430:183): avc: denied { write } for pid=271 comm="syz-executor" path="pipe:[14471]" dev="pipefs" ino=14471 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 567.444331][ T7617] ---[ end trace 635dac29216f0076 ]--- [ 567.458574][ T7617] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 567.474022][ T7617] Code: 61 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 98 61 e9 ff 0f 0b e9 78 f9 ff ff e8 8c 61 e9 ff 0f 0b e8 85 61 e9 ff <0f> 0b e8 7e 61 e9 ff 0f 0b e8 77 61 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 567.510025][T24446] device dummy0 entered promiscuous mode [ 567.529718][ T7617] RSP: 0018:ffffc90001447c18 EFLAGS: 00010293 [ 567.539686][ T7617] RAX: ffffffff817b560b RBX: ffff88810cf70290 RCX: ffff888117e98000 [ 567.566271][ T7617] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 567.578469][ T7617] RBP: ffffc90001447c98 R08: ffffffff864ea6c7 R09: 1ffffffff0c9d4d8 [ 567.629344][ T7617] R10: dffffc0000000000 R11: fffffbfff0c9d4d9 R12: 00000000fffffff0 [ 567.637390][ T7617] R13: ffff88810be81480 R14: 0000000000000001 R15: ffff88810be81400 [ 567.659712][ T7617] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 567.668665][ T7617] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 567.675291][ T7617] CR2: 00007f25bf53e990 CR3: 0000000138dc6000 CR4: 00000000003506b0 [ 567.683297][ T7617] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 567.691296][ T7617] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 567.699342][ T7617] Kernel panic - not syncing: Fatal exception [ 567.705739][ T7617] Kernel Offset: disabled [ 567.710049][ T7617] Rebooting in 86400 seconds..