last executing test programs: 1m30.851101911s ago: executing program 4 (id=8418): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0xf, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x100, 0x5800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x28, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200000000000000"], 0x0, 0x26}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r4}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x20, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7595}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61158c000000000061134c0000000000bfa00000000000001705000008004ef02d3501000000000095000000000000006916000000000000bf67000000000000350605000fff07206706000004000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9d0cc7d3b4814261bdb94a050000a28a404be266df76965947c73c00c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b540dcfc7ad0500c4063b3b8754c0686cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e567238809000000000000000ae2fb494059bba8e3b680324a188090eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb40000000000000000000000000040007abf9c20d89cbc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eb29000000000000003cc3aa39ee4b1386bab561cda886fa64ffffff7f473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59801fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d00000000d3114dbc7e2bf2402a75fd7a5573336004088000000000000000fb38c7f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf73400000000000000cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce91798adc2dca8710d5c617df01f82a73f6bd61d1f5b2a443faa9bda0577383dc18402cde8bf777b2eaa45c940aabc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db009acaba9eaea90000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8a10300004d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224bb031bbee6d23cef7074f6d718b06ca80b57aa183dd0c39e9d8547c666b6764a3c7dd62a94eee45881441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a365b5b11df7216652b5703f31e078ecdefe8e6bfc45a9980a7a8de863e3477dd47d0f11611ca92d89641a183c8f629f17cfc28fde209a793d9c0cdde3bb3f82670d33396982988b9f5207a732908fdf1506f307ccae47a69319ee2242272e4f7ceb7a40e49a21ce6405af3ecb3381bf0668749c81fc6c2d97e68a693e3e622af52e572f4fa7b20d5c72cf5ff8016461130a46803de45029489921a48bd7688dd593e4a3e9803263ecbd8ae8570293508ebe5fabc1842cbc01ae8fabbf41820c31b7bb83a3439d4540f839ed5c23828a33d7645baa1ec32bb7aa8a786bb0997ccf6bba0a2cf6ef2157a63974d5e525a3f3f7f993ea9e82732ccc2e12c631012175d5d474bef818bdf8f27a7e563684a225dee6ca5f5ff18a89ac6c627ff0e0e4769b6fbcfc847b20960704a4b13e962333bddb966de8bcade6f6bd3915a580ddec2e1bd88fbfdb749789cdc946822212f1cbacb03ba8d3e51e48ccdae20a43bf79ca0131b830620a97877242989e78dfec1d6df5f97ca5cddece50d0cae5d6eabbc1913aa3660e0b00000000000000000000000000bc16b71cb118d93461aa2914d6e454ef05c41beab7382787ba46b68c8d8b35da9fb58b259b4447b59c667ddcac0bb2d066eb0579be84bdca8ed5d693411b7e5b21efaceddacef03daa9772f2715b5613ae0d88f8d109e36f8b8871b646d9ebbcc25d527ad3f828c92cb6597f82ed4d496a511007781be0c7cac07fc508a585f415ef81a887475286df80fb6ff9c6524d0e22d50f88ca15545bc688063b04eb8e0248aca60b9983dd5966216499ccfc0551f6e0323859ae64f55e4d496a695f8e6382aa714b92f95dcfd0b456d9ce7a24f736e4009ef64230e8f83f8283a4cc5f178d4698b94ccd8d0e0e3e2e35e1a7ac0cb3ee52013e8c2802d2f89b3f708fb53c17c3e4fbe0326ee510c4317b5f5f1eb34ca8441c23755acfc469909b16fba134de01d484c1b380622d37"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x37de6c8a68769c38}, 0x48) 1m30.225603504s ago: executing program 4 (id=8429): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2501, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x2}, 0x828, 0x0, 0x0, 0x0, 0x10000, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x2}, 0x50) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540)=0xffffffffffffffff, 0x4) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x32, 0x9, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, [@map_fd={0x18, 0xa, 0x1, 0x0, r4}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000480)='syzkaller\x00', 0x9, 0x3, &(0x7f00000004c0)=""/3, 0x0, 0x12, '\x00', 0x0, @fallback=0x13, r5, 0x8, &(0x7f0000000580)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0x9, 0x2, 0x6}, 0x10, 0xffffffffffffffff, r1, 0x2, &(0x7f00000006c0)=[r6], &(0x7f0000000700)=[{0x7, 0x1, 0xc, 0x9}, {0x5, 0x3, 0xd, 0x9}], 0x10, 0x8}, 0x94) recvmsg$unix(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180)=r7, 0x17e) recvmsg$unix(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)=""/100, 0x64}], 0x1, &(0x7f0000000300)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x2) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r7, r1, 0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce"], 0xfdef) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f2, &(0x7f0000000080)) 1m29.342979484s ago: executing program 4 (id=8445): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000300)=r3, 0x4) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000300)=r3, 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x20, 0x4, 0x3f, 0xfffff004}, {0x16, 0x4, 0x6, 0xfffffffe}]}) (async) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x20, 0x4, 0x3f, 0xfffff004}, {0x16, 0x4, 0x6, 0xfffffffe}]}) 1m29.25137983s ago: executing program 4 (id=8446): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x88104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23ffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000005"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2a}]}, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2a}]}, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="3f7940318ff9feea93011ee16a1ca2b539567bb31118b7158899508e97c4452972e4d888a70d9d7c4920047e3df11ee11ff396a0b274d8caf4921a0ea0732e18a1fa1989baed2945e7b9a7afede73c0a91c74ef5e38dce6daf027ab0bf304fcc7be8e18767be937b6921d712d76af8bf22041698961393eaca576ad30fccef87b1bc3694a2c1bf2af202b15c3b30e925d31fe09b88d46bc56173938f4562c1af99ce7b7075413d532db29d5adc913d60d645f643bd01ea3e698200e39a21569caa69ea37766a837c29409ba11d572300c91ea9ba66f660c615936cfd8456058b3360199089", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="3f7940318ff9feea93011ee16a1ca2b539567bb31118b7158899508e97c4452972e4d888a70d9d7c4920047e3df11ee11ff396a0b274d8caf4921a0ea0732e18a1fa1989baed2945e7b9a7afede73c0a91c74ef5e38dce6daf027ab0bf304fcc7be8e18767be937b6921d712d76af8bf22041698961393eaca576ad30fccef87b1bc3694a2c1bf2af202b15c3b30e925d31fe09b88d46bc56173938f4562c1af99ce7b7075413d532db29d5adc913d60d645f643bd01ea3e698200e39a21569caa69ea37766a837c29409ba11d572300c91ea9ba66f660c615936cfd8456058b3360199089", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x40047440, &(0x7f0000001200)) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000000200)={0x9, &(0x7f0000000180)=[{0x5, 0xd, 0x4, 0x9}, {0x3, 0x7f, 0x6, 0x7}, {0x6, 0x80, 0x60, 0x7}, {0x5, 0x1, 0x2, 0x3}, {0xe2, 0x47, 0x6}, {0x2, 0x80, 0x1, 0xc}, {0xfff1, 0xef, 0x96, 0x1}, {0x43, 0x1, 0x4, 0x80}, {0xa, 0xbf, 0xaf}]}) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r7) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r7) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 1m28.980330249s ago: executing program 4 (id=8450): r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x400, 0x96043, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_bp={0x0, 0x8}, 0x4, 0x8, 0x0, 0x8, 0x5, 0x80000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xd) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x400, 0x96043, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x1, @perf_bp={0x0, 0x8}, 0x4, 0x8, 0x0, 0x8, 0x5, 0x80000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0xd) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 1m28.775804693s ago: executing program 4 (id=8452): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r5 = openat$cgroup_int(r2, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) syz_clone(0x2004080, &(0x7f00000000c0)="20e22561f3ad1383a38d6cea74833c833943550b4c529c4c7427d24b315ba7e1eb675542b569f9ca01fbf553329f5008d1ef9b4caedf6bce7d5868389a1e1ca5b9e8b60e342101dbcef1292fe693753513248a03ba046dae074e396e460a0c60f8c25cd128f9d7ed2da6474859ab4bf811b52f4cebaac93c231c8ec76384bffb74db129bd21ef6eb7b1ba6ed3bac7ba0", 0x90, &(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000300)="0bba562c0c27713af52e26f30953eda3f63212de5b5a8cad0f0edb8a7435f6da731a6111d764d8ef2576903308cc07cf39acb37568d400af9f6168aabda39ab3008d70c6f5ee47e29cb19427f5a6950c0c00c5db22e5dddc2ecb897f7db2af2b375fec134274ae72a3c5c5dcbb07d27e538e197b44dca4f3baf951058d4208867fe4cef67c34fa3ac35046b101b9949dd70d2e30f020a7") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) 1m13.767099629s ago: executing program 32 (id=8452): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f00000001c0), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x2b, 'cpu'}]}, 0x5) r5 = openat$cgroup_int(r2, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000001c0)={[{0x2d, 'cpu'}]}, 0x5) write$cgroup_int(r5, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) syz_clone(0x2004080, &(0x7f00000000c0)="20e22561f3ad1383a38d6cea74833c833943550b4c529c4c7427d24b315ba7e1eb675542b569f9ca01fbf553329f5008d1ef9b4caedf6bce7d5868389a1e1ca5b9e8b60e342101dbcef1292fe693753513248a03ba046dae074e396e460a0c60f8c25cd128f9d7ed2da6474859ab4bf811b52f4cebaac93c231c8ec76384bffb74db129bd21ef6eb7b1ba6ed3bac7ba0", 0x90, &(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000300)="0bba562c0c27713af52e26f30953eda3f63212de5b5a8cad0f0edb8a7435f6da731a6111d764d8ef2576903308cc07cf39acb37568d400af9f6168aabda39ab3008d70c6f5ee47e29cb19427f5a6950c0c00c5db22e5dddc2ecb897f7db2af2b375fec134274ae72a3c5c5dcbb07d27e538e197b44dca4f3baf951058d4208867fe4cef67c34fa3ac35046b101b9949dd70d2e30f020a7") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) 2.36012106s ago: executing program 1 (id=9956): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000007112190800000002950000000000000c5ca081a3310b4b469400"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%pI4 \x00'}, 0x20) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000240)=0xea, &(0x7f00000003c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x13, 0x15, &(0x7f0000000240)=@raw=[@generic={0x81, 0x0, 0xf, 0x39e, 0xfffffffe}, @map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x492e}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_fd={0x18, 0x7, 0x1, 0x0, r2}, @ldst={0x0, 0x1, 0x2, 0x1, 0x314cc76bcd7d25d6, 0xfffffffffffffff4, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x0, 0x2, 0x1, 0x6, 0x5, 0xffffffffffffffc0, 0x8}], &(0x7f0000000300)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41100, 0x20, '\x00', r4, @fallback=0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x4, &(0x7f0000000440)=[r5], &(0x7f0000000480)=[{0x0, 0x5, 0x5, 0x1}, {0x0, 0x2, 0x2}, {0x2, 0x2, 0xf}, {0x2, 0x1, 0x6, 0x1}], 0x10, 0x8}, 0x94) 2.100528447s ago: executing program 1 (id=9959): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'netpci0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'dummy0\x00', 0xa00}) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x8, 0x0, 0x80000000, 0x10, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x0, 0x6}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{r3, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b00)={0x1}, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0500000004000000e27f00000100000001000000", @ANYRES32, @ANYBLOB="ff0f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000087327200"/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r5}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@bloom_filter={0x1e, 0x7, 0x1, 0xffff16ad, 0x21620, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0x3}, 0x50) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000bc0)={0x1b, 0x0, 0x0, 0x3, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000cc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000c40), &(0x7f0000000c80)='%pI4 \x00'}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0xf, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000d00)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x45d, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x8, 0x1b, &(0x7f0000000ec0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@tail_call, @ringbuf_query, @map_idx={0x18, 0x0, 0x5, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7e6d}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfcc4}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x87e}}]}, &(0x7f0000000380)='syzkaller\x00', 0x9, 0x82, &(0x7f0000000500)=""/130, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x7, 0x7, 0x100}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000d80)=[r4, r10, r5, r6, r7, r8, r9, 0xffffffffffffffff, r10], &(0x7f0000000dc0)=[{0x5, 0x2, 0xa, 0x7}], 0x10, 0x7}, 0x94) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) r12 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r13) perf_event_open$cgroup(&(0x7f0000000140)={0xa, 0x80, 0xc0, 0x6, 0x1, 0x4, 0x0, 0x6057, 0x1000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x100010, 0xc, 0x3, 0x9, 0x7fffffff, 0x9, 0xfff3, 0x0, 0xbe1c, 0x0, 0x8}, r11, 0x7, r12, 0xf) r14 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x6, 0xd, 0x0, 0x10, 0x100, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x600000000, 0x52}, 0x2001, 0x5, 0xcba6, 0x3, 0x2, 0x7, 0x99d3, 0x0, 0x3, 0x0, 0x5}, 0xffffffffffffffff, 0x4, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r14, 0x2405, r1) 1.91843592s ago: executing program 1 (id=9962): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x204, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f110800", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x8000000}, 0x50) 1.9173065s ago: executing program 0 (id=9963): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x3, 0x0, 0x8, 0x80, 0x0, 0x0, 0x20a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x2}, 0x4104, 0x7fffffff, 0x7fff, 0x0, 0xfffffffffffffffc, 0xffff0000, 0x80, 0x0, 0xffffffff, 0x0, 0xc5b}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 1.91658042s ago: executing program 2 (id=9964): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x4, 0xc}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000870000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r1) 1.894197671s ago: executing program 2 (id=9965): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x4, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x9fffffff}, [@generic={0x2c}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x94) 1.861562424s ago: executing program 2 (id=9966): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x281001, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00', @ANYRES32=0x0, @ANYRES32], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000080)='U', 0x1080}], 0x29a}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c9842, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0000765f831b00080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005100000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r6, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r9 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r8, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r9, r7, 0x4, r7}, 0x10) close(r5) r10 = perf_event_open$cgroup(&(0x7f0000000600)={0x4, 0x80, 0x8, 0x8, 0xaa, 0xfb, 0x0, 0xa96, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000180), 0xa}, 0xa030, 0xfffffffffffff800, 0xa3, 0x3, 0x0, 0x101, 0xfff, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x1) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r11, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_devices(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="1b2388a84b83615bd95b4cab6630affce3"], 0xffdd) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e0000000400000004000000feffffff00000000", @ANYRES32, @ANYBLOB="000300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000d6cf8d4e9fa49480e01ea500"/28], 0x50) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000280)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x2, &(0x7f0000000580)=ANY=[@ANYBLOB="950000000000000085100000fffffbff3e581fa2d24193ad816fb1b5e5c084e98d82347e36d3a6a3bdb66d0720e33d4ce0c1a9820768ad5379d4b2959dc12f099dfc89146fcfa3209b42e4db26181c34de94"], &(0x7f0000000200)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x29, &(0x7f00000004c0)={0x0, 0x4, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x81}, 0x94) 1.730574303s ago: executing program 0 (id=9967): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="06000000040000000800000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x17d6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x8b}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.687763726s ago: executing program 0 (id=9969): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x50}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x9, 0x1, 0x8, 0x40, 0x42, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r2}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r2, &(0x7f0000000340), 0x0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a71105300000000009500"/24], &(0x7f0000000480)='syzkaller\x00'}, 0x80) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="620ac4ff00000000691000000000000095000000000000006ebdf08334c39b5e5b13ea050ac9dc95fd2866211fe1e115a3b9d6bda332049d64785eafa5b0f9060d19ee389142dd6c52a4c376779e928b6bee"], &(0x7f0000000480)='GPL\x00'}, 0x94) 1.650061088s ago: executing program 2 (id=9970): bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000740)=""/28, 0x1c, 0x0, &(0x7f0000001380)=""/227, 0xe3}}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x9, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000756c6c250000000000202020fc00000000002000bfa100000000000007010000f8ffffffb702000008000000b70300000200"], &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000640)=[{0x5, 0x1, 0x1, 0x1}, {0x3, 0x1, 0x7, 0x2}, {0x4, 0x5, 0xa, 0xd}], 0x10, 0x5}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000ab62a5d6520b1824e200000000000020"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r1, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="090000de00"/20, @ANYRES32=r3, @ANYRES32, @ANYBLOB="05000000030000000100"/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1201, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x9, &(0x7f0000000040)=@generic={0x0, r4}, 0x18) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={0xffffffffffffffff, r0}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r6 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') 1.515940947s ago: executing program 5 (id=9971): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x7, &(0x7f0000000000)=@framed={{}, [@jmp={0x6, 0x0, 0xc, 0x0, 0x0, 0x1, 0x25}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @call={0x85, 0x0, 0x0, 0xaa}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xf6, &(0x7f0000000180)=""/246}, 0x80) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.47226121s ago: executing program 5 (id=9972): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="6f7265746170f62038"], 0xa) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_ext={0x1c, 0x25, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffc00}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_query, @ldst={0x2, 0x1, 0x4, 0x6, 0x3, 0x20, 0xfffffffffffffffc}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6a380a19}}]}, &(0x7f00000001c0)='syzkaller\x00', 0xe, 0xfd, &(0x7f0000000240)=""/253, 0x40f00, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0x1, 0x0, 0x80000001}, 0x10, 0x3c20, 0xffffffffffffffff, 0x5, &(0x7f00000003c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f0000000400)=[{0x4, 0x3, 0x4, 0x5}, {0x3, 0x2, 0x5, 0x4}, {0x1, 0x4, 0x6, 0x8}, {0x4, 0x1, 0xd, 0x6}, {0x4, 0x5, 0x8, 0x1}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000640)={@ifindex, 0x15, 0x0, 0x2, &(0x7f0000000540)=[0x0], 0x1, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0], &(0x7f0000000600)=[0x0, 0x0], 0x0}, 0x40) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0xfffffffb, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305839, &(0x7f0000000040)=0x12800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000680)={@map=r4, r2, 0x9, 0x2000, 0xffffffffffffffff, @value=r5, @void, @void, @void, r3}, 0x20) 1.435557383s ago: executing program 5 (id=9973): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x7, 0xc9, 0x3, 0xb, 0x0, 0x5, 0x88063, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x40, 0x1}, 0x1022, 0x5, 0x7, 0x7, 0x4, 0x21e, 0x6, 0x0, 0x35f9}, r1, 0xf, r0, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) socketpair(0x2, 0xa, 0x4, &(0x7f0000000180)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003440)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x3, &(0x7f0000003ac0), 0x4) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0d00000006000000040000000100000000000000", @ANYRES32=r4, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000ffffffff000000000020000000000000ffff7ef1d3cd05c6a13ee3de490fb08d43cef026d5f95dbe909e7152"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r5}, &(0x7f0000000840), &(0x7f0000000880)=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r5, &(0x7f0000000340)}, 0x20) 1.087214716s ago: executing program 5 (id=9977): bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=@base={0xa, 0x9, 0x8, 0x2}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x3, 0x3, &(0x7f00000001c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r2, 0x0, 0x2, 0x0) write$cgroup_netprio_ifpriomap(r3, &(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x52) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000580), &(0x7f0000000640)=""/162}, 0x20) bpf$BPF_PROG_DETACH(0x8, 0x0, 0xa) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfaa, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x800}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e00000000100000050000000200000000010000", @ANYBLOB, @ANYRES32, @ANYBLOB="03000000030000005d00000000000000"], 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_user\x00', 0x26e1, 0x0) 990.546973ms ago: executing program 3 (id=9978): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000440)=""/183}, 0x20) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)=0x1000000) r3 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xff, 0x0, 0x4, 0xfd, 0x0, 0x0, 0xca77b, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1010000, 0x1, @perf_config_ext={0x9, 0x7}, 0x8804, 0x4b, 0x7b, 0x0, 0xfffffffffffffff9, 0xa, 0x0, 0x0, 0x2ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r3, r0, 0x4, r0}, 0x10) 949.853476ms ago: executing program 0 (id=9979): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xcd, 0xdd, &(0x7f00000000c0)="ec1cb8e304dd0d7bad036209d873c59dfa9a86bb80b8e0668bac72fb295fdccd72277f3b3510f9a5b914d991c3a27d78dd6770653cb12d62787c10673c547b978b5acbb3ee1faf886a4b332eceb79707ad19e6e440e28c17913cc0be1635efb682f1433f2544484aa2174c9edc618eea2d735304ca8335de0dc3f071c913fda6a2d6bb78e3ffb4320b2fba2ec81b00709aecd78d0346cdd4264c27facf9664e6334acf80102237fbf1e027f2cf0df50a9a3feef9431a140c1d6586d2d19f74fe2ddb1078b8c3d7d719d4afd1b3", &(0x7f00000001c0)=""/221, 0x1000, 0x0, 0xe5, 0x2f, &(0x7f00000002c0)="5acb91c5b7d0ebb30713bde26f18785848d73ab6517a2d38e3ed3e20750d00c35ebba379b3166ca83dc6be4841e862294f2b2ebe2efd5b980bc60220eb4858ff41fe631ed4eafc062b21bc73cd422f8a8d3cfa399ca9909b3e9db8ab66fae058451c200b41713e43d2e3c4ff297cbd355b751214d8d3c76023320ffbeb397f01f172eb1f5d4be73cc03d8cb6ba0bec5d2821f809801ab7cfaa8e8c6855b1e42173c8909a3d97f80304162d98c1b9fce460b6d48fc8c3db7e496816dd36f3f18d56178aac04ba9777d9f295bbe13986e05d3a289eff2b177a7787887317e1f6601594b1d342", &(0x7f00000003c0)="e2e39f3b542d2b7556990a425cfcfaad4ed9efc07bd288b94698e7a981a886d457101aa2926a5daaa2707ba5409d91", 0x0, 0x0, 0xf1e}, 0x50) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000480)={r1, r1, 0x4, r1}, 0x10) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000640)={r1, 0x0, 0x80, 0x0, &(0x7f00000004c0)="6230990dcb3ffeae3644d1cb9d731c3df37e3ea2c4c06baf240da51e5e95f4a7aebc81120ebda1338893c4d2576413cbeb9afb2f258852d6087183492f0c9dae28e8970b2a19f67ff41ba6c0e4190737ec0866e78263fa4a5fe5fa4582c27cbd4496209799d0234b58e64e8cde4ee5c49c62fa6af9fb048c3217b6755f736953", 0x0, 0x6, 0x0, 0xc8, 0x0, &(0x7f0000000540)="f2280a604e364afc57368dbf5e3dc085e641430b67b05ebd337747f9cbc2a11c505d8eb5ae08bdb6adcdbb61830eadb47012622c829f82e6ae2271323aef66c7631d40039ed168c6bcef75addeb874746102a9f24272abe51460706791a9d29c3f120a26d0dbced3c962d19e12da2697733bba61748e37f63ed7229bdafffbf0fa3b4e22d6137787f3443908b3e17b11b208952140ce8b3f5b61681424fc90523166f4f859267153d616c735da5ae6f8588503c0fcb644a23340f89bbf8de02ccb891edd2c86f6ca", 0x0, 0x2, 0x0, 0xffff}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@fallback=r1, 0xc, 0x1, 0x7, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) syz_clone(0x62204080, &(0x7f0000000800)="55fa474238687d5b83598ded08ddcbfcd2c0726859f742700cc04fafaca4448d2b4728eeea74ee833356f3e49926d17745845897491f027fa082f7d63d4faeaa5a3087b6b07f6fdc6d179ba53b572be01b81e83a7fa4f2e2673b34d0fe2165bc41691c6541a0f699f647efe4fb3b3f3d22a148625746e043c8fe276ed76bb590e6905772d63193054e1131980532563849cf24ec67486e16c2c1f97a62ba34b01bf698", 0xa3, &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="c6bfc76c0cf8710485f7acdeb2ed7837c1347ffe14bcaf5f5209fab200b0c3fe920fdcb67d06ef3257443bc2762c16891e16ff59037ef97fbc14b2e8e80fa661d725269330eb25c4684097654a2dac0d98d469c60954f0acd4ce4ede48f12b26c669db02ec248151ec8506e5f060501467ad73846dfcf871bcb7da79a04600a9578e244afa0b893fd3ad09a4ac2e0b0e1acc271730f20c200424d23e5ce682fce99a7efc637066641fbaa3f00a8f44930fe50c639763628b2f51cbe591b531b241a4fcb9b740647023f2c7d9") bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r1, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000a40)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4e, &(0x7f0000000b00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000b40), &(0x7f0000000b80), 0x8, 0xb6, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=@bloom_filter={0x1e, 0x4, 0x2, 0x3ff, 0x0, r2, 0x3, '\x00', r4, r2, 0x5, 0x1, 0x5, 0xe}, 0x50) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000dc0)={'veth0_to_hsr\x00', 0x200}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e80)={{r2, 0xffffffffffffffff}, &(0x7f0000000e00), &(0x7f0000000e40)=r2}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000ec0), 0x101000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001040)={r1, &(0x7f0000000f00)="02bc3a1bed6fb08861f6a1c27b610f800feb6319556b414550889338b4d1ba3ea2f27417f4830acfa1d9cf867cc54f99b09a0d3114bc5e67fddc5987ebc8ed9dd31440625f344ca2ba25ddd4253d739154a85efbcd8fb74ce0b24d873c1b46589d823206d00e7944c2a71e12a3a2c4beade92b8d9428129a3dc4bd8fd610dddbe2b45127048edbc055b78f9c392457294b348f4021a58f0ff4e31ee9a0489d4c548c9feb5c24391dc41dc688578715710a328226df5da12b53162284dd21710a2a", &(0x7f0000001000)=""/7}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=@base={0x17, 0xb115, 0x9, 0x3b47, 0x2, r6, 0x7, '\x00', r4, r2, 0x2, 0x5, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001180)={r2, 0x58, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) syz_clone(0x100000, &(0x7f00000011c0)="d41ceb261c5a6bdd7d7ccc97db4eb3e83ba13dc1f08de0589656e86d70cd753e27d5324c821f8ea00e8d3c42ba105a91f2b4e2b58b47540223", 0x39, &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280)="17b3b234dfa7a5e66dc14e7ac953e30274f4b0459757e88e9c06d80502865889e568e0474f971bd442c8ca1e5dc14de91d4f08f3e3b5697310c54a1d5ee90426357161c9b8191a017ac840c6a416a455592f67afbfb3d65d4c268773ad0bb1ece172ce71c7db49167896cbe151717e621d95dfc38bfb942eeb74") ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000001300)=0x4) write$cgroup_devices(r2, &(0x7f0000001340)={'c', ' *:* ', 'rm\x00'}, 0x9) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup/syz1\x00', 0x200002, 0x0) write$cgroup_int(r9, &(0x7f00000013c0)=0x5, 0x12) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001400)={r1, r2}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001440)=' *:* ') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001500)={{r7, 0xffffffffffffffff}, &(0x7f0000001480), &(0x7f00000014c0)=r1}, 0x20) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000016c0)={0x1b, 0x0, 0x0, 0xb, 0x0, 0x1, 0x8, '\x00', r8, r2, 0x5, 0x4, 0x4}, 0x50) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001780)={0x18, 0x15, &(0x7f0000001540)=@raw=[@generic={0x0, 0x7, 0x4, 0x200, 0x1f8}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0x4, 0x8, 0xd, 0x30, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r10}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @generic={0x9, 0x0, 0xf, 0xed9, 0xffff}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}], &(0x7f0000001600)='GPL\x00', 0x1ff, 0x29, &(0x7f0000001640)=""/41, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680)={0x3, 0x3, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001740)=[r5, r11], 0x0, 0x10, 0xa9}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001840)={@fallback=r6, r1, 0x18, 0x0, 0x0, @void, @value=r12, @void, @void, r3}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001880)={0x2, 0x4, 0x8, 0x1, 0x80, r11, 0xe, '\x00', r8, r1, 0x3, 0x3, 0x4}, 0x50) openat$tun(0xffffffffffffff9c, &(0x7f0000001900), 0x100, 0x0) 942.314616ms ago: executing program 2 (id=9980): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047440, &(0x7f0000001200)) syz_clone(0x14081040, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) close(r0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r0, 0x40047440, &(0x7f0000001200)) (async) syz_clone(0x14081040, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 890.39878ms ago: executing program 3 (id=9981): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c202, 0xac5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r0, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000016c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0xc, [@volatile, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x4, 0x1}, @var={0xf, 0x0, 0x0, 0xe, 0x3, 0x1}, @func={0x7, 0x0, 0x0, 0xc, 0x1}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x6}]}]}, {0x0, [0x2e, 0x0, 0x2e, 0x2e, 0x5f, 0x5f, 0x5f, 0x5f, 0x0, 0x61]}}, &(0x7f00000006c0)=""/4096, 0x70, 0x1000, 0x0, 0x5, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000017c0)={0x6, 0x22, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x17}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @jmp={0x5, 0x1, 0x0, 0x1, 0x4, 0x10}, @exit, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @exit, @map_val={0x18, 0x8, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x88}]}, &(0x7f0000000440)='GPL\x00', 0x5, 0x7c, &(0x7f0000000500)=""/124, 0x41100, 0x1, '\x00', r2, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001700)={0x1, 0xf, 0x8, 0x1000}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000001740)=[r0, r0, r0], &(0x7f0000001780)=[{0x3, 0x2, 0x3, 0x8}, {0x5, 0x3, 0xd, 0x8}, {0x2, 0x4, 0x10, 0x2}]}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x1, 0xfffffffffffffeaa, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2000000, 0x7}, 0x800, 0x9, 0x8, 0x6, 0xfffffffffdf7bbfe, 0x0, 0x5, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0x4000000000e, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000010000000000000000000000711835000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) socketpair(0x22, 0x0, 0x2, &(0x7f0000000000)) write$cgroup_int(r5, &(0x7f00000000c0)=0x10000, 0x12) 889.74285ms ago: executing program 1 (id=9982): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f00000007c0)=ANY=[], 0x6) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000480)=r2, 0x4) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x0, 0x2}}, 0x10, 0x0}, 0x4040000) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x1000000, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000240)="91851f793562e360bdb30d6b9a3c7ec011d3ea7b916634834cf026270c23f9fa01571323de98091d0b8dd55212524b859036d34d16a8555ddfdd7814ab8493d1b5405ace94354633") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x13, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0500000005000000fd0900008500000041000000", @ANYRES32, @ANYBLOB='\b \x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r6}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000840)="5b366f2457bb9b74d51e298068fcd59617433159448a4930caf49e2c4c6421e9abd1bd58b8c97c9fd176ac4956676b8043533e85929342cad1f1459fcf4f4750288aca01d269d00d311b5ea56662389a928d731251b158a942dc8e1cdace60f7f870d6", 0x6c, r6}, 0x38) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) (async) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xd12) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="05000000332fa5972fa65d1cc32a8c4d3ea77f00", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000003080)=ANY=[@ANYBLOB="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"/3584], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x5, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, [@tail_call]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x5, &(0x7f0000000580)=""/5, 0x40f00, 0x22, '\x00', 0x0, @fallback, r3, 0x8, &(0x7f00000005c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x3, 0x1daa, 0x1000}, 0x10, 0x0, r0, 0x5, &(0x7f0000000640)=[r6, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6, r7, r7], &(0x7f0000000680)=[{0x5, 0x4, 0x7}, {0x2, 0x4, 0xe, 0x4}, {0x3, 0x3, 0x3, 0xc}, {0x3, 0x3, 0x9, 0x3}, {0x2, 0x2, 0x2}], 0x10, 0x2}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r8, 0x3a, 0x44, 0x0, &(0x7f0000000400)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242f09880bd320d98a61a90401e9bf", 0x0, 0x401, 0x0, 0x327, 0x0, &(0x7f0000001500)="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", &(0x7f00000004c0), 0x1, 0xfffffffd, 0xfffffffe}, 0x50) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)="b9c83d5f", &(0x7f0000000ec0)="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", 0x402, r7}, 0x38) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000300000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) 886.04587ms ago: executing program 3 (id=9983): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0xe, &(0x7f0000000bc0)=ANY=[], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x0, 0x2}, 0x10}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x4, 0x4}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x4, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x5, 0x81006, 0x2, &(0x7f0000000380)={0x0, 0x0}) (async) socketpair(0x5, 0x81006, 0x2, &(0x7f0000000380)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000003c0)) (async) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000003c0)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0xfffffffd}, 0x6e, 0x0}, 0x20000) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v'], 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r10) setsockopt$sock_attach_bpf(r11, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r12, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0xffffffffffffffff, 0x4003, 0xffffff00}}, 0x10, 0x0}, 0x4040005) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 855.623562ms ago: executing program 3 (id=9984): perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xb16}, 0x2080, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff7ffa}, 0x0, 0x35, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f0000002300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x12008, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x80}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000280)}, 0x20) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0e0000000400005522571968c7facc66e44b019a7f2663497bac3b779592948921992c812a666e2266e678ab64d9b19ebc07cb72f3d0de147ad675741f9a77acac66de91c8c8f81b681138e64a46f42a108d5b75c6f34913d28d5eda26b92b7efe0000000000000100bee08a63ae000000000000000000e85f50d437a26fc63651f083db43f6e81474ac0ad490027d9f946ddf3969c403e5ac26d8ab35078ab7473aea", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b5af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000d000000850000000700000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000640)="d9b9547ed3c0c80d47820400ab3d", 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x26, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x48}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 841.341064ms ago: executing program 1 (id=9985): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="660a00000000df0061114c000000000085000000540000009500e400000000000313133bb9bfcc40e24cfa10c5df11b4c4b418de246f1ebed76df30c0011e1c3d19d86658dc73eaed31cec8f412698643d46fbd5f1c6890000f7fdc04a0ee1d7fdc3df546d7f94ff38e95f73c49e33011ed1354ee592f4ad150ae9c64d51c0b23699070200008e544a4daa7b2fc60f0fcc8ac10ad4676663153204ea7247df9b8d0c8eb698a115a6d42e371d9efdbe62b0e52153eb91c1a80f908e3dbcea695c06"], &(0x7f0000000000)='GPL\x00'}, 0x80) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/pid\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x9, 0x7, 0x0, 0x0, 0x3, 0x60110, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x1, @perf_config_ext={0x6}, 0x804, 0x9, 0x5, 0x1, 0x52, 0x2, 0xbc, 0x0, 0x40, 0x0, 0x38d}, r2, 0x4, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 774.114148ms ago: executing program 3 (id=9986): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x2e, &(0x7f0000000000)=r0, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0608000004000000090000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0d00000000000000000000000000000000000400405e1eb23bf25b3d974f7e981eeb1af78ac818a5e1645f33f509b1185ef665c7f28202bf5169d76331b4a800f2263894504fd11e95a1e9d442a9223aa87f77cfc17806c38c0e03ad1c50e2e055399d038bd6671536a2ac8ddd00afad088fdbbdc500b3e66b1b62b3a786", @ANYRES32=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940), 0x0, 0xa7c, r3}, 0x38) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000f279f8d829158d52f1f8e2b7a3a3b093a25a81ebbd07e11d923ce2ba245a67dc08af8b2d6cb865453630fe39230d852563435a2e575856079bc1fe0a0ae2a603e635e882a003882ed139", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="f5ffffff63bc3c14fcac5ec047f91674afdf73376756dcaa5ead715863acdc4d0dc3174766946a41e72d3b2960273f08a1f39a13aa7008c35ae63664a56cba662c8895fc67a3e0c7072ca1eabadbcd3fbd19cb6522f5df338e8879f54699847300b220d1eb9fb930b7fa8778114810c7598439d8c073578ac0992ef1bb20b691122b2e427cb46290a17151db66d36b189370ba6aa63cac150003459e663d90f99720edf0e1e61ca0753db39136c2cfbe7d5f2939c3ac8c94b87e77f18e43a715bf6acccb97972f0ea3ddf21005d84a804cb961ed6477b5bef4137b13e1ae539c5de77b6b777e"], 0x18, 0x24004085}, 0x40000d5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850020000000000018100000", @ANYRES32, @ANYBLOB="1700000000000000950000000000000045"], 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r8) write$cgroup_subtree(r8, &(0x7f00000001c0)=ANY=[@ANYBLOB="2d70659d0911f376656e74202b626c6b696f202d706a72665f6576656e74207479636c7320"], 0x28) write$cgroup_devices(r8, &(0x7f00000005c0)=ANY=[], 0xfffffeff) r9 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1624, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100521, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1300000010000000020000000000000000000002", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYRES8=r6, @ANYRES32=r10, @ANYRESOCT], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffff}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r11, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000180)=[0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000840)=[{}, {}], 0x10, 0x0, 0x0, &(0x7f0000000280), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r12, @ANYRES64=r11, @ANYRESHEX=r9, @ANYRESDEC=r13, @ANYRESOCT=r11, @ANYRESHEX, @ANYRES8=r13], &(0x7f0000000200)='syzkaller\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x10, 0x1080}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000880)=ANY=[@ANYRES32=r8, @ANYRES32, @ANYBLOB="0400b7000000000000001000", @ANYRES32=r12, @ANYRES64=0x0], 0x20) 773.756838ms ago: executing program 2 (id=9987): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000240)=@o_path={0x0, r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180200000300000000000000000000008500000011000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x81) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x10000, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a1d, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000285000000170000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000009b00000095"], 0x0, 0xffffffff}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00'}, 0x27) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000001000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000001300)=""/181, 0x26, 0xb5, 0x1}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000340)="196a348fbba6e75ce3e37fd3d3fc", 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001540)={r1, 0x20, &(0x7f0000001500)={&(0x7f0000000080)=""/75, 0x4b, 0x0, &(0x7f0000000500)=""/4096, 0x1000}}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000980)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x2, {{0x1, 0x1}}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000694428000000000004000000000000009500000010160000"], &(0x7f0000000040)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3, 0xfffffffe, 0x4}, 0x10, r6, r1}, 0x94) 760.429809ms ago: executing program 3 (id=9988): bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0xa, 0x0, 0x4000}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x11, 0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000e9ff00000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 488.813247ms ago: executing program 1 (id=9989): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={0x0, 0x6}, 0x420}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000001700)=r0, 0x12) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)}, 0x200080c4) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x88}, [@ldst={0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x83000000}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) 285.279761ms ago: executing program 0 (id=9990): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000ffffffff0000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180b00000800000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000f9ff0000ae0a00000000000085000000060000009500040000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x88) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 271.542122ms ago: executing program 5 (id=9991): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x306) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) recvmsg(r0, &(0x7f00000027c0)={&(0x7f00000000c0)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000140)=""/133, 0x85}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/50, 0x32}, {&(0x7f0000000300)=""/207, 0xcf}, {&(0x7f0000000400)=""/44, 0x2c}, {&(0x7f0000000440)=""/46, 0x2e}, {&(0x7f0000000480)=""/107, 0x6b}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/8, 0x8}], 0xa, &(0x7f00000017c0)=""/4096, 0x1000}, 0x12101) 122.189232ms ago: executing program 0 (id=9992): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r0}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)='%pi6 \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', r3, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0xe, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1c27}, @map_fd={0x18, 0x7, 0x1, 0x0, r2}, @alu={0x7, 0x0, 0x0, 0x7, 0x5, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f0000000340)='GPL\x00', 0x0, 0x9, &(0x7f0000000380)=""/9, 0x40f00, 0x54, '\x00', r3, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x5, 0x6, 0x8, 0x9}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f00000004c0)=[{0x3, 0x3, 0x0, 0x2}, {0x4, 0x3, 0xa, 0x7}, {0x0, 0x4, 0xc, 0x4}, {0x4, 0x5, 0xc, 0x2}, {0x4, 0x1, 0xa}, {0x5, 0x3, 0x1, 0x9}], 0x10, 0x9}, 0x94) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000180)=ANY=[@ANYBLOB='1-6:5/'], 0x31) r7 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 5 (id=9993): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x8, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x22}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="d2ff030060010000009e08f086dd", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r4}, 0xc) ioctl$SIOCSIFHWADDR(r2, 0x8930, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r5}, 0x8) close(r6) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f00000000c0)={'team_slave_1\x00', @random="01320136b1ff"}) kernel console output (not intermixed with test programs): ed promiscuous mode [ 173.065756][ T9808] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.074478][ T9808] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.089527][ T9808] device bridge_slave_0 entered promiscuous mode [ 173.102413][ T9808] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.153409][ T9808] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.161878][ T9808] device bridge_slave_1 entered promiscuous mode [ 173.526744][ T9808] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.533993][ T9808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.541296][ T9808] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.548361][ T9808] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.740375][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.757966][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.786107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.814206][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.860751][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.902366][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.909461][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.949199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.983641][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.990745][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.062505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.071348][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.092001][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.125855][ T9808] device veth0_vlan entered promiscuous mode [ 174.153449][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 174.169936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.193832][ T9808] device veth1_macvtap entered promiscuous mode [ 174.214527][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.225499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.250652][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 174.279372][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.300003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.335665][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.369552][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.400438][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.440990][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 174.569038][ T378] nr0: port 1(macsec0) entered disabled state [ 174.581370][ T378] device veth0_vlan left promiscuous mode [ 175.143274][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 175.174283][ T9906] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 175.684673][ T9934] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.691886][ T9934] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.704477][ T9934] device bridge_slave_0 entered promiscuous mode [ 175.769018][ T9934] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.817822][ T9934] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.842843][ T9934] device bridge_slave_1 entered promiscuous mode [ 175.933271][ T9934] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.940381][ T9934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.947755][ T9934] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.954909][ T9934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.109170][ T9959] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 176.123072][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 176.149816][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.160587][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.179236][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.250583][ T9966] device syzkaller0 entered promiscuous mode [ 176.260582][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.270512][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.278808][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.285974][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.302861][ T9958] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 176.324161][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.334450][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.344386][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.351550][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.359470][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.367870][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.376696][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.385193][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.421087][ T9934] device veth0_vlan entered promiscuous mode [ 176.437907][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 176.449726][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.468727][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.485306][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.513343][ T9934] device veth1_macvtap entered promiscuous mode [ 176.541884][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.559951][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.573769][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.589536][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.603221][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.639300][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.654887][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.663902][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.672320][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.521451][ T378] device veth1_macvtap left promiscuous mode [ 177.814621][T10067] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.824482][T10067] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.832509][T10067] device bridge_slave_0 entered promiscuous mode [ 177.846002][T10067] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.864287][T10067] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.872037][T10067] device bridge_slave_1 entered promiscuous mode [ 177.973650][T10067] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.980787][T10067] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.988079][T10067] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.995190][T10067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.019705][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.027718][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.035617][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.053505][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.061921][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.068988][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.076659][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.085543][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.092650][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.119628][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.128298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.144513][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.164712][T10067] device veth0_vlan entered promiscuous mode [ 178.171786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 178.180086][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.189625][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.208869][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.233614][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 178.242020][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.252219][T10067] device veth1_macvtap entered promiscuous mode [ 178.308866][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.318953][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 178.332709][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.361776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 178.407473][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.473441][T10088] device syzkaller0 entered promiscuous mode [ 179.127143][T10119] device wg2 entered promiscuous mode [ 179.383011][T10143] device wg2 entered promiscuous mode [ 180.060335][ T24] audit: type=1400 audit(1775553843.460:168): avc: denied { setattr } for pid=10157 comm="syz.3.2942" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 182.597484][T10294] syz.2.2986[10294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.597541][T10294] syz.2.2986[10294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.052592][ T24] audit: type=1400 audit(1775553846.450:169): avc: denied { create } for pid=10339 comm="syz.3.3000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 183.352793][T10366] device syzkaller0 entered promiscuous mode [ 183.646868][T10372] device syzkaller0 entered promiscuous mode [ 185.004119][T10447] device veth0_vlan left promiscuous mode [ 185.015212][T10447] device veth0_vlan entered promiscuous mode [ 185.094079][T10454] device syzkaller0 entered promiscuous mode [ 187.342167][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 187.359153][T10563] syzkaller0: tun_chr_ioctl cmd 1074025678 [ 187.369125][T10563] syzkaller0: group set to 25 [ 187.373943][T10563] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 187.472041][T10560] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 187.568988][ T24] audit: type=1400 audit(1775553850.960:170): avc: denied { create } for pid=10585 comm="syz.3.3078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 188.146030][T10624] device syzkaller0 entered promiscuous mode [ 188.164378][T10634] tap0: tun_chr_ioctl cmd 1074812118 [ 188.215871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 188.239479][T10632] device syzkaller0 entered promiscuous mode [ 188.286126][T10632] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 188.318327][T10632] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 188.466671][T10649] geneve1: tun_chr_ioctl cmd 1074025672 [ 188.481467][T10649] geneve1: ignored: set checksum enabled [ 188.536093][T10640] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 188.609289][T10649] geneve1: tun_chr_ioctl cmd 1074025680 [ 188.619567][T10629] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 189.341311][T10695] device syzkaller0 entered promiscuous mode [ 190.257781][T10776] device dummy0 entered promiscuous mode [ 191.116818][T10851] device syzkaller0 entered promiscuous mode [ 192.753090][T10945] device syzkaller0 entered promiscuous mode [ 193.193836][T10978] device syzkaller0 entered promiscuous mode [ 193.955663][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 193.984691][T11060] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.009931][T11079] cgroup: fork rejected by pids controller in /syz4 [ 194.064768][T11086] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.106099][T11089] @0Ù: renamed from bond_slave_1 [ 194.125626][T11060] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 194.152271][T11060] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 194.181750][T11059] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.251536][T11059] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.278241][T11059] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.336942][ T24] audit: type=1400 audit(1775553857.730:171): avc: denied { mounton } for pid=11204 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 194.501982][T11207] device wg2 left promiscuous mode [ 194.612762][T11207] device wg2 entered promiscuous mode [ 194.632520][T11204] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.672117][T11204] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.719619][T11204] device bridge_slave_0 entered promiscuous mode [ 194.726934][T11204] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.734164][T11204] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.741946][T11204] device bridge_slave_1 entered promiscuous mode [ 195.007729][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.024131][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.086142][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.095337][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.103987][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.111187][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.121334][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.130003][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.143769][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.150857][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.164219][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.275188][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.288086][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.306290][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.325826][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.408704][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 195.449616][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.463277][T11204] device veth0_vlan entered promiscuous mode [ 195.506326][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 195.582517][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.615788][T11204] device veth1_macvtap entered promiscuous mode [ 195.667718][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 195.686789][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.723486][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.750700][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 195.811256][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 195.869568][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 195.911431][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.092601][ T24] audit: type=1400 audit(1775553859.490:172): avc: denied { unmount } for pid=11204 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 196.390794][T11309] device syzkaller0 entered promiscuous mode [ 196.403905][T11311] ref_ctr_offset mismatch. inode: 0x150 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 196.563177][T11318] device syzkaller0 left promiscuous mode [ 196.975688][T11339] erspan0: refused to change device tx_queue_len [ 197.542654][ T378] device bridge_slave_1 left promiscuous mode [ 197.555336][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.584930][ T378] device bridge_slave_0 left promiscuous mode [ 197.606853][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.622349][ T378] device veth1_macvtap left promiscuous mode [ 197.736937][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 197.753599][T11391] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 197.767083][T11391] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 197.779708][T11390] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 197.787588][T11390] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 197.863538][T11407] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.021545][T11406] device syzkaller0 entered promiscuous mode [ 198.027942][T11406] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.071576][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.080810][T11408] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.110501][T11407] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.183884][T11407] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.239940][T11407] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.377018][T11407] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 199.842157][T11509] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.859509][T11509] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.867135][T11509] device bridge_slave_0 entered promiscuous mode [ 199.875035][T11509] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.882190][T11509] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.889937][T11509] device bridge_slave_1 entered promiscuous mode [ 200.044212][T11509] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.051312][T11509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.058684][T11509] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.065738][T11509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.146322][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.196619][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.207574][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.270096][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.289984][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.302830][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.310012][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.324909][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.333507][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.341993][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.349084][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.356856][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.365427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.400978][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.410356][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.457318][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.468386][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.492718][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.508859][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.520258][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.539407][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.559609][T11509] device veth0_vlan entered promiscuous mode [ 200.590841][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 200.610566][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.640807][T11509] device veth1_macvtap entered promiscuous mode [ 200.707470][T11566] device veth1_macvtap left promiscuous mode [ 200.721604][T11566] device macsec0 entered promiscuous mode [ 200.760451][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.771542][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.806852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.830316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.863936][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.562311][T11655] IPv6: pim6reg1: Disabled Multicast RS [ 201.689923][T11657] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.700801][T11657] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.236289][T11679] device syzkaller0 entered promiscuous mode [ 202.745693][T11748] bridge0: port 3(gretap0) entered blocking state [ 202.758726][T11748] bridge0: port 3(gretap0) entered disabled state [ 202.825836][T11748] device gretap0 entered promiscuous mode [ 202.850983][T11748] bridge0: port 3(gretap0) entered blocking state [ 202.857790][T11748] bridge0: port 3(gretap0) entered forwarding state [ 202.882136][ T378] device bridge_slave_1 left promiscuous mode [ 202.888321][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.902306][ T378] device bridge_slave_0 left promiscuous mode [ 202.917961][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.926416][ T378] device veth1_macvtap left promiscuous mode [ 202.932807][ T378] device veth0_vlan left promiscuous mode [ 203.596874][T11823] device syzkaller0 entered promiscuous mode [ 204.024277][T11840] device sit0 entered promiscuous mode [ 204.571103][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 204.605653][T11868] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 204.757248][T11868] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 205.074715][T11866] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 205.206094][T11866] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 206.444567][T11975] device syzkaller0 entered promiscuous mode [ 206.647112][T11986] device syzkaller0 entered promiscuous mode [ 207.388162][T12024] device aaaaaaaaaaaaaaa entered promiscuous mode [ 207.484447][T12041] batadv0: tun_chr_ioctl cmd 1074025692 [ 207.713909][T12057] device syzkaller0 entered promiscuous mode [ 208.366284][T12100] device wg2 entered promiscuous mode [ 208.670263][T12127] device syzkaller0 entered promiscuous mode [ 208.741154][T12144] device syzkaller0 entered promiscuous mode [ 209.230105][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 209.254801][T12173] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 209.302155][T12173] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 209.385862][T12173] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 209.421388][T12175] syzkaller0: create flow: hash 3816466021 index 2 [ 210.046962][T12191] device syzkaller0 entered promiscuous mode [ 210.088542][T12172] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 210.139263][T12172] syzkaller0: delete flow: hash 3816466021 index 2 [ 210.178732][T12172] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 210.210539][T12172] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 210.376906][T12202] device syzkaller0 entered promiscuous mode [ 210.838037][T12214] device sit0 left promiscuous mode [ 210.949225][T12217] device veth0_vlan left promiscuous mode [ 210.959540][T12217] device veth0_vlan entered promiscuous mode [ 210.999720][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.019852][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.037699][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.066035][T12214] device sit0 entered promiscuous mode [ 211.277026][T12241] device syzkaller0 entered promiscuous mode [ 212.719114][T12322] : port 1(dummy0) entered blocking state [ 212.725200][T12322] : port 1(dummy0) entered disabled state [ 212.891191][T12322] device dummy0 entered promiscuous mode [ 213.048854][T12372] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 213.067445][T12372] syzkaller0: linktype set to 0 [ 213.309563][T12395] syzkaller0: refused to change device tx_queue_len [ 213.412093][T12411] device syzkaller0 entered promiscuous mode [ 214.235069][T12459] device sit0 entered promiscuous mode [ 214.503280][T12466] device syzkaller0 entered promiscuous mode [ 214.753695][T12471] bridge0: port 3(veth0_to_bridge) entered blocking state [ 214.761101][T12471] bridge0: port 3(veth0_to_bridge) entered disabled state [ 214.771136][T12471] device veth0_to_bridge entered promiscuous mode [ 214.778025][T12471] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 214.790454][T12471] bridge0: port 3(veth0_to_bridge) entered blocking state [ 214.797628][T12471] bridge0: port 3(veth0_to_bridge) entered listening state [ 214.859168][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 214.871170][ C0] bridge0: port 3(veth0_to_bridge) entered blocking state [ 215.056120][T12506] device syzkaller0 entered promiscuous mode [ 215.743966][T12559] device syzkaller0 entered promiscuous mode [ 217.408317][T12663] device macsec0 entered promiscuous mode [ 218.400440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 219.012590][T12736] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 219.138396][T12756] device syzkaller0 entered promiscuous mode [ 219.189792][T12763] device syzkaller0 left promiscuous mode [ 220.371214][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 220.709189][T12833] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 220.922055][T12822] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 221.088266][T12843] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 221.149173][T12842] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 221.972985][T12942] device syzkaller0 entered promiscuous mode [ 222.049276][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 222.584924][T12973] device syzkaller0 entered promiscuous mode [ 223.881985][T13072] device syzkaller0 entered promiscuous mode [ 224.186038][T13091] device syzkaller0 entered promiscuous mode [ 224.289668][T13101] device syzkaller0 left promiscuous mode [ 224.639863][T13116] IPv6: pim6reg1: Disabled Multicast RS [ 225.740926][T13180] device syzkaller0 entered promiscuous mode [ 227.214564][T13266] tun0: tun_chr_ioctl cmd 1074025677 [ 227.237570][T13266] tun0: linktype set to 820 [ 228.270453][T13314] device xfrm0 entered promiscuous mode [ 228.438428][T13336] 7B’ç÷ï: renamed from syzkaller0 [ 229.168907][T13359] device macsec0 entered promiscuous mode [ 229.227729][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 229.239786][T13361] syzkaller0: tun_chr_ioctl cmd 2147767521 [ 229.286724][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 229.359708][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 229.418827][T13360] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 230.063301][T13417] batadv0: tun_chr_ioctl cmd 2148553947 [ 232.805302][T13577] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.815273][T13577] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.823229][T13577] device bridge_slave_0 entered promiscuous mode [ 232.835934][T13577] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.843281][T13577] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.855462][T13577] device bridge_slave_1 entered promiscuous mode [ 233.100310][T13577] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.107513][T13577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.114923][T13577] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.122019][T13577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.167392][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.175542][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.246902][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.255634][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.287308][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.298024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.307771][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.314887][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.322810][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.331174][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.339451][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.346489][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.370016][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 233.378305][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 233.386498][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 233.394745][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 233.426284][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.435752][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.448384][T13577] device veth0_vlan entered promiscuous mode [ 233.455068][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.463766][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.472050][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.479694][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.505626][T13577] device veth1_macvtap entered promiscuous mode [ 233.512800][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.521543][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.530134][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.554127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.562912][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.586649][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.595632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.798263][T13652] device syzkaller0 entered promiscuous mode [ 234.617924][ T24] audit: type=1400 audit(1775553898.010:173): avc: denied { create } for pid=13715 comm="syz.2.3955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 235.216023][T13753] +: renamed from team_slave_1 [ 236.632733][T13831] device syzkaller0 entered promiscuous mode [ 236.858536][T13862] device veth1_macvtap left promiscuous mode [ 238.515982][T13961] device veth0_vlan left promiscuous mode [ 238.525881][T13961] device veth0_vlan entered promiscuous mode [ 238.618219][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.629894][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.650093][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.786652][T13979] device syzkaller0 entered promiscuous mode [ 239.847218][T14031] device pim6reg1 entered promiscuous mode [ 240.851087][T14099] syz.1.4066[14099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.851158][T14099] syz.1.4066[14099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.436292][T14130] device syzkaller0 entered promiscuous mode [ 241.918917][T14191] syzkaller0: refused to change device tx_queue_len [ 241.939890][T14199] device wg2 left promiscuous mode [ 241.963357][T14191] device syzkaller0 entered promiscuous mode [ 241.980976][T14199] device wg2 entered promiscuous mode [ 241.993883][T14199] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 243.121856][T14295] device wg2 left promiscuous mode [ 244.333693][T14427] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.340983][T14427] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.492723][T14418] device syzkaller0 entered promiscuous mode [ 246.035785][T14545] lo: mtu less than device minimum [ 246.077052][T14552] device syzkaller0 entered promiscuous mode [ 246.499828][T14579] device syzkaller0 entered promiscuous mode [ 246.801420][T14592] bridge0: port 3(gretap0) entered blocking state [ 246.838575][T14592] bridge0: port 3(gretap0) entered disabled state [ 246.893960][T14592] device gretap0 entered promiscuous mode [ 246.992038][T14606] bridge0: port 3(veth0_to_bridge) entered blocking state [ 247.041706][T14606] bridge0: port 3(veth0_to_bridge) entered disabled state [ 247.179565][T14606] device veth0_to_bridge entered promiscuous mode [ 247.994487][T14662] Ÿë: port 1(vlan1) entered blocking state [ 248.004074][T14662] Ÿë: port 1(vlan1) entered disabled state [ 248.014945][T14662] device vlan1 entered promiscuous mode [ 248.346038][T14681] batadv0: tun_chr_ioctl cmd 1074025677 [ 248.368000][T14681] batadv0: linktype set to 776 [ 248.669766][T14690] device syzkaller0 entered promiscuous mode [ 249.988642][T14793] syz.1.4268[14793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.988696][T14793] syz.1.4268[14793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.478142][T14852] device bridge0 entered promiscuous mode [ 251.760219][T14935] : port 1(dummy0) entered blocking state [ 251.835190][T14935] : port 1(dummy0) entered disabled state [ 251.904382][T14935] device dummy0 entered promiscuous mode [ 251.985038][T14951] device dummy0 left promiscuous mode [ 251.996970][T14951] : port 1(dummy0) entered disabled state [ 253.362518][ T24] audit: type=1400 audit(1775553916.760:174): avc: denied { create } for pid=15021 comm="syz.2.4337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 254.112607][T15103] -1: renamed from syzkaller0 [ 254.687402][T15133] device syzkaller0 entered promiscuous mode [ 254.934427][T15158] device syzkaller0 entered promiscuous mode [ 254.948052][T15163] device sit0 left promiscuous mode [ 255.496777][T15227] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 255.548932][T15227] device syzkaller0 entered promiscuous mode [ 255.985037][T15246] device syzkaller0 entered promiscuous mode [ 256.503754][T15262] device syzkaller0 entered promiscuous mode [ 257.566719][T15347] device syzkaller0 entered promiscuous mode [ 258.027899][T15364] device syzkaller0 entered promiscuous mode [ 258.457957][T15402] device syzkaller0 entered promiscuous mode [ 258.594326][T15426] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 258.619109][T15426] syzkaller0: linktype set to 825 [ 258.660074][T15434] syz.2.4464[15434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.660133][T15434] syz.2.4464[15434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.969656][T15564] device syzkaller0 entered promiscuous mode [ 260.468267][T15591] -1: renamed from syzkaller0 [ 260.913913][T15603] device syzkaller0 entered promiscuous mode [ 265.470111][T15795] cgroup: fork rejected by pids controller in /syz1 [ 266.419479][T15805] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.468091][T15805] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.495521][T15805] device bridge_slave_0 entered promiscuous mode [ 266.525875][T15805] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.570668][T15805] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.607477][T15805] device bridge_slave_1 entered promiscuous mode [ 266.984330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.007071][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.093604][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.105065][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.115959][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.123041][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.130989][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.139993][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.148210][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.155279][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.189996][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.217477][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.233479][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.310907][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.331428][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.387469][T15805] device veth0_vlan entered promiscuous mode [ 267.402062][T15805] device veth1_macvtap entered promiscuous mode [ 267.421075][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.429607][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 267.438003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 267.446720][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 267.454986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.539500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.568470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.626942][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 267.640986][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 267.652531][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 267.661662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 267.856859][ T378] device gretap0 left promiscuous mode [ 267.863965][ T378] bridge0: port 3(gretap0) entered disabled state [ 268.121045][ T378] device bridge_slave_1 left promiscuous mode [ 268.127319][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.157969][ T378] device bridge_slave_0 left promiscuous mode [ 268.177681][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.202464][ T378] device veth0_vlan left promiscuous mode [ 268.522033][T15901] tun0: tun_chr_ioctl cmd 1074812118 [ 268.886728][T15961] bridge0: port 3(veth0_to_bridge) entered disabled state [ 268.893989][T15961] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.901397][T15961] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.991939][T15975] device syzkaller0 entered promiscuous mode [ 269.053726][T15973] device syzkaller0 entered promiscuous mode [ 269.387507][T16017] device syzkaller0 entered promiscuous mode [ 269.580069][T16039] device syzkaller0 entered promiscuous mode [ 270.290350][T16084] device syzkaller0 entered promiscuous mode [ 270.417223][T16090] device syzkaller0 entered promiscuous mode [ 271.012705][T16130] @ÿ: renamed from bond_slave_0 [ 272.287214][T16235] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.294485][T16235] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.454027][T16236] device bridge_slave_1 left promiscuous mode [ 272.471683][T16236] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.549469][T16236] device bridge_slave_0 left promiscuous mode [ 272.598135][T16236] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.168658][T16303] device syzkaller0 entered promiscuous mode [ 274.564019][T16409] device syzkaller0 entered promiscuous mode [ 274.732475][T16430] syz.3.4763[16430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.732531][T16430] syz.3.4763[16430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.368681][T16514] device sit0 left promiscuous mode [ 275.439696][T16514] device sit0 entered promiscuous mode [ 275.772386][T16571] device syzkaller0 entered promiscuous mode [ 275.869168][T16575] device wg2 entered promiscuous mode [ 276.194816][T16623] device sit0 left promiscuous mode [ 276.274899][T16627] device sit0 entered promiscuous mode [ 276.589766][T16638] device syzkaller0 entered promiscuous mode [ 278.393186][T16747] device syzkaller0 entered promiscuous mode [ 279.030548][T16804] device sit0 left promiscuous mode [ 279.151260][T16806] device sit0 entered promiscuous mode [ 280.013439][T16864] syz.3.4883[16864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.013697][T16864] syz.3.4883[16864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.437605][T16884] device syzkaller0 entered promiscuous mode [ 283.025749][T17048] : port 1(ip6gretap0) entered blocking state [ 283.032156][T17048] : port 1(ip6gretap0) entered disabled state [ 283.041947][T17048] device ip6gretap0 entered promiscuous mode [ 283.083444][T17032] device ip6gretap0 left promiscuous mode [ 283.092780][T17032] : port 1(ip6gretap0) entered disabled state [ 283.479153][T17084] €Â0: renamed from pim6reg1 [ 283.511131][T17092] ÿÿÿÿÿÿ: renamed from vlan1 [ 283.599301][T17100] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 283.805874][T17121] device syzkaller0 entered promiscuous mode [ 285.074816][T17206] device sit0 entered promiscuous mode [ 285.105086][T17202] device syzkaller0 entered promiscuous mode [ 285.429499][T17216] device syzkaller0 entered promiscuous mode [ 285.997550][T17245] tap0: tun_chr_ioctl cmd 1074025677 [ 286.002916][T17245] tap0: linktype set to 778 [ 286.400702][T17262] device syzkaller0 entered promiscuous mode [ 287.494582][T17326] tun0: tun_chr_ioctl cmd 2147767506 [ 288.939993][T17387] ³þ: renamed from bond_slave_0 [ 289.854277][T17443] device syzkaller0 entered promiscuous mode [ 289.910145][T17441] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 291.078280][T17546] device syzkaller0 entered promiscuous mode [ 291.127855][T17553] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 291.144339][T17553] syzkaller0: linktype set to 0 [ 291.236417][T17559] device dummy0 entered promiscuous mode [ 291.383542][T17567] device syzkaller0 entered promiscuous mode [ 292.158906][T17582] device syzkaller0 entered promiscuous mode [ 292.240095][T17617] device syzkaller0 entered promiscuous mode [ 292.267151][T17617] syzkaller0: tun_net_xmit 1280 [ 292.343196][T17622] device sit0 left promiscuous mode [ 293.176663][T17641] : renamed from bond_slave_0 [ 294.115105][T17697] device syzkaller0 entered promiscuous mode [ 295.559621][T17792] device syz_tun entered promiscuous mode [ 295.981799][T17813] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.990861][T17813] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.146741][T17825] tun0: tun_chr_ioctl cmd 1074025676 [ 296.156817][T17825] tun0: owner set to 0 [ 296.176778][T17828] device bridge_slave_1 left promiscuous mode [ 296.205739][T17828] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.234943][T17828] device bridge_slave_0 left promiscuous mode [ 296.242385][T17828] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.339362][T17883] device wg2 left promiscuous mode [ 297.451607][T17883] device wg2 entered promiscuous mode [ 297.460704][T17883] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 297.502009][T17896] tun0: tun_chr_ioctl cmd 2147767506 [ 298.777101][T17990] device syzkaller0 entered promiscuous mode [ 298.856336][T17978] tap0: tun_chr_ioctl cmd 1074025677 [ 298.868363][T17978] tap0: linktype set to 805 [ 299.289325][T18012] batadv0: tun_chr_ioctl cmd 21731 [ 301.816954][T18111] device syzkaller0 entered promiscuous mode [ 301.873700][T18112] device syzkaller0 left promiscuous mode [ 302.020503][T18123] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 302.126560][T18129] device syzkaller0 entered promiscuous mode [ 303.013553][T18168] tap1: tun_chr_ioctl cmd 21731 [ 303.169339][T18168] tap1: tun_chr_ioctl cmd 1074025677 [ 303.234550][T18168] tap1: linktype set to 805 [ 303.652760][T18210] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 304.668548][T18276] device syzkaller0 entered promiscuous mode [ 304.867661][T18285] device sit0 entered promiscuous mode [ 305.418465][T18329] device veth0_vlan left promiscuous mode [ 305.440017][T18329] device veth0_vlan entered promiscuous mode [ 305.572577][T18337] device wg2 left promiscuous mode [ 306.525697][T18380] +: renamed from team_slave_1 [ 306.981267][T18429] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 307.014851][T18429] device syzkaller0 entered promiscuous mode [ 307.101771][T18434] device syzkaller0 entered promiscuous mode [ 307.720545][T18488] device syzkaller0 entered promiscuous mode [ 308.477746][T18538] device pim6reg1 entered promiscuous mode [ 308.895065][T18570] tap0: tun_chr_ioctl cmd 1074025680 [ 309.022516][ T24] audit: type=1400 audit(1775553972.420:175): avc: denied { create } for pid=18574 comm="syz.2.5407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 309.057124][T18576] cgroup: fork rejected by pids controller in /syz3 [ 309.666024][T18689] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.673375][T18689] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.682009][T18689] device bridge_slave_0 entered promiscuous mode [ 309.705548][T18689] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.712753][T18689] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.721881][T18689] device bridge_slave_1 entered promiscuous mode [ 309.742858][T18706] device syzkaller0 entered promiscuous mode [ 310.108385][T18689] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.115941][T18689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.123241][T18689] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.130298][T18689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.280603][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.290339][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.423939][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.432018][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.473185][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 310.481962][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.490922][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.498202][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.511245][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.520540][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.529130][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.536241][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.543927][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 310.552406][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.560518][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 310.568836][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.683050][T18689] device veth0_vlan entered promiscuous mode [ 310.717637][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 310.727472][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.738880][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 310.747883][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.798415][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.833383][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.858443][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 310.902321][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.945105][T18689] device veth1_macvtap entered promiscuous mode [ 310.958416][ T9] device vlan1 left promiscuous mode [ 310.968396][ T9] Ÿë: port 1(vlan1) entered disabled state [ 310.982425][ T9] device veth0_to_bridge left promiscuous mode [ 310.991262][ T9] bridge0: port 3(veth0_to_bridge) entered disabled state [ 310.999274][ T9] device bridge_slave_1 left promiscuous mode [ 311.005531][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.015146][ T9] device bridge_slave_0 left promiscuous mode [ 311.021881][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.031215][ T9] device veth0_vlan left promiscuous mode [ 311.360524][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 311.379362][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 311.390381][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.408795][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.419630][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 312.013561][T18814] geneve0: tun_chr_ioctl cmd 1074025677 [ 312.044519][T18814] geneve0: linktype set to 1 [ 312.555258][T18825] device wg2 entered promiscuous mode [ 313.038855][T18847] device syzkaller0 entered promiscuous mode [ 313.280000][T18868] +: renamed from team_slave_1 [ 314.131390][T18908] device syzkaller0 entered promiscuous mode [ 315.884967][T19037] device syzkaller0 entered promiscuous mode [ 316.006293][T19045] bridge0: port 3(veth0_to_bridge) entered blocking state [ 316.030573][T19045] bridge0: port 3(veth0_to_bridge) entered disabled state [ 316.049912][T19045] device veth0_to_bridge entered promiscuous mode [ 316.067749][T19045] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.081018][T19045] bridge0: port 3(veth0_to_bridge) entered blocking state [ 316.088359][T19045] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 316.610443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.622618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:cc:27:20:ef:c2, vlan:0) [ 316.634866][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.647040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:cc:27:20:ef:c2, vlan:0) [ 316.659454][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.671520][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:cc:27:20:ef:c2, vlan:0) [ 316.683821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.696084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:cc:27:20:ef:c2, vlan:0) [ 316.708345][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.720539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:9e:cc:27:20:ef:c2, vlan:0) [ 318.219886][T19137] device syzkaller0 entered promiscuous mode [ 318.475715][T19153] cgroup: fork rejected by pids controller in /syz2 [ 318.679546][T19162] FAULT_INJECTION: forcing a failure. [ 318.679546][T19162] name failslab, interval 1, probability 0, space 0, times 1 [ 318.858393][T19162] CPU: 0 PID: 19162 Comm: syz.0.5552 Tainted: G W syzkaller #0 [ 318.867313][T19162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 318.877501][T19162] Call Trace: [ 318.880890][T19162] __dump_stack+0x21/0x24 [ 318.885277][T19162] dump_stack_lvl+0x1a7/0x208 [ 318.889969][T19162] ? show_regs_print_info+0x18/0x18 [ 318.895175][T19162] dump_stack+0x15/0x1c [ 318.899341][T19162] should_fail+0x3c1/0x510 [ 318.903786][T19162] ? btf_new_fd+0x1a7/0xa00 [ 318.908311][T19162] __should_failslab+0xa4/0xe0 [ 318.913091][T19162] should_failslab+0x9/0x20 [ 318.917600][T19162] kmem_cache_alloc_trace+0x3a/0x2e0 [ 318.922896][T19162] ? btf_new_fd+0x113/0xa00 [ 318.927408][T19162] btf_new_fd+0x1a7/0xa00 [ 318.931833][T19162] bpf_btf_load+0x5e/0x70 [ 318.936170][T19162] __se_sys_bpf+0x4ea/0x740 [ 318.940676][T19162] ? __x64_sys_bpf+0x90/0x90 [ 318.945381][T19162] ? debug_smp_processor_id+0x17/0x20 [ 318.950841][T19162] __x64_sys_bpf+0x7b/0x90 [ 318.955260][T19162] do_syscall_64+0x31/0x40 [ 318.959687][T19162] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 318.965758][T19162] RIP: 0033:0x7fa1ddb49819 [ 318.970181][T19162] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 318.989798][T19162] RSP: 002b:00007fa1dc5a4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 318.998311][T19162] RAX: ffffffffffffffda RBX: 00007fa1dddc2fa0 RCX: 00007fa1ddb49819 [ 319.006306][T19162] RDX: 0000000000000028 RSI: 0000200000000200 RDI: 0000000000000012 [ 319.014575][T19162] RBP: 00007fa1dc5a4090 R08: 0000000000000000 R09: 0000000000000000 [ 319.022561][T19162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.030553][T19162] R13: 00007fa1dddc3038 R14: 00007fa1dddc2fa0 R15: 00007ffdce1fe528 [ 319.186619][T19178] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.230679][ T647] bridge0: port 3(veth0_to_bridge) entered disabled state [ 319.346886][T19173] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.356231][T19173] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.414610][T19173] device bridge_slave_0 entered promiscuous mode [ 319.479203][T19173] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.486331][T19173] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.527882][T19173] device bridge_slave_1 entered promiscuous mode [ 319.975920][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.989343][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.106004][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 320.121892][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.139850][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.146935][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.154847][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.172514][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.181481][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.188654][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.196380][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.205506][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.231315][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.259731][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.306678][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.319721][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.336710][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.357259][T19173] device veth0_vlan entered promiscuous mode [ 320.406751][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.439374][T19220] FAULT_INJECTION: forcing a failure. [ 320.439374][T19220] name failslab, interval 1, probability 0, space 0, times 0 [ 320.459065][T19220] CPU: 0 PID: 19220 Comm: syz.3.5569 Tainted: G W syzkaller #0 [ 320.468025][T19220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 320.478091][T19220] Call Trace: [ 320.481749][T19220] __dump_stack+0x21/0x24 [ 320.486101][T19220] dump_stack_lvl+0x1a7/0x208 [ 320.490884][T19220] ? show_regs_print_info+0x18/0x18 [ 320.496085][T19220] dump_stack+0x15/0x1c [ 320.500239][T19220] should_fail+0x3c1/0x510 [ 320.504656][T19220] ? kvmalloc_node+0x88/0x130 [ 320.509434][T19220] __should_failslab+0xa4/0xe0 [ 320.514213][T19220] should_failslab+0x9/0x20 [ 320.518722][T19220] __kmalloc+0x60/0x330 [ 320.522889][T19220] kvmalloc_node+0x88/0x130 [ 320.527489][T19220] btf_new_fd+0x1e4/0xa00 [ 320.531820][T19220] bpf_btf_load+0x5e/0x70 [ 320.536150][T19220] __se_sys_bpf+0x4ea/0x740 [ 320.540656][T19220] ? __x64_sys_bpf+0x90/0x90 [ 320.545339][T19220] ? debug_smp_processor_id+0x17/0x20 [ 320.550803][T19220] __x64_sys_bpf+0x7b/0x90 [ 320.555291][T19220] do_syscall_64+0x31/0x40 [ 320.559715][T19220] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 320.565717][T19220] RIP: 0033:0x7f3a27017819 [ 320.570138][T19220] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 320.589965][T19220] RSP: 002b:00007f3a25a72028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 320.598376][T19220] RAX: ffffffffffffffda RBX: 00007f3a27290fa0 RCX: 00007f3a27017819 [ 320.606687][T19220] RDX: 0000000000000028 RSI: 0000200000000200 RDI: 0000000000000012 [ 320.614662][T19220] RBP: 00007f3a25a72090 R08: 0000000000000000 R09: 0000000000000000 [ 320.622729][T19220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.630803][T19220] R13: 00007f3a27291038 R14: 00007f3a27290fa0 R15: 00007fff2711ce08 [ 320.680077][T19173] device veth1_macvtap entered promiscuous mode [ 320.830130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 320.839412][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 320.979104][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 320.987640][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 321.051356][ T9] device veth0_to_bridge left promiscuous mode [ 321.057690][ T9] bridge0: port 3(veth0_to_bridge) entered disabled state [ 321.065291][ T9] device bridge_slave_1 left promiscuous mode [ 321.071533][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.079277][ T9] device bridge_slave_0 left promiscuous mode [ 321.085415][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.093273][ T9] device veth1_macvtap left promiscuous mode [ 322.176328][T19312] syz.0.5593[19312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.176377][T19312] syz.0.5593[19312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.083655][T19337] device wg2 left promiscuous mode [ 324.795909][T19455] device syzkaller0 entered promiscuous mode [ 324.926122][T19477] FAULT_INJECTION: forcing a failure. [ 324.926122][T19477] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 324.949156][T19477] CPU: 0 PID: 19477 Comm: syz.2.5640 Tainted: G W syzkaller #0 [ 324.958032][T19477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 324.968341][T19477] Call Trace: [ 324.971624][T19477] __dump_stack+0x21/0x24 [ 324.976033][T19477] dump_stack_lvl+0x1a7/0x208 [ 324.980729][T19477] ? thaw_kernel_threads+0x220/0x220 [ 324.986026][T19477] ? show_regs_print_info+0x18/0x18 [ 324.991239][T19477] ? vsnprintf+0x14e/0x1990 [ 324.995740][T19477] ? memcpy+0x56/0x70 [ 324.999723][T19477] dump_stack+0x15/0x1c [ 325.003869][T19477] should_fail+0x3c1/0x510 [ 325.008396][T19477] should_fail_usercopy+0x1a/0x20 [ 325.013413][T19477] _copy_to_user+0x20/0x90 [ 325.017839][T19477] bpf_verifier_vlog+0x1b4/0x330 [ 325.022883][T19477] __btf_verifier_log+0xdf/0x130 [ 325.027993][T19477] ? btf_check_sec_info+0x350/0x350 [ 325.033281][T19477] ? memcpy+0x56/0x70 [ 325.037418][T19477] btf_parse_hdr+0x418/0x7c0 [ 325.042168][T19477] btf_new_fd+0x4af/0xa00 [ 325.046573][T19477] bpf_btf_load+0x5e/0x70 [ 325.050896][T19477] __se_sys_bpf+0x4ea/0x740 [ 325.055476][T19477] ? __x64_sys_bpf+0x90/0x90 [ 325.060216][T19477] ? debug_smp_processor_id+0x17/0x20 [ 325.065576][T19477] __x64_sys_bpf+0x7b/0x90 [ 325.069995][T19477] do_syscall_64+0x31/0x40 [ 325.074607][T19477] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 325.080490][T19477] RIP: 0033:0x7f0a0d942819 [ 325.084894][T19477] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 325.104839][T19477] RSP: 002b:00007f0a0c39d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 325.113437][T19477] RAX: ffffffffffffffda RBX: 00007f0a0dbbbfa0 RCX: 00007f0a0d942819 [ 325.121399][T19477] RDX: 0000000000000028 RSI: 0000200000000200 RDI: 0000000000000012 [ 325.129537][T19477] RBP: 00007f0a0c39d090 R08: 0000000000000000 R09: 0000000000000000 [ 325.137515][T19477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 325.145479][T19477] R13: 00007f0a0dbbc038 R14: 00007f0a0dbbbfa0 R15: 00007fff7e731a48 [ 325.766092][T19531] device syzkaller0 entered promiscuous mode [ 325.917697][T19542] device syzkaller0 entered promiscuous mode [ 326.493126][T19591] +: renamed from team_slave_1 [ 327.416254][T19644] device syzkaller0 entered promiscuous mode [ 329.089355][T19752] device sit0 entered promiscuous mode [ 329.494412][T19781] device wg2 entered promiscuous mode [ 329.506189][T19781] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 330.208004][T19807] device syzkaller0 entered promiscuous mode [ 330.972632][T19859] device syzkaller0 entered promiscuous mode [ 331.084346][T19876] syz.2.5763[19876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.084433][T19876] syz.2.5763[19876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.294545][T19893] device syzkaller0 entered promiscuous mode [ 334.663636][T20108] device syzkaller0 entered promiscuous mode [ 335.745339][T20227] device syzkaller0 entered promiscuous mode [ 335.773706][T20235] device syzkaller0 entered promiscuous mode [ 335.926614][T20257] device syzkaller0 entered promiscuous mode [ 336.160186][T20261] device syzkaller0 entered promiscuous mode [ 337.894655][T20427] bridge0: port 4(veth1) entered blocking state [ 337.906714][T20427] bridge0: port 4(veth1) entered disabled state [ 337.913834][T20427] device veth1 entered promiscuous mode [ 337.921500][T20427] bridge0: port 4(veth1) entered blocking state [ 337.928051][T20427] bridge0: port 4(veth1) entered forwarding state [ 337.945940][T20426] device veth1 left promiscuous mode [ 337.960164][T20426] bridge0: port 4(veth1) entered disabled state [ 338.206902][T20452] device syzkaller0 entered promiscuous mode [ 338.592100][T20463] device sit0 entered promiscuous mode [ 339.028025][T20493] @0Ù: renamed from bond_slave_1 [ 341.499070][T20679] device syzkaller0 entered promiscuous mode [ 341.921354][T20696] device syzkaller0 entered promiscuous mode [ 343.274053][T20794] -1: renamed from syzkaller0 [ 343.639085][T20806] device syzkaller0 entered promiscuous mode [ 344.540877][T20862] device syzkaller0 entered promiscuous mode [ 345.147588][T20906] device sit0 left promiscuous mode [ 345.326881][T20911] device sit0 entered promiscuous mode [ 345.490285][T20919] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 345.497362][T20919] syzkaller0: linktype set to 773 [ 345.637271][T20923] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.644541][T20923] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.652668][T20923] device bridge_slave_0 entered promiscuous mode [ 345.664103][T20923] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.671391][T20923] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.680526][T20923] device bridge_slave_1 entered promiscuous mode [ 345.864042][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 345.878117][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.917723][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.927342][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.936034][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.943166][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.951378][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.960556][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.968810][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.975870][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.987449][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.995177][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 346.007531][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.015586][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 346.024241][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.042045][T20949] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 346.055531][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 346.064553][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.078748][T20923] device veth0_vlan entered promiscuous mode [ 346.085564][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 346.093653][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.102138][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.114480][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.139680][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 346.148161][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 346.159315][T20923] device veth1_macvtap entered promiscuous mode [ 346.184495][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 346.193052][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 346.201479][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 346.209928][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 346.218229][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 346.346708][T20967] device syzkaller0 entered promiscuous mode [ 346.570101][T20981] device syzkaller0 entered promiscuous mode [ 346.837086][T21005] device veth1_macvtap left promiscuous mode [ 346.857008][T21005] device veth1_macvtap entered promiscuous mode [ 346.886170][T21005] device macsec0 entered promiscuous mode [ 347.287413][ T7] bridge0: port 3(gretap0) entered disabled state [ 347.320771][ T7] device gretap0 left promiscuous mode [ 347.337941][ T7] bridge0: port 3(gretap0) entered disabled state [ 347.814202][ T7] device bridge_slave_1 left promiscuous mode [ 347.829192][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.864570][ T7] device bridge_slave_0 left promiscuous mode [ 347.893168][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.175458][T21078] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 348.569262][T21119] device syzkaller0 entered promiscuous mode [ 348.713563][T21126] device veth0_vlan left promiscuous mode [ 348.742923][T21126] device veth0_vlan entered promiscuous mode [ 349.324221][T21183] device syzkaller0 entered promiscuous mode [ 350.956053][T21340] device wg2 entered promiscuous mode [ 351.519871][T21391] device wg2 left promiscuous mode [ 352.529927][T21451] @ÿ: renamed from bond_slave_0 [ 353.239182][T21497] device syzkaller0 entered promiscuous mode [ 353.320879][T21506] device vlan0 entered promiscuous mode [ 355.019127][T21623] device macsec0 entered promiscuous mode [ 356.247968][T21706] device syzkaller0 entered promiscuous mode [ 357.234625][T21748] : port 1(ip6gretap0) entered blocking state [ 357.242070][T21748] : port 1(ip6gretap0) entered disabled state [ 357.260700][T21748] device ip6gretap0 entered promiscuous mode [ 357.279589][T21762] device pim6reg1 entered promiscuous mode [ 357.544791][T21799] syz.1.6346[21799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.544875][T21799] syz.1.6346[21799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.601963][T21804] device syzkaller0 entered promiscuous mode [ 357.883297][T21832] device syzkaller0 entered promiscuous mode [ 358.394931][T21881] device syzkaller0 entered promiscuous mode [ 358.421789][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 358.446988][T21882] device wg2 left promiscuous mode [ 359.220934][T21942] device syzkaller0 entered promiscuous mode [ 359.578810][T21981] device syzkaller0 entered promiscuous mode [ 359.667253][T21987] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 359.705321][T21987] device syzkaller0 entered promiscuous mode [ 361.102858][T22069] device syzkaller0 entered promiscuous mode [ 362.109310][T22163] syz.1.6457[22163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.109375][T22163] syz.1.6457[22163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.038541][T22212] device syzkaller0 entered promiscuous mode [ 364.482543][T22293] device syzkaller0 entered promiscuous mode [ 364.863138][T22321] Â: renamed from pim6reg1 [ 366.351528][T22381] device macsec0 entered promiscuous mode [ 366.357602][T22381] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 367.069584][T22468] device syzkaller0 entered promiscuous mode [ 367.096452][T22467] device pim6reg1 entered promiscuous mode [ 367.321410][T22478] net_ratelimit: 20032 callbacks suppressed [ 367.321473][T22478] erspan0: mtu less than device minimum [ 367.721946][T22486] device syzkaller0 entered promiscuous mode [ 368.400791][T22548] IPv6: pim6reg1: Disabled Multicast RS [ 369.393749][T22593] device syzkaller0 entered promiscuous mode [ 371.461829][T22723] device syzkaller0 entered promiscuous mode [ 371.634294][T22756] device syzkaller0 entered promiscuous mode [ 372.423796][T22817] device syzkaller0 entered promiscuous mode [ 374.664056][T22941] device syzkaller0 entered promiscuous mode [ 376.663868][T23145] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.676548][T23145] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.724224][T23145] device bridge_slave_0 entered promiscuous mode [ 376.795261][T23145] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.819591][T23145] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.884461][T23145] device bridge_slave_1 entered promiscuous mode [ 377.248570][T23145] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.255759][T23145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.263092][T23145] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.270176][T23145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.322471][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.336885][T21016] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.374080][T21016] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.407014][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.434631][T21016] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.441746][T21016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.467145][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.479470][T21016] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.486537][T21016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.521411][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.530478][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.569595][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 377.587273][T23145] device veth0_vlan entered promiscuous mode [ 377.597018][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 377.605410][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.619043][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.627216][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 377.676537][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 377.685068][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.705380][T23145] device veth1_macvtap entered promiscuous mode [ 377.716642][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 377.729502][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.740150][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.749939][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.758282][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 378.277243][T23229] device syzkaller0 entered promiscuous mode [ 378.382586][ T378] device bridge_slave_1 left promiscuous mode [ 378.388807][ T378] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.396351][ T378] device bridge_slave_0 left promiscuous mode [ 378.402788][ T378] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.410851][ T378] device veth1_macvtap left promiscuous mode [ 378.416909][ T378] device veth0_vlan left promiscuous mode [ 378.911279][T23261] +: renamed from team_slave_1 [ 379.252667][T23289] device syzkaller0 entered promiscuous mode [ 382.677897][T23485] device syzkaller0 entered promiscuous mode [ 383.862098][T23583] device syzkaller0 entered promiscuous mode [ 383.890742][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 384.312055][T23615] device syzkaller0 entered promiscuous mode [ 385.205605][T23684] device syzkaller0 entered promiscuous mode [ 386.835075][T23842] device sit0 left promiscuous mode [ 386.881766][T23842] device sit0 entered promiscuous mode [ 387.121967][T23858] device syzkaller0 entered promiscuous mode [ 387.872978][T23856] device syzkaller0 entered promiscuous mode [ 388.057224][T23902] device macsec0 entered promiscuous mode [ 388.240622][T23909] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.247886][T23909] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.269830][T23910] device bridge_slave_1 left promiscuous mode [ 388.313122][T23910] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.340025][T23910] device bridge_slave_0 left promiscuous mode [ 388.369169][T23910] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.271318][T23951] : port 1(ip6gretap0) entered blocking state [ 389.277732][T23951] : port 1(ip6gretap0) entered disabled state [ 389.298464][T23951] device ip6gretap0 entered promiscuous mode [ 389.317120][T23953] device ip6gretap0 left promiscuous mode [ 389.323056][T23953] : port 1(ip6gretap0) entered disabled state [ 389.398538][T23955] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 389.464121][T23955] device syzkaller0 entered promiscuous mode [ 391.167189][T24055] device lo entered promiscuous mode [ 391.967940][T24093] device syzkaller0 entered promiscuous mode [ 392.158839][T24105] device syzkaller0 entered promiscuous mode [ 392.686903][T24139] device syzkaller0 entered promiscuous mode [ 392.854827][T24167] @0Ù: renamed from bond_slave_1 [ 392.892459][T24179] device sit0 left promiscuous mode [ 392.966242][T24179] device sit0 entered promiscuous mode [ 393.133824][T24191] device syzkaller0 entered promiscuous mode [ 393.170395][T24187] syz.0.7019[24187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.170456][T24187] syz.0.7019[24187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.415120][T24209] device syzkaller0 entered promiscuous mode [ 393.498620][T24204] bridge0: port 4(gretap0) entered blocking state [ 393.516994][T24204] bridge0: port 4(gretap0) entered disabled state [ 393.541416][T24204] device gretap0 entered promiscuous mode [ 393.550758][T24204] bridge0: port 4(gretap0) entered blocking state [ 393.557479][T24204] bridge0: port 4(gretap0) entered forwarding state [ 394.259035][T24260] device veth0_vlan left promiscuous mode [ 394.290978][T24260] device veth0_vlan entered promiscuous mode [ 394.334264][T24275] device sit0 left promiscuous mode [ 394.376535][T24273] device syzkaller0 entered promiscuous mode [ 394.541382][T24281] device syzkaller0 entered promiscuous mode [ 395.007305][T24298] device veth1_macvtap left promiscuous mode [ 395.119678][T24298] device macsec0 left promiscuous mode [ 395.384099][T24337] device syzkaller0 entered promiscuous mode [ 396.115823][T24376] device wg2 entered promiscuous mode [ 398.513883][T24566] syz.2.7132[24566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.513939][T24566] syz.2.7132[24566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.991046][T24576] 6±ÿÿÿ: renamed from team_slave_1 [ 399.074188][T24585] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.081438][T24585] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.192027][T24619] device syzkaller0 entered promiscuous mode [ 400.456105][T24681] device syzkaller0 entered promiscuous mode [ 401.446774][T24745] device syzkaller0 entered promiscuous mode [ 402.161688][T24771] device syzkaller0 entered promiscuous mode [ 403.015984][T24801] sock: sock_set_timeout: `syz.4.7204' (pid 24801) tries to set negative timeout [ 404.008140][ T24] audit: type=1400 audit(1775554067.400:176): avc: denied { create } for pid=24844 comm="syz.4.7218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 404.315933][T24860] device veth1_macvtap left promiscuous mode [ 404.322583][T24860] device macsec0 left promiscuous mode [ 404.340193][T24863] device veth1_macvtap entered promiscuous mode [ 404.353623][T24863] device macsec0 entered promiscuous mode [ 408.401421][T25030] device wg2 left promiscuous mode [ 408.441467][T25030] device wg2 entered promiscuous mode [ 408.644671][T25051] : renamed from bond_slave_0 [ 410.784322][T25210] bridge0: port 3(veth0_vlan) entered blocking state [ 410.795256][T25210] bridge0: port 3(veth0_vlan) entered disabled state [ 412.850114][T25332] device syzkaller0 entered promiscuous mode [ 414.125094][T25393] device syzkaller0 entered promiscuous mode [ 414.394832][ T24] audit: type=1400 audit(1775554077.790:177): avc: denied { create } for pid=25420 comm="syz.4.7379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 414.603612][T25430] device syzkaller0 entered promiscuous mode [ 414.714137][T25447] syz.2.7385[25447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.714197][T25447] syz.2.7385[25447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.985616][T25472] device syzkaller0 entered promiscuous mode [ 415.025581][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 415.674971][T25510] device syzkaller0 entered promiscuous mode [ 415.734853][T25513] device syzkaller0 entered promiscuous mode [ 415.778470][T25511] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.785630][T25511] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.793195][T25511] device bridge_slave_0 entered promiscuous mode [ 415.800409][T25511] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.807485][T25511] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.815131][T25511] device bridge_slave_1 entered promiscuous mode [ 415.875927][T25511] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.883033][T25511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 415.890364][T25511] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.897403][T25511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 415.922247][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 415.936851][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.619879][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.645977][T25533] device wg2 left promiscuous mode [ 416.717570][T25535] device wg2 entered promiscuous mode [ 416.748543][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.765201][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.773587][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.780755][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.799372][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.808358][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.818376][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.825922][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.841475][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 416.857436][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 416.867809][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 416.889666][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.917454][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 416.936362][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 417.021489][T25511] device veth0_vlan entered promiscuous mode [ 417.045247][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 417.054119][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.067109][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.081316][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.129641][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 417.138024][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 417.260552][T25511] device veth1_macvtap entered promiscuous mode [ 417.319337][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 417.339380][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 417.388567][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 417.453532][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 417.482333][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 417.879226][T25629] device veth1_macvtap left promiscuous mode [ 417.953451][T25629] device macsec0 left promiscuous mode [ 418.076929][T25629] device veth1_macvtap entered promiscuous mode [ 418.121306][T25629] device macsec0 entered promiscuous mode [ 418.310853][ T9] device veth1_macvtap left promiscuous mode [ 419.195397][T25674] device syzkaller0 entered promiscuous mode [ 419.413663][T25692] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 419.440802][T25692] syzkaller0: linktype set to 825 [ 419.602086][T25691] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 420.302839][T25745] batadv0: tun_chr_ioctl cmd 1074025677 [ 420.308450][T25745] batadv0: linktype set to 804 [ 420.583801][T25769] device syzkaller0 entered promiscuous mode [ 421.407046][T25802] device syzkaller0 entered promiscuous mode [ 424.046610][T25960] device pim6reg1 entered promiscuous mode [ 425.575463][T26010] device syzkaller0 entered promiscuous mode [ 426.283761][T26045] nr0: port 1(macsec0) entered blocking state [ 426.289935][T26045] nr0: port 1(macsec0) entered disabled state [ 428.628886][T26180] tap0: tun_chr_ioctl cmd 1074025677 [ 428.634682][T26180] tap0: linktype set to 6 [ 429.094755][T26216] bridge0: port 3(gretap0) entered blocking state [ 429.110063][T26216] bridge0: port 3(gretap0) entered disabled state [ 429.125258][T26216] device gretap0 entered promiscuous mode [ 429.132973][T26216] bridge0: port 3(gretap0) entered blocking state [ 429.139702][T26216] bridge0: port 3(gretap0) entered forwarding state [ 429.994090][T26268] device wg2 left promiscuous mode [ 432.835534][T26416] device syzkaller0 entered promiscuous mode [ 433.162154][T26428] tap0: tun_chr_ioctl cmd 1074025677 [ 433.167497][T26428] tap0: linktype set to 769 [ 433.769904][T26474] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.779281][T26474] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.793547][T26474] device bridge_slave_0 entered promiscuous mode [ 433.820776][T26474] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.828978][T26474] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.845642][T26474] device bridge_slave_1 entered promiscuous mode [ 434.250608][T26474] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.257774][T26474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.265105][T26474] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.272151][T26474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.340182][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.353542][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.444492][T26515] syz.2.7709[26515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.444563][T26515] syz.2.7709[26515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.455695][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 434.485374][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.493043][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 434.502182][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.510852][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.518019][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.612681][T26506] device wg2 entered promiscuous mode [ 434.652125][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 434.660697][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.668932][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.676008][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.684135][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 434.692877][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.700979][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 434.709414][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.756063][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 434.766228][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 434.844691][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 434.853245][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.861518][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.869233][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.919313][T26474] device veth0_vlan entered promiscuous mode [ 434.977476][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 434.989721][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 435.002055][T26474] device veth1_macvtap entered promiscuous mode [ 435.037407][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 435.045396][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 435.054131][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 435.100800][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 435.115294][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 435.236247][T26551] device syzkaller0 entered promiscuous mode [ 435.467780][T26557] device wg2 entered promiscuous mode [ 435.988593][T26563] device syzkaller0 entered promiscuous mode [ 438.007727][T26634] device syzkaller0 entered promiscuous mode [ 438.630954][T26676] device syzkaller0 entered promiscuous mode [ 438.878120][T26685] bridge0: port 1(bridge_slave_0) entered blocking state [ 438.919128][T26685] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.948706][T26685] device bridge_slave_0 entered promiscuous mode [ 438.999010][T26685] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.006087][T26685] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.044471][T26685] device bridge_slave_1 entered promiscuous mode [ 439.077849][T26702] device syzkaller0 entered promiscuous mode [ 439.273766][T26685] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.280859][T26685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.288232][T26685] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.295394][T26685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.375031][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 439.435293][T21016] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.444075][T21016] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.479198][T26731] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 439.488440][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 439.506767][T26724] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 439.518446][T21016] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.525807][T21016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.565303][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 439.599192][T21016] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.606451][T21016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.616414][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 439.624684][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 439.645262][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 439.662141][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 439.684600][T26685] device veth0_vlan entered promiscuous mode [ 439.711859][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 439.732240][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.747758][T26685] device veth1_macvtap entered promiscuous mode [ 439.754997][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.781546][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 439.827108][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 439.853789][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 439.862358][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 439.884937][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 439.896508][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 439.905212][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 439.913762][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 440.217720][ T9] nr0: port 1(macsec0) entered disabled state [ 440.225914][ T9] device veth1_macvtap left promiscuous mode [ 440.235182][ T9] device veth0_vlan left promiscuous mode [ 440.377545][T26788] device macsec0 entered promiscuous mode [ 440.486756][T26811] device syzkaller0 entered promiscuous mode [ 440.649806][T26813] ªªªªªª: renamed from vlan0 [ 441.152206][T26886] device veth1_macvtap left promiscuous mode [ 441.165321][T26886] device macsec0 left promiscuous mode [ 441.188509][T26886] device veth1_macvtap entered promiscuous mode [ 441.196158][T26886] device macsec0 entered promiscuous mode [ 442.024473][T26935] device syzkaller0 entered promiscuous mode [ 442.049477][T26926] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.085308][T26926] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.132898][T26926] device bridge_slave_0 entered promiscuous mode [ 442.214206][T26926] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.229065][T26926] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.256831][T26926] device bridge_slave_1 entered promiscuous mode [ 442.562310][T26926] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.569539][T26926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.576903][T26926] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.584256][T26926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.613799][T26959] : port 2(syz_tun) entered blocking state [ 442.620189][T26959] : port 2(syz_tun) entered disabled state [ 442.626624][T26959] device syz_tun entered promiscuous mode [ 442.663385][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 442.691577][T21016] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.709414][T21016] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.734497][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 442.745991][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 442.754374][T21016] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.761434][T21016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.806608][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 442.820994][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 442.829452][T21016] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.836622][T21016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.854055][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 442.862604][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 442.906801][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 442.921728][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 442.963894][T26926] device veth0_vlan entered promiscuous mode [ 442.983647][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 442.997126][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 443.011564][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 443.019984][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.030073][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.037712][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 443.165592][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 443.177217][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 443.230963][T26926] device veth1_macvtap entered promiscuous mode [ 443.291582][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 443.303984][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 443.318044][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 443.461095][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 443.469917][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 443.840048][ T24] audit: type=1400 audit(1775554107.230:178): avc: denied { create } for pid=27005 comm="syz.0.7858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 445.531656][T27139] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 450.323584][T27350] Â: renamed from pim6reg1 [ 452.610809][T27425] device syzkaller0 entered promiscuous mode [ 452.703037][T27444] device veth0_vlan left promiscuous mode [ 452.714562][T27444] device veth0_vlan entered promiscuous mode [ 452.747817][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.756656][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 452.768476][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 454.055161][T27541] device syzkaller0 entered promiscuous mode [ 456.463539][T27679] -1: renamed from syzkaller0 [ 457.413971][T27760] device sit0 entered promiscuous mode [ 457.952391][T27789] device dummy0 entered promiscuous mode [ 459.825852][T27958] device pim6reg1 entered promiscuous mode [ 460.236407][T28001] device veth0_vlan left promiscuous mode [ 460.253509][T28001] device veth0_vlan entered promiscuous mode [ 460.279514][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 460.291230][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 460.319490][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 461.160655][T28046] device wg2 left promiscuous mode [ 461.450952][T28046] device wg2 entered promiscuous mode [ 461.507123][T28067] device syzkaller0 entered promiscuous mode [ 462.027392][T28107] device syzkaller0 entered promiscuous mode [ 462.046600][T28107] syzkaller0: tun_net_xmit 1280 [ 462.053705][T28107] syzkaller0: create flow: hash 3816466021 index 1 [ 462.072108][T28106] syzkaller0: delete flow: hash 3816466021 index 1 [ 463.516443][T28153] device syzkaller0 entered promiscuous mode [ 464.147119][T28198] batadv0: tun_chr_ioctl cmd 2148553947 [ 464.389091][T28238] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 465.618023][T28257] device syzkaller0 entered promiscuous mode [ 465.853219][T28269] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.860977][T28269] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.868529][T28269] device bridge_slave_0 entered promiscuous mode [ 465.963084][T28269] bridge0: port 2(bridge_slave_1) entered blocking state [ 465.970457][T28269] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.978372][T28269] device bridge_slave_1 entered promiscuous mode [ 466.288792][T28269] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.295936][T28269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.303442][T28269] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.310498][T28269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.414723][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 466.424349][T21016] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.432034][T21016] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.457558][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 466.469681][T21016] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.476909][T21016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 466.492252][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 466.500961][T21016] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.508034][T21016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 466.576338][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 466.584940][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 466.608466][T28269] device veth0_vlan entered promiscuous mode [ 466.616039][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 466.625512][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 466.634217][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 466.642791][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 466.665052][T28269] device veth1_macvtap entered promiscuous mode [ 466.672606][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 466.680408][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 466.688352][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 466.697048][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 466.706326][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 466.737464][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 466.747898][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 466.762791][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 466.777558][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 467.256427][T28324] device lo left promiscuous mode [ 467.769412][T28321] IPv6: ADDRCONF(NETDEV_CHANGE): syz_tun: link becomes ready [ 468.049954][ T647] device ip6gretap0 left promiscuous mode [ 468.055737][ T647] : port 1(ip6gretap0) entered disabled state [ 468.093233][T28482] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.100601][T28482] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.108380][T28482] device bridge_slave_0 entered promiscuous mode [ 468.118160][T28482] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.125305][T28482] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.133067][T28482] device bridge_slave_1 entered promiscuous mode [ 468.157966][T28493] device syzkaller0 entered promiscuous mode [ 468.230864][T28482] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.237962][T28482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.245386][T28482] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.252537][T28482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.276382][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 468.291218][T21016] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.332669][T21016] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.379434][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 468.403146][T21016] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.410367][T21016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.504113][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 468.548688][T21016] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.555816][T21016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.579207][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 468.621206][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 468.648316][T28482] device veth0_vlan entered promiscuous mode [ 468.664389][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 468.675129][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 468.685109][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 468.693597][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 468.703411][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 468.711184][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 468.741846][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 468.760858][T21016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 468.771357][T28482] device veth1_macvtap entered promiscuous mode [ 468.781858][ T647] bridge0: port 4(gretap0) entered disabled state [ 468.794725][ T647] device gretap0 left promiscuous mode [ 468.800858][ T647] bridge0: port 4(gretap0) entered disabled state [ 468.825195][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 468.834623][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 468.843751][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 468.852489][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 468.861959][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 469.014008][ T647] device syz_tun left promiscuous mode [ 469.021682][ T647] : port 2(syz_tun) entered disabled state [ 469.033445][ T647] device veth0_to_bridge left promiscuous mode [ 469.040423][ T647] bridge0: port 3(veth0_to_bridge) entered disabled state [ 469.048136][ T647] device bridge_slave_1 left promiscuous mode [ 469.054794][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.063059][ T647] device bridge_slave_0 left promiscuous mode [ 469.069355][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.078042][ T647] device veth0_vlan left promiscuous mode [ 470.019354][T28599] syz.2.8300[28599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.019416][T28599] syz.2.8300[28599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.231364][T28622] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.328303][T28624] device syzkaller0 entered promiscuous mode [ 470.334630][T28624] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 470.400297][T28646] 6±ÿ: renamed from team_slave_1 [ 471.040464][ T647] bridge0: port 3(veth0_vlan) entered disabled state [ 471.047600][ T647] device bridge_slave_1 left promiscuous mode [ 471.053845][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.061808][ T647] device bridge_slave_0 left promiscuous mode [ 471.067980][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.076307][ T647] device veth1_macvtap left promiscuous mode [ 472.311584][T28789] device wg2 entered promiscuous mode [ 473.086223][T28856] device sit0 entered promiscuous mode [ 473.306639][T28859] device syzkaller0 entered promiscuous mode [ 474.580643][T28968] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.587942][T28968] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.650489][T29017] device syzkaller0 entered promiscuous mode [ 475.813860][T29025] device syzkaller0 entered promiscuous mode [ 476.568702][T29071] syz.0.8439[29071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.568761][T29071] syz.0.8439[29071] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 476.601742][T29073] device vlan0 entered promiscuous mode [ 476.745463][T29071] device syzkaller0 entered promiscuous mode [ 476.781222][T29071] syzkaller0: create flow: hash 3816466021 index 2 [ 476.810915][T29085] device syzkaller0 entered promiscuous mode [ 476.836215][ T682] syzkaller0: tun_net_xmit 48 [ 477.699013][T29072] syzkaller0: delete flow: hash 3816466021 index 2 [ 480.587447][T29270] tap0: tun_chr_ioctl cmd 1074025677 [ 480.597305][T29270] tap0: linktype set to 769 [ 481.833785][T29348] device syzkaller0 entered promiscuous mode [ 483.041620][T29430] device syzkaller0 entered promiscuous mode [ 483.088559][T29444] tap0: tun_chr_ioctl cmd 1074025677 [ 483.105009][T29444] tap0: linktype set to 6 [ 483.735705][T29499] device syzkaller0 entered promiscuous mode [ 484.115404][T29542] device syzkaller0 entered promiscuous mode [ 484.298360][T29553] : port 1(ip6gretap0) entered blocking state [ 484.304849][T29553] : port 1(ip6gretap0) entered disabled state [ 484.325312][T29553] device ip6gretap0 entered promiscuous mode [ 484.346558][T29553] device ip6gretap0 left promiscuous mode [ 484.358233][T29553] : port 1(ip6gretap0) entered disabled state [ 487.413894][T29731] device syzkaller0 entered promiscuous mode [ 487.901171][T29766] : renamed from bond_slave_0 [ 488.315416][T29799] device syzkaller0 entered promiscuous mode [ 488.702105][T29825] device syzkaller0 entered promiscuous mode [ 488.744422][T29832] device syzkaller0 entered promiscuous mode [ 489.840434][T29892] device syzkaller0 entered promiscuous mode [ 489.872595][T29895] device syzkaller0 entered promiscuous mode [ 492.065133][T30038] syz.1.8731[30038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.065173][T30038] syz.1.8731[30038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.754799][T30078] device syzkaller0 entered promiscuous mode [ 492.877476][T30076] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.892392][T30076] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.900528][T30076] device bridge_slave_0 entered promiscuous mode [ 492.936088][T30076] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.943383][T30076] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.951181][T30076] device bridge_slave_1 entered promiscuous mode [ 493.349798][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 493.370108][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 493.437144][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 493.469554][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 493.508397][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.515580][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 493.569881][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 493.608733][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 493.649262][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.656503][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.735077][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 493.743309][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 493.759717][T30102] : port 1(ip6gretap0) entered blocking state [ 493.766273][T30102] : port 1(ip6gretap0) entered disabled state [ 493.780086][T30102] device ip6gretap0 entered promiscuous mode [ 493.794189][T30109] device ip6gretap0 left promiscuous mode [ 493.810591][T30109] : port 1(ip6gretap0) entered disabled state [ 493.844893][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 493.870678][T30076] device veth0_vlan entered promiscuous mode [ 493.906580][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 493.929841][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 493.983116][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 494.098719][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 494.120784][T30076] device veth1_macvtap entered promiscuous mode [ 494.130791][T30130] batadv0: tun_chr_ioctl cmd 2148553947 [ 494.168496][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 494.178490][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 494.187132][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 494.262932][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 494.280820][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 494.290036][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 494.298355][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 494.931187][ T296] device bridge_slave_1 left promiscuous mode [ 494.954167][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.993533][ T296] device bridge_slave_0 left promiscuous mode [ 495.029419][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.052318][ T296] device veth1_macvtap left promiscuous mode [ 495.072109][ T296] device veth0_vlan left promiscuous mode [ 495.373177][T30180] device syzkaller0 entered promiscuous mode [ 495.858280][T30209] -: renamed from syzkaller0 [ 495.874584][T30205] device wg2 entered promiscuous mode [ 497.159708][T30260] device veth1_macvtap left promiscuous mode [ 497.810105][T30314] device syzkaller0 entered promiscuous mode [ 498.039803][T30340] device syzkaller0 entered promiscuous mode [ 498.133403][T30346] +: renamed from team_slave_1 [ 498.373223][T30358] device syzkaller0 entered promiscuous mode [ 499.413476][T30424] device syzkaller0 entered promiscuous mode [ 500.097278][T30461] Ÿë: port 1(vlan1) entered blocking state [ 500.103444][T30461] Ÿë: port 1(vlan1) entered disabled state [ 500.109863][T30461] device vlan1 entered promiscuous mode [ 500.251462][T30469] device wg2 left promiscuous mode [ 500.900368][T30469] device syzkaller0 entered promiscuous mode [ 500.944587][T30470] device syzkaller0 left promiscuous mode [ 501.120877][T30509] ³þ: renamed from bond_slave_0 [ 501.980547][T30556] device syzkaller0 entered promiscuous mode [ 503.964785][T30691] device syzkaller0 entered promiscuous mode [ 504.920915][T30801] device syzkaller0 entered promiscuous mode [ 505.120822][T30819] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.128249][T30819] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.238846][T30823] device bridge_slave_1 left promiscuous mode [ 505.273298][T30823] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.300912][T30823] device bridge_slave_0 left promiscuous mode [ 505.313948][T30823] bridge0: port 1(bridge_slave_0) entered disabled state [ 507.167232][T30890] +: renamed from team_slave_1 [ 507.457305][T30896] bridge0: port 2(bridge_slave_1) entered disabled state [ 507.465875][T30896] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.792383][T30942] €Â0: renamed from pim6reg1 [ 510.002664][T30972] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.014498][T30972] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.022701][T30972] device bridge_slave_0 entered promiscuous mode [ 510.062571][T30972] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.080185][T30972] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.106959][T30972] device bridge_slave_1 entered promiscuous mode [ 510.171892][T30972] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.179159][T30972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.186530][T30972] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.193628][T30972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.218592][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.260874][ T647] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.282620][ T647] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.296637][T30996] device syzkaller0 entered promiscuous mode [ 510.305563][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 510.313815][ T647] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.320964][ T647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.340138][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 510.348694][ T647] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.355765][ T647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.363399][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 510.389985][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.449611][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 510.612126][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 510.620172][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.641903][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.650132][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.665086][T30972] device veth0_vlan entered promiscuous mode [ 510.682764][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 510.692053][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 510.714257][T30972] device veth1_macvtap entered promiscuous mode [ 510.735089][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 510.749456][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.761282][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 510.798642][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 510.810154][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 511.238159][T31069] device syzkaller0 entered promiscuous mode [ 511.446177][T21016] device bridge_slave_1 left promiscuous mode [ 511.460598][T21016] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.491254][T21016] device bridge_slave_0 left promiscuous mode [ 511.502914][T21016] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.543611][T21016] device veth1_macvtap left promiscuous mode [ 511.551695][T21016] device veth0_vlan left promiscuous mode [ 512.557076][T31152] device gre0 entered promiscuous mode [ 513.615582][T31239] device syzkaller0 entered promiscuous mode [ 515.451448][T31330] : port 1(ip6gretap0) entered blocking state [ 515.468642][T31330] : port 1(ip6gretap0) entered disabled state [ 515.562408][T31330] device ip6gretap0 entered promiscuous mode [ 515.596009][T31349] device ip6gretap0 left promiscuous mode [ 515.611694][T31349] : port 1(ip6gretap0) entered disabled state [ 515.689008][T31370] ³þ: renamed from bond_slave_0 [ 516.090927][T31385] device wg2 entered promiscuous mode [ 517.478695][T31436] device sit0 entered promiscuous mode [ 518.898153][T31495] device syzkaller0 entered promiscuous mode [ 518.961837][T31495] tap0: tun_chr_ioctl cmd 1074812118 [ 519.141239][T31533] device syzkaller0 entered promiscuous mode [ 519.849198][T31588] device syzkaller0 entered promiscuous mode [ 520.156634][ T24] audit: type=1400 audit(1775554183.550:179): avc: denied { ioctl } for pid=31604 comm="syz.1.9196" path="" dev="cgroup2" ino=209 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 520.628529][T31628] device syzkaller0 entered promiscuous mode [ 520.882870][T31663] device syzkaller0 entered promiscuous mode [ 521.478571][T31679] syz.5.9221[31679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.478631][T31679] syz.5.9221[31679] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.526359][T31684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 521.939767][T31705] device syzkaller0 entered promiscuous mode [ 521.991722][T31708] device syzkaller0 entered promiscuous mode [ 522.586458][T31752] device syzkaller0 entered promiscuous mode [ 525.234335][T31867] tap0: tun_chr_ioctl cmd 1074025681 [ 525.971435][T31887] device syzkaller0 entered promiscuous mode [ 527.591291][T31950] device syzkaller0 entered promiscuous mode [ 528.476419][T32038] syz.1.9318[32038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.476474][T32038] syz.1.9318[32038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.588194][T32043] Â: renamed from pim6reg1 [ 528.716699][T32055] sock: sock_set_timeout: `syz.5.9323' (pid 32055) tries to set negative timeout [ 530.076591][T32163] device dummy0 entered promiscuous mode [ 530.578758][T32171] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 531.970123][T32258] syz.3.9381[32258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.970180][T32258] syz.3.9381[32258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.928106][T32345] device wg2 left promiscuous mode [ 534.105190][T32381] device syzkaller0 entered promiscuous mode [ 534.272743][T32417] device team_slave_1 entered promiscuous mode [ 534.287769][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 534.320477][ T647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 535.303184][T32483] device wg2 left promiscuous mode [ 535.345469][T32506] device wg2 entered promiscuous mode [ 536.531177][T32569] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.610552][T32569] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.617657][T32569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 536.634446][T32569] device bridge0 entered promiscuous mode [ 537.381261][T32594] device pim6reg1 entered promiscuous mode [ 537.579237][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 537.784963][T32626] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 539.927855][ T300] bridge0: port 3(gretap0) entered blocking state [ 539.934908][ T300] bridge0: port 3(gretap0) entered disabled state [ 539.948198][ T300] device gretap0 entered promiscuous mode [ 539.956999][ T300] bridge0: port 3(gretap0) entered blocking state [ 539.963692][ T300] bridge0: port 3(gretap0) entered forwarding state [ 540.105650][ T321] syz.0.9537[321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.105871][ T321] syz.0.9537[321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.212923][ T324] device syzkaller0 entered promiscuous mode [ 540.295907][ T326] device syzkaller0 left promiscuous mode [ 541.058261][ T382] device syzkaller0 entered promiscuous mode [ 541.535235][ T404] device syzkaller0 entered promiscuous mode [ 541.561671][ T407] erspan0: refused to change device tx_queue_len [ 541.921346][ T430] device syz_tun entered promiscuous mode [ 542.154131][ T452] device syzkaller0 entered promiscuous mode [ 542.943526][ T493] Ÿë: port 1(veth0_to_team) entered blocking state [ 542.964530][ T493] Ÿë: port 1(veth0_to_team) entered disabled state [ 542.978288][ T493] device veth0_to_team entered promiscuous mode [ 543.796253][ T580] device pim6reg1 entered promiscuous mode [ 543.881344][ T604] device syzkaller0 entered promiscuous mode [ 544.024872][ T614] device wg2 entered promiscuous mode [ 544.032770][ T614] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 544.547399][ T650] +: renamed from team_slave_1 [ 544.763967][ T663] geneve0: tun_chr_ioctl cmd 1074025677 [ 544.779049][ T663] geneve0: linktype set to 1 [ 546.626651][ T805] device syzkaller0 entered promiscuous mode [ 548.246935][ T906] tap0: tun_chr_ioctl cmd 1074025675 [ 548.255205][ T906] tap0: persist enabled [ 548.275207][ T907] tap0: tun_chr_ioctl cmd 1074025675 [ 548.288994][ T907] tap0: persist enabled [ 548.300402][ T906] tap0: tun_chr_ioctl cmd 1074025675 [ 548.305737][ T906] tap0: persist enabled [ 548.889302][ T949] device syzkaller0 entered promiscuous mode [ 549.819922][ T1003] device syzkaller0 entered promiscuous mode [ 550.043194][ T1014] device syzkaller0 entered promiscuous mode [ 551.907673][ T1100] tun0: tun_chr_ioctl cmd 1074025680 [ 551.957719][ T1101] tun0: tun_chr_ioctl cmd 1074025676 [ 551.963220][ T1101] tun0: owner set to 0 [ 551.993427][ T1100] tun0: tun_chr_ioctl cmd 1074025680 [ 552.165262][ T1116] device wg2 left promiscuous mode [ 552.196913][ T1116] device wg2 entered promiscuous mode [ 552.517741][ T1146] device syzkaller0 entered promiscuous mode [ 552.861764][ T1183] syz.0.9772[1183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.861828][ T1183] syz.0.9772[1183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 552.909981][ T1179] device syzkaller0 entered promiscuous mode [ 552.998969][ T1182] bridge0: port 3(gretap0) entered disabled state [ 553.005521][ T1182] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.038099][ T1182] device bridge0 left promiscuous mode [ 554.165502][ T1241] device syzkaller0 entered promiscuous mode [ 554.354384][ T1253] batadv0: tun_chr_ioctl cmd 1074025692 [ 554.467554][ T1274] syz.2.9802[1274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.467618][ T1274] syz.2.9802[1274] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.684715][ T1287] syz.5.9803[1287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.690939][ T1298] device syzkaller0 entered promiscuous mode [ 554.716981][ T1287] syz.5.9803[1287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.806397][ T1296] syz.5.9803[1296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 555.623282][ T1330] device syzkaller0 entered promiscuous mode [ 555.656366][ T1384] syzkaller0: tun_net_xmit 48 [ 555.678236][ T1330] syzkaller0: create flow: hash 1158154068 index 2 [ 555.710460][ T1330] syzkaller0: delete flow: hash 1158154068 index 2 [ 557.585294][ T1528] device syzkaller0 entered promiscuous mode [ 558.138526][ T1561] device syzkaller0 entered promiscuous mode [ 559.015732][ T1592] device syzkaller0 entered promiscuous mode [ 560.549746][ T1646] device wg2 left promiscuous mode [ 561.820720][ T1728] tap1: tun_chr_ioctl cmd 2147767520 [ 562.306910][ T1751] device syzkaller0 entered promiscuous mode [ 562.386917][ T1753] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.394241][ T1753] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.468358][ T1752] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.475476][ T1752] bridge0: port 2(bridge_slave_1) entered listening state [ 562.482716][ T1752] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.489760][ T1752] bridge0: port 1(bridge_slave_0) entered listening state [ 562.593817][ T1752] device bridge0 entered promiscuous mode [ 562.692105][ T1772] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.699280][ T1772] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.732561][ T1772] device bridge0 left promiscuous mode [ 564.053968][ T1830] device syzkaller0 entered promiscuous mode [ 566.105301][ T1935] device dummy0 left promiscuous mode [ 566.338840][ T1920] general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN [ 566.350684][ T1920] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037] [ 566.359384][ T1920] CPU: 0 PID: 1920 Comm: syz.3.9988 Tainted: G W syzkaller #0 [ 566.368316][ T1920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 566.378458][ T1920] RIP: 0010:bpf_overflow_handler+0x115/0x370 [ 566.384437][ T1920] Code: 00 00 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 4d 65 1a 00 4c 8b 2b 49 8d 5d 38 49 83 c5 30 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 2c 65 1a 00 4c 89 e7 48 89 de 41 [ 566.404207][ T1920] RSP: 0018:ffffc900015bef40 EFLAGS: 00010206 [ 566.410535][ T1920] RAX: 0000000000000006 RBX: 0000000000000038 RCX: 0000000000080000 [ 566.418591][ T1920] RDX: ffffc90007511000 RSI: 0000000000054b40 RDI: 0000000000054b41 [ 566.426559][ T1920] RBP: ffffc900015bf040 R08: ffff8881257a1b4b R09: 1ffff11024af4369 [ 566.434578][ T1920] R10: dffffc0000000000 R11: ffffed1024af436a R12: ffffc900015befa0 [ 566.442727][ T1920] R13: 0000000000000030 R14: 1ffff920002b7df0 R15: dffffc0000000000 [ 566.450705][ T1920] FS: 00007f1099ea66c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 566.459711][ T1920] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 566.466283][ T1920] CR2: 00002000006e6000 CR3: 000000010c133000 CR4: 00000000003506b0 [ 566.474340][ T1920] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 566.482396][ T1920] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 566.490351][ T1920] Call Trace: [ 566.493640][ T1920] ? debug_smp_processor_id+0x17/0x20 [ 566.499019][ T1920] ? perf_pending_event+0x560/0x560 [ 566.504346][ T1920] ? irq_exit_rcu+0x9/0x10 [ 566.508931][ T1920] ? __this_cpu_preempt_check+0x13/0x20 [ 566.514497][ T1920] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 566.520730][ T1920] __perf_event_overflow+0x1b3/0x340 [ 566.526006][ T1920] perf_swevent_event+0x2f7/0x530 [ 566.531034][ T1920] ___perf_sw_event+0x3aa/0x4d0 [ 566.535877][ T1920] ? sched_clock+0x3a/0x40 [ 566.540294][ T1920] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 566.546705][ T1920] ? check_preemption_disabled+0x2a/0x100 [ 566.552414][ T1920] ? down_read_trylock+0x106/0x160 [ 566.557610][ T1920] __perf_sw_event+0x134/0x270 [ 566.562364][ T1920] do_user_addr_fault+0xc76/0xc90 [ 566.567376][ T1920] ? do_kern_addr_fault+0x80/0x80 [ 566.572635][ T1920] ? __irq_exit_rcu+0x40/0x150 [ 566.577390][ T1920] exc_page_fault+0x5a/0xc0 [ 566.581884][ T1920] asm_exc_page_fault+0x1e/0x30 [ 566.586840][ T1920] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 566.593423][ T1920] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 566.613451][ T1920] RSP: 0018:ffffc900015bf568 EFLAGS: 00050206 [ 566.619583][ T1920] RAX: ffffffff823c8c01 RBX: 00002000006e5b40 RCX: 0000000000007b40 [ 566.627646][ T1920] RDX: 0000000000008000 RSI: ffff8881171404c0 RDI: 00002000006e6000 [ 566.635633][ T1920] RBP: ffffc900015bf618 R08: ffff888117147fff R09: 1ffff11022e28fff [ 566.643594][ T1920] R10: dffffc0000000000 R11: ffffed1022e29000 R12: 0000000000008000 [ 566.651583][ T1920] R13: 00007ffffffff000 R14: ffff888117140000 R15: 00000000000080ff [ 566.659557][ T1920] ? _copy_to_iter+0x1a1/0xa40 [ 566.664316][ T1920] ? _copy_to_iter+0x278/0xa40 [ 566.669086][ T1920] ? __kasan_check_read+0x11/0x20 [ 566.674118][ T1920] ? __check_object_size+0x2f4/0x3c0 [ 566.679406][ T1920] simple_copy_to_iter+0x50/0x70 [ 566.684341][ T1920] __skb_datagram_iter+0x2c2/0x700 [ 566.689442][ T1920] ? skb_copy_datagram_iter+0x150/0x150 [ 566.695263][ T1920] skb_copy_datagram_iter+0x43/0x150 [ 566.700646][ T1920] unix_stream_read_actor+0x6f/0xc0 [ 566.705835][ T1920] unix_stream_read_generic+0x987/0x1d40 [ 566.711455][ T1920] ? memcpy+0x56/0x70 [ 566.715431][ T1920] ? unix_stream_read_actor+0xc0/0xc0 [ 566.720799][ T1920] ? selinux_socket_recvmsg+0x22f/0x340 [ 566.726333][ T1920] ? selinux_socket_sendmsg+0x340/0x340 [ 566.731866][ T1920] unix_stream_recvmsg+0xd8/0x130 [ 566.736877][ T1920] ? unix_stream_sendmsg+0xbe0/0xbe0 [ 566.742147][ T1920] ? scm_destroy+0x90/0x90 [ 566.746564][ T1920] ? security_socket_recvmsg+0x87/0xb0 [ 566.752011][ T1920] ? unix_stream_sendmsg+0xbe0/0xbe0 [ 566.757281][ T1920] ____sys_recvmsg+0x2cd/0x5e0 [ 566.762047][ T1920] ? __sys_recvmsg_sock+0x50/0x50 [ 566.767238][ T1920] ? import_iovec+0x7c/0xb0 [ 566.771757][ T1920] ___sys_recvmsg+0x21a/0x5c0 [ 566.776539][ T1920] ? __sys_recvmsg+0x270/0x270 [ 566.781311][ T1920] ? irq_exit_rcu+0x9/0x10 [ 566.785844][ T1920] ? __fdget+0x1a1/0x230 [ 566.790180][ T1920] __x64_sys_recvmsg+0x1f6/0x2c0 [ 566.795108][ T1920] ? kvm_sched_clock_read+0x18/0x40 [ 566.800292][ T1920] ? ___sys_recvmsg+0x5c0/0x5c0 [ 566.805219][ T1920] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 566.811274][ T1920] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 566.817068][ T1920] do_syscall_64+0x31/0x40 [ 566.821630][ T1920] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 566.827694][ T1920] RIP: 0033:0x7f109b44b819 [ 566.832106][ T1920] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 566.852024][ T1920] RSP: 002b:00007f1099ea6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 566.860452][ T1920] RAX: ffffffffffffffda RBX: 00007f109b6c4fa0 RCX: 00007f109b44b819 [ 566.868412][ T1920] RDX: 0000000040000100 RSI: 0000200000001140 RDI: 0000000000000006 [ 566.876556][ T1920] RBP: 00007f109b4e1c91 R08: 0000000000000000 R09: 0000000000000000 [ 566.884692][ T1920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 566.892663][ T1920] R13: 00007f109b6c5038 R14: 00007f109b6c4fa0 R15: 00007ffc40d7ac18 [ 566.900650][ T1920] Modules linked in: [ 566.906186][ T1920] ---[ end trace 368cfb38f5fec4c1 ]--- [ 566.911787][ T1920] RIP: 0010:bpf_overflow_handler+0x115/0x370 [ 566.917907][ T1920] Code: 00 00 48 89 d8 48 c1 e8 03 42 80 3c 38 00 74 08 48 89 df e8 4d 65 1a 00 4c 8b 2b 49 8d 5d 38 49 83 c5 30 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 2c 65 1a 00 4c 89 e7 48 89 de 41 [ 566.937725][ T1920] RSP: 0018:ffffc900015bef40 EFLAGS: 00010206 [ 566.944018][ T1920] RAX: 0000000000000006 RBX: 0000000000000038 RCX: 0000000000080000 [ 566.952100][ T1920] RDX: ffffc90007511000 RSI: 0000000000054b40 RDI: 0000000000054b41 [ 566.953863][ T24] audit: type=1400 audit(1775554230.350:180): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 566.960314][ T1920] RBP: ffffc900015bf040 R08: ffff8881257a1b4b R09: 1ffff11024af4369 [ 566.990458][ T1920] R10: dffffc0000000000 R11: ffffed1024af436a R12: ffffc900015befa0 [ 566.998522][ T1920] R13: 0000000000000030 R14: 1ffff920002b7df0 R15: dffffc0000000000 [ 567.006748][ T1920] FS: 00007f1099ea66c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 567.020261][ T24] audit: type=1400 audit(1775554230.350:181): avc: denied { search } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.020278][ T24] audit: type=1400 audit(1775554230.350:182): avc: denied { write } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.020293][ T24] audit: type=1400 audit(1775554230.350:183): avc: denied { add_name } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 567.020308][ T24] audit: type=1400 audit(1775554230.350:184): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 567.020322][ T24] audit: type=1400 audit(1775554230.350:185): avc: denied { append open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 567.020337][ T24] audit: type=1400 audit(1775554230.350:186): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 567.158944][ T1920] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 567.165911][ T1920] CR2: 00002000006e6000 CR3: 000000010c133000 CR4: 00000000003506b0 [ 567.175709][ T1920] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 567.183847][ T1920] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 567.192167][ T1920] Kernel panic - not syncing: Fatal exception [ 567.198872][ T1920] Kernel Offset: disabled [ 567.203332][ T1920] Rebooting in 86400 seconds..