last executing test programs: 4.038221792s ago: executing program 3 (id=7281): unlink(&(0x7f0000000280)='.\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x7, 0x8, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd3}, [@exit, @exit, @ldst={0x0, 0x0, 0x2, 0x8, 0x3, 0xffffffffffffffc0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x4c622eb7ac828181, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x420}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x3) sendmsg$sock(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2676422434073920859bc60f0baba32fc8d6d440a7d002a42be617b35c2bd341d1ccee7b867f4c7d2727afc21e78d145ca5199cedb62aedd597f63655c558439fa913fbba1f3a5652436cba3d4a498458a3641630a87baec3b84", 0x5a}], 0x1, &(0x7f0000000140)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x1ce}}, @txtime={{0x18, 0x1, 0x3d, 0xac7}}, @timestamping={{0x14, 0x1, 0x25, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x90}, 0x20004040) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000003c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x2, 0x0, 0x2, {0xa, 0x4e23, 0x0, @remote, 0x5e6}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="435b347cb931ea5bf9d5b74f940825f3ac33b756579a5bd37db0308a17254a6fc6e4e1e93b9d10237b74164501915e9e14a29d9e1fe7e47b7336d82ef3438cc994d09d7eea674e6f672a65a1438748384bb2805bd751ec10d9218f18039e8188e0a2bf451b7a2b4bb8a6ea74f19fadcca25e4e90b2a696b6ab85f2902fe3608e3cf24b43943a6a338bb8090dfd41dca38f98e63f9147b89044a80c7f83e67e9532524ed2bfb3adeca7068e21cd5d0878d124a4763bc54afba20972758d514bbcdd947a6dde3787aa4b0e64d7e849ad4bd2c153a008e01620cb81afe717482631888cdca2bba9a04418c0b042ff7daf2e1edec9cd10f5", 0xf6}, {&(0x7f0000000540)="fc0af26534f3c8fa3d41cdf41f029917bc067f4bc07b2179852c032fafa1eeb4489e1d0e0afabd302443002e48198eae1bee374a31c73c69f7c65892d470f138ec227b55160fe2317f7c157c29bb427353cb0ceb2431300e76fb68492ff9de308e5ee9825635ebe399011095111ae2dab8a777afc36a789b05d05e9b949a240be695ed5c359865eee171320a2cfad210d1fb35b563eb9aaec18d1253a0e50e62", 0xa0}], 0x2, &(0x7f0000000600)=[{0xa0, 0x118, 0x7f, "d21574fbfa0965ca135a79fe95de2c7f31715727efa8bfb7562ba407db971acf349c9ab1312e45f02101cb4610b2db20f0d544a63af3d167380e45711a17b7f15fa93a73cf7729c8618aa9b67c24649c5d75b110ca1dec80f0a6d8d6a84f1355add89f5f893ef8a3f9a8f6b8f62a27f682341fa39dab0db02090f33794635d8c303bc9e71160f6b29ef419"}], 0xa0}, 0x24008015) 2.829450005s ago: executing program 1 (id=7294): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230041) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b6000000000000006111000000000000731a0eff000000009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x23}, 0x22) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x1a, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000004000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000210000000000b70261c7ba3f1575000014000000b7030000000000000000556f010000040000950000e4ffffffff172a0000", @ANYRES32=0x1, @ANYBLOB="000000000100008018320000090000000000000000000000186b000008000000000000000700000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f00000007c0)='GPL\x00', 0x9, 0xd8, &(0x7f0000000800)=""/216, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000940)={0x3, 0x8, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000980)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000a40)=[{0x3, 0x4, 0x9, 0x9}, {0x4, 0x2, 0x0, 0x5}, {0x3, 0x3, 0x5, 0x7}, {0x1, 0x3, 0x2, 0x5}, {0x0, 0x2, 0xe, 0x5}], 0x10, 0x8}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000c40)={@cgroup, 0x33, 0x1, 0xfff, &(0x7f00000009c0)=[0x0], 0x1, 0x0, &(0x7f0000000b80)=[0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0], &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000cc0)=@raw=[@ldst={0x3, 0x0, 0x1, 0x7, 0x3, 0x40, 0x10}], &(0x7f0000000d00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000d40)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000d80)={0x0, 0x9, 0xe, 0x7}, 0x10, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000dc0)=[0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000e00)=[{0x0, 0x2, 0x2}, {0x2, 0x5, 0xa, 0x4}, {0x3, 0x5, 0x7, 0x2}, {0x1, 0x2, 0x7, 0x3}, {0x0, 0x2, 0xa, 0x7}], 0x10, 0x5ccd5733}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c80)={@fallback=r1, r3, 0x0, 0x4, 0x0, @void, @value=r5, @void, @void, r4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000", @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000040000000400000009"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x48) r8 = syz_clone(0x0, &(0x7f0000001f40)="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", 0x1000, &(0x7f0000000580), &(0x7f0000000600), &(0x7f0000000640)="5a12177b84022d99d8868e60b87ce97102be911bd8959f97bbd5636364f3c6ded6bfb4c5a3e86543229f9ba47d31125ce4d57f696c3df6a35f119093e4025a4110cb4cfb2248a23f2f124bdf642b75de1abc3b") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) write$cgroup_subtree(r10, &(0x7f0000000000), 0x15) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x3, 0x3, 0xf, 0x14, 0x0, 0xf0, 0x28000, 0x14, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000004c0), 0x8}, 0x40c, 0x7f2c9649, 0xe40, 0x2, 0xfffffffffffffffd, 0x400, 0x6, 0x0, 0x101, 0x0, 0x5}, r8, 0x0, r10, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x7, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000218100000", @ANYRES32=r6, @ANYBLOB="000000000000000018100000", @ANYRES32=r7, @ANYBLOB="000000000000000095"], &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000480)={&(0x7f0000000140)="579f205698f84ae3c90b742a3932a7bd05f4bdcb181f1f9427b469859486b28b377815d505cf4ae574bbe01a002d7e4c7dbeeb918d4d50eb45f9eb3e478da6c5baffc283f8a4bfe33ba36a11", &(0x7f0000000300)=""/210, &(0x7f0000000000)="47edfc1c04ce6b247f53c6bc7d924fc1ced9faf42feaba67361788c8c2e9342799f2c0c0ccc20a19ffbee8afcf970fa9501d0b3ba9369344cda3250a", &(0x7f0000000400)="e859413d27f1f6e26c9b1ebd0e70ca91bcfd5e2ff89f9e209b02b5151abd8c758ae8ccec4e58a8c59d43b909115e4d57886047fa1373e82f4bcbd66f985144b3f7", 0x1, r7, 0x4}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r11, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230040) close(r0) 2.827988675s ago: executing program 1 (id=7296): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffcdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) close(r2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r4 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000700000000000000000000001801000020646c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0xc}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000840)={r7}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9}, &(0x7f0000000080), &(0x7f0000000200)=r10}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r10, 0x1}, 0xc) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r8, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r12 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r11, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001300)={r12, r8, 0x4, r8}, 0x10) 2.763743192s ago: executing program 1 (id=7301): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6143, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x80000001, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000b000000000000611000000000000062000200000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x5}, 0x80) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x6, 0x80, 0x0, 0x0, 0x40, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='net_prio.prioidx\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000600)=0xd, 0x18) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000002000000850000000800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x66) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12c4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x40, 0xfd, 0x20, 0x80, 0x7602, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1886e5ad6ab3e97, 0x0, 0x0, 0x3, 0x0, 0x40004, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000ffffffd4123300000000009500000000000000554b8b955e7a1748b529a72befafa3a996f854539ebc1e97df1d6a912a2c7bd03fb87b1a8613493ca111f9d7ab1e54dd7802a1c5cd187516f81a40f6a065f4a9c112426ce8e56170e37543bf9450fc8315ef180556c07170c2a7ce1745d85c74db850deb31b6c863e31a2460"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0xca58c30f81b6079f}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000280)={'veth1_to_bridge\x00', 0x400}) write$cgroup_int(r5, &(0x7f00000000c0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 2.352743342s ago: executing program 4 (id=7305): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0xfeffff, 0x0, 0x0, 0x0, 0x0, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e36fd8270ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cd0aa7b73340cc2160a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea09c346dfebd31a08b32808b80200000000009dd27080e71113610e10d859e8327ef03fb6c86adac12233f9a1fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563112f4b391aafe2348754000000000000007642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc5a788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ff010000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a30280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f5874c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a013709003f509e6e540c9ba9c2a589ac5d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d54aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa0500e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5f7d895de17a10b0a0ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5175d879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2e5a00d2f953a86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c56d0886eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366a9660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef310e10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e15a00adb976064a93e8d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeadc5cf218a6eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041814f60fbbcafa487ee96b368e8769da90b44190e569fe8b1d155d0765baaca5c5548b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xfe, 0x30, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a81bff88f7ffff4000630677fbac14142c88a8a0a688a89f4b4d2f87e56dca6aab84fe13f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x43, 0xffffffffffffff11, &(0x7f0000000000), &(0x7f0000000540)="9c18a537674b5d9e9185cd0add6d6d4c9e63ece1b58d7b42c6c27a5f1671fdf94432fc1baaef86573fc9fbb426f9284a6bd47174eb6fb9f893c18421d26d649d633a0f459969df8d3284737c5586cd696884192ce10db91e21fd978337408b7bd1cbb6789b51d63c8e68dab5da01c8e19d572950cfe2142e244990624270eaa2a2ded01d820cec011a6b05192b91cd193b1995bc296c249e1ef1570000000000000f75eec7040de10b5d8c536e5b5ce39ab84e658eb8f02fe112a5136cd3ac5c06848a40ec335a", 0x0, 0x0, 0x800006}, 0x3b) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x28a000, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000380)=""/220) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000070ab89", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x2000, 0x0) ioctl$TUNGETIFF(r5, 0x800454d2, &(0x7f0000000680)={'pim6reg0\x00'}) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000300)=r0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{}, {0x28, 0x0, 0x0, 0x200000}, {0xb1, 0x0, 0x0, 0x1ff}, {0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xf, &(0x7f0000000480)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b70300002b40a3dc5ae3c433b079bb00000088000000bc090000009500000000000000bf9800000000000056090000000000008500000005000000b7000000000000009500000000000000000000000000000000a00000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.303047062s ago: executing program 2 (id=7306): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002300)={0xffffffffffffffff, 0x18000000000002a0, 0x1c, 0x0, &(0x7f0000000180)="b9ff0300600d698cff9e14f065584de7f9c7643600000001000088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x11, 0xa, 0x300, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xffbf) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.246389591s ago: executing program 4 (id=7307): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xff, 0x1}, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/132, 0x1a, 0x84, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000f0ffffff0000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.186425409s ago: executing program 3 (id=7309): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101c01, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRES16=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETDEBUG(r4, 0x400454c9, &(0x7f0000000380)) close(r2) write$cgroup_devices(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40), 0x12) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xe, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000010000007912"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed009875f37538e486dd0000000003"], 0xfe1b) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4d) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) close(r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xc, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x57}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.47824317s ago: executing program 0 (id=7313): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x590ca, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6307ce22667f2f00db5b686158bbcfe8875a65969ff57b00000000000000000000000000ac1414aa35f086dd"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x1e, 0xf, &(0x7f00000007c0)=@ringbuf={{0x18, 0x7}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x19}}, {}, [], {{}, {0x5}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.450820375s ago: executing program 0 (id=7314): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="f24edc600068a4cc3004d87c24f9fc9090c2d62b7b4f0875e7bace319744a44275ac4795866b8a3e839a6fe5d822efca52d3c8a51e28cec80ce0b02bda8e501c17837ce1c8"], 0x5) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2b, 'pids'}]}, 0xb) 1.356653736s ago: executing program 0 (id=7315): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/pid\x00') (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x40) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004dc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r5], 0xf8}, 0x51582b7d7fa95902) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003780)={&(0x7f0000000f80)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000003680)=[{&(0x7f0000000300)="62121a641a3a48a43d557bb7dac79521d66141949486", 0x16}, {&(0x7f0000001000)="37c3b39fbb1b40a7e4e3664197ce01877a390b46e06c1d037e47f070434d9122f74b1fd1aad697ee088a42e9f96ee88fafd35f08c2fbc00f01ec484bd80bc8dcdc36a10d857fdfd1c687be6b460c38426372cf461d2e2c414a668edac63efb3aa5dd756a4041f9f9ad9b464e9527de09f8fb2cef87f443c20cd2de18b33985acf2b17ee1cd4735839c8011f9c8250155", 0x90}, {&(0x7f00000010c0)="ca38656e1b2210bbaad33f8987bfc088a8c7e6b789020b7defbe57fec9bc1e45170ba793d3cea560677b6903a826e8bec526134c7b45aa013c25389d624e92f266fca1545316c61baf29aeafa747a2a32237b7d1a21c0a872a13", 0x5a}, {&(0x7f0000001140)="2b72ff530479f683f51d32b2f7f0c36ee86b8a1125924f004e13cca81dee6c7275a392d8ccd2689945d80fd1c98bd1bd17ea35e05f5ceac6b66d382da5bacc26c659ae3fb73fae9b5643982d2b33864a06f2319bee75cb7b90e260a0ad4328e7682fc0d4d6f390a63a7aa01a1026c49ea140ea9b86b47b55e3ebc3c7a3a60202ef4ac5c715b362dbc9a6c0a5158f6b3e9a50cb6b28ea95a42099c1b31a361ee90434be3c4e8ded39fcd0233c48212f13d5fc72cc7a2ca4626aeab170184fd590a229e1145acd11db920967b0c2a130761d568fd047237fde8d6592807b96af42aba7db0ffc98", 0xe6}, {&(0x7f0000001240)="6d2c297ce2b6ebf3bf64e05eef86a9e081ecce70a25829e0e0f45eec3db7d9388bd10cb371bf8afdc58e7e1e5253cb4728b0d10e3b4013c927622967381f70d5504f66e7b09b403878f1459257040a29e383b681fc99c058e1aca3ac54ffd7c18f3b0de0ff7aaef82ab11463cea2c1b6ba5d", 0x72}, {&(0x7f0000003480)="71dcc5beccf831104b2dbd2577e76f4dd45faa1cce7bef169a748aa0bc38e912ad3ed7ad87ca07a4b8fa9cd45b061435c8f94e0e1b6f9eada16a660b8fb914fd1f1a11f9588d66e8f9969069e499bfe313fb20a64144bb2d5eb4c1bb3c6a4881649286a4428ffba76deec9f9c477af14897a6e1893225553c7bf76d857fcd8a1aa28714a4517c48be58cb16c7d46b90143a1f32988a857321c0a268366f44e7e372ced4e8a9d45cc0aa8ba9b2bbf0df92a18ea6988bb44a4c7bae5b67b8f63b23b7ba942dc9926b1262170a8902b3b11", 0xd0}, {&(0x7f0000003580)="87ed883cb4b3641ad68c749f8413ead22bdfeee6e6aa1ad14493ad6431a3e162fc04e35a7ef61ce149b94f3442e6a620f77eb58d595197dee96d55c33a3e594850cff18b80109a408ace94d5dcc04a033df59a4d57afe04d997286c4bbcfc4290d8ee627f26a6e68d40101c1e15b8f52fc4ed3af4c49f8adfe39bbec9b48260c4294470332648a79f10992dde7ca7c2ae07a18374bd4982e62d64c900c1f06d37140c94476fc51da8dc0681eb21779c533e0a9d5b82f9065367e6d8c43df44793cb56e02592f0625721f987cd8eb48d6b265d735446b19da4abfaf167e910d28601a05c9ea2f74936c0c440ee28acd41cb7ee289567f59c34c673e30", 0xfc}, {&(0x7f0000002340)="d1381324bda590b48603280cc2ea538f0ed797ea21aa5a25d147000856567006aa370b3ddd6c908a9bbd12034fbd5b84c2565bf02112572fa7b3566dc1f3cce46baf769c08e12598c08eba7b90044e0880aa79372aaaf0e5", 0x58}], 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="6a0050b9896c0000"], 0x58, 0x40800}, 0x4000004) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0xba98575a95aeb70d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=0x0, @ANYRES32=r7, @ANYBLOB="1100"/12, @ANYRES32, @ANYBLOB="07d73b3e59b9181ee72a809ec70fdafa3781b8fde3a38ae5a33e619b7b405b050928a3ca75ff532078adb14900d54485d89b7cfd128daf84b12025504202e23c9fa58630b8076f54d5d677841ca97c77fc4ae680f265a24394e8f4d72b9ec439f1c5a08160a1e8886b8af6579f131e0368758a36b6573e05e05a94b83b32c39775fc424d8b7e86772044f102c6ff7904f08b239bb925ea9f1aa18f89848df554dece0ad49078e09636a299911fbb8328eb000000008c0203938008128c75ffbd0180917aa5a743f418cf4996afe86092c8841461a25e5db7507408c60aa90aa4f9", @ANYRES64=0x0], 0xa) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[], 0x10) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYRESOCT=0x0, @ANYBLOB="a4c463cd9c51e3557133", @ANYRES8=r8, @ANYRESDEC=0x0, @ANYRES16=r1, @ANYRESDEC, @ANYRES32=r9, @ANYRES16=r4], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f00000039c0)=ANY=[@ANYBLOB="2de63b28f9746b4dbb2616abd387423ad0f797dcba6ac1497c34f61b995ef92fcf4c8a9636ab94b136536274e5719b3495842e3cefad9d556d305cba7b7fdd79baa476777c7afe0d6f75b7f86198e0be249e59fd9340ee0400000000000000cce0dad087f6698704791800f2ffffff00000000000000", @ANYRESOCT=0x0, @ANYRES64=r12, @ANYRES16=r11, @ANYRES16=r2, @ANYRES64, @ANYRES16=r5, @ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x94) (async) r14 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r13) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r15 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (async) r16 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r16) (async) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000280)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x80, &(0x7f0000000740)=[{&(0x7f00000004c0)="8d46997a81465e7cf87ee8f3217afb3d18840a090b19a5dfef78f80af28e7c614e8977e722b4ad3bf9ac38addb1cb27af0bd9021f12f99a038429702c5c3a2a6e60a6f76e15ae19b87e8e3075ce2ed561b526316f8724ede1656d734954995d01f42ad771d76d9fa11b4d3d03b01686900e57edc7df9087a95a2917aee357b88b3714b42ebff5a99f84bc921f4740156bf7a0ec354feda5d1446ad1717355d8ce12e7dc43d6a3215d388a1abff0c378b389c77efa68c5389486f6fe188967360a486f331f91d3418b5f1dfb915fe85b278f7b8f8e792cdf37035f5cdc9debe60bd997834", 0xe4}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000000680)="6ba9194d2da3d4322ffc2fac445cfd5b046e922fec1f746ce19f57a53c2f6ad1f647ebddf0754117070b7ca64c3675f1369de13ab6f1da9ae7f0bab18ee9bbacefe8d1bed11d571f29566a23f4066067e46b6636460d561315040510c652f7096302a742982de057e8293847edf99126573ab64b7b55e9265edecfecd3866cf1e5a2becd28f3b44497da3cdd337a646e8cce3be555deac2c360c43c533bf8899dd", 0xa1}, {&(0x7f0000002480)="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", 0x1000}, {&(0x7f00000003c0)="f38b3a9283cb64c1041b79404dc7cb5ed8eb48fd1c3b8d886c065d45d6aa56404730c4fcdc2abf22c4b79656c32de5910fc3370de7201aadf01243746809456ca38a803d595390700e597bea2b62afe7b2058de214", 0x55}], 0x5, &(0x7f0000003a80)=ANY=[@ANYBLOB="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"], 0x3c8}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000dc0)={r15, 0x0, 0x26, 0x9c, &(0x7f0000000080)="3cda71d5a720021d896b4d93f5a0707a3cbb6696f9eaedc0d1abf5dbe92ba15b22e9c4213628", &(0x7f0000000bc0)=""/156, 0x8, 0x0, 0xab, 0x77, &(0x7f0000000c80)="dbb9b851ba900ee86751a29f663aa2fba0ded9e2d0197d9a1ab594a5c59ac9a7767711850520c16bc4d1d3419d17d130ab4074957df8482b631d89f94bc3e1d23168e80b8939f847cb0a41b0c830aa7585b599425689df8cbdb0f753f75265f43a1f85ad397dddeba3d96d0ccfaeb0e5cf0d05ea755e7d5bed93a213b1cd56df35bbd50f233c0c298675ccebd414215259910e390a9aa8c7d185511c404df73c01fdb579fc381bf2f044c9", &(0x7f0000000d40)="323376eaf7c34137e5b8b620827e7985a07a19d536f7b3cd01dde656e9a25aaf69b452d5d5f041ba90f38edf12797f08190b181d5aad72e4a97154f622e612bf3b2554f709e7e02ea92319d01a6d7cbc3f0ae9132632797614abc630ea6f19f57824f3011c286f9860b770f4fa9f70c0da227adce44321", 0x0, 0x0, 0x400}, 0x50) (async) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 1.356255756s ago: executing program 4 (id=7316): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000001400)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x2, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x0, 0x5f, 0x0, 0x0, 0x2e]}}, &(0x7f0000001300)=""/181, 0x2b, 0xb5, 0x1}, 0x28) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, 0x0, &(0x7f0000000180)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 1.311247818s ago: executing program 1 (id=7317): r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x9, 0x3, 0x9, 0x9, 0x0, 0x1000, 0x10000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x7, 0x57b8af0f}, 0x0, 0x3, 0x2, 0x7, 0x10, 0x4, 0x4b, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000380)="b9ff03086844268cb89e0ef086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) close(r1) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r3) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x1, 0xe7030000}, {0x16, 0x0, 0x0, 0x6}}, [@printk={@p, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x1, 0x6, 0x0, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000180)={0xc8000000}, 0x8) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r8, 0x0, 0xfffffe33) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110cd00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) r9 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r7, 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1200000004000000040000000c"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000b60100007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000013da0000850000000600000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000001c0)='GPL\x00', 0x6a4f, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r11, r10}, 0xc) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000001300)={r9, r5, 0x4, r5}, 0x10) getpid() 1.301587716s ago: executing program 2 (id=7318): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={r2, r0, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x5, 0x9, 0xe7, 0x6, 0x0, 0x9, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp, 0x2800, 0x10001, 0x5, 0x4, 0x40, 0x1, 0x8, 0x0, 0x10001, 0x0, 0xfffffffffffffff7}, r2, 0x7, 0xffffffffffffffff, 0x3) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x414, 0x2000000, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0004000071106b00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r8, 0xb4, &(0x7f0000000540)}, 0x10) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext, 0x102002, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4e320900, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}, {&(0x7f00000006c0)="97b13f5cf9", 0x5}], 0x3}, 0x0) sendmsg$tipc(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="16cd45d4735594ac0902589d13ca11c3a7db9bb552def449450a0ecb421a7dffff1d911abd5f5906a485530511ab9501223e64c8af1c6a4658e06bc9002bcfcbbc1c88d1", 0x44}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000480)}, 0x20000011) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1a9) bpf$PROG_LOAD(0x5, 0x0, 0x0) 981.140553ms ago: executing program 3 (id=7319): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='/proc/1/\x00\x82q\xee\xe5\xa0\xbd\xc2\x98#YP\xee\x9c2G\xf0\x81x\x97'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x1ff) 980.460912ms ago: executing program 3 (id=7320): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}, 0x4204, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1e00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="e6000000000000000000000026"], 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xc, 0x4, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb}, [@generic={0x73, 0x1, 0x1, 0x9f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0xfffffffffffffde1, 0x10, &(0x7f0000002e00), &(0x7f0000000300), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002a0000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 975.827622ms ago: executing program 2 (id=7321): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)=ANY=[@ANYRES16=r0], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000340)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002200000085000000050000009500000000000000f65401fd00a4bf7d933ca5ec7695300074067c0d29d2e80b4a0bbee4d71fd158"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f4305", 0x0, 0x6f12, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES8, @ANYBLOB="00000000d3ec66ecc053c543"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x58, &(0x7f00000000c0)}, 0x10) 975.406001ms ago: executing program 1 (id=7322): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x28, 0x2, 0x28, &(0x7f0000000040)) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x6, r4, 0x3ece8abe10feb3cb}, 0x38) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000380)={'veth1_to_team\x00'}) 953.190157ms ago: executing program 4 (id=7323): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4810}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xd000, 0x0, 0xfffffffa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0xa100, 0xc8, 0x1000003, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63f580fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x16, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffa0}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x5e) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x10001) close(0xffffffffffffffff) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="80fd"], 0xa) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000040)) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000f75ffffff0e000000000000000300000007000000030000ca75ffffff00000000000000002e"], 0x0, 0x46}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32, @ANYBLOB="00000000000000006100640000000000180000000000000000000000000000009500000000000000950000000000000038604b707eceebb696df769900"/70], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x5}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x8}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x1e, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3ff}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @ringbuf_query], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x5, 0x1000, &(0x7f0000000e00)=""/4096, 0x40f00, 0x14, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x0, 0x8, 0xfffff000}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0x1], &(0x7f0000000440)=[{0x3, 0x3, 0x4, 0x5}], 0x10, 0xfc1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020fe29817a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000400704000000000000b7040000100000206a0700fe000000008500000005000000b70000000a00000095000000000000000000c2c62f6004ad13aa957e2af5e49a53c2868f0399d909a63796c113a80c19aab9d607000000b6c9483be3f0d3253730e714c46cc4f79fd2b316da4f0de8163f6242fa7323f1740637c48468766af540439fce41f144631ac262dcae18c3d1a1fbe96dc86035b44174f7c0620254ab6d285e6b343185089a0f119e31975e551558050800000000000000125d67857f290870093f38153608561a2128a79cce912d1f05de330800a9f5422bee8ca49166f6a587f2f593775afcd071efc5a972f757521b7b38ec273c2ad3e406f8c124f7dc1c4553229a69df4b2780e6da4420d71489fe383e0b5ce08b750502f2b8add8d2dddde19ac050537e973782b4053150580035fb2c579e1b2100000033d1ee8cab6d236f05b1f7b9f78fd5abfe033eb79f7a0b498366f5edfe311258016fbf47d9c85bf5325bf61419372be377022433e20900a262b20bb8b36de7b0e6c5ebfc5baec1ebe58d4af587d33e2935ad68da6e0fea5c21301f5d002b51a5b60fc741cb2c5d4cd5e896774f9293a6435558795043404ac6eafc8310fbcacca7f971b260fd06d4590ded8429fcd1c9a8dbbdedb32675388df363c0bc536e00448208b72405ebf27ddb402e5a2d675aaad92e183cef1eadc1661140fb567b55c72907a1aca75277a5f0022b1e957ba737f10f1161c5ae6e2cc64072ff3b4e76084922242e63d4b7806e30f786cff147e4bc819060678319a0e5534f5a0db52526c30000000000000000000000a63705b1a60525620acca06d57c055059df7651768310c9085c5f86be6ab819506961ad51f18b35fdc3fd4d0a0dbbdcd494ef168931f27748787bee95d739fef7ee67dd21c34647de82707e41d7db6d981a4fcf0bbd3d38ebb7a2489e28c6b28c0f70092ffb016b7766399555f3e6b538c2c862d17e53eaeb2036f9f0ab6e95e71bda4b5bbf53344264ad93bac1207b31d6e9c78181c7fe204c0b7582d1c762857f2a2e0c60f4a4855591a4f70f94df9629e470701103c40c8f6d3a3068091d62b58999e0a046f9509cb8ddc2a9ad4e0f1f85e5f076218b4b931acdff0c34fc5bdbad17ec481f1c9b17727c14e053e315d0d8d03c24ddaba65c5ce5b1aa04d1f767e25662b155d49460ec720d54044ac2856c11407835f341e2614bcae270000000001000000df7f736aab5d713240b2f40ec7be8251eba969686b2670ddc1a84df6ab12ab3e0cf8747837062233935704ebbd943ef0c5fef29513c7c1d6d2611796dccb45bdfd9e6533ad3574be5b9ea70e0c3b41a32067c03f5f8ed147cd0655c90d656f66eaed18a3c284c4f19417b5d91431759356db5d45ea40c9866957105b6252b0c028c672049ce163126f143f5758faf2a43f4c4f45a69b4e9113f85ae531085c11c75edbdee5af454757cdaff396c15ab9b210c202ffaea96d1bac60c6d6c56a4babc659858789bd479334e13e1c7876f95429431e61400815788c1397b260600d78e7513c58d9ac9474d392cc06f789753e1e7ebf5f1b55e2a64b9150c6580bf48e7bff763034801cccf403108d127b959ffc425a563ea2b90fbe779fd7d2ebfe94"], &(0x7f0000000280)='GPL\x00', 0x100000, 0x0, 0x0, 0x20900, 0x0, '\x00', 0x0, @fallback=0x8, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6}, 0x94) 924.702022ms ago: executing program 3 (id=7324): perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0x90, 0x7, 0xe, 0x0, 0xfffffffffffffff2, 0x28010, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0xe}, 0x508, 0x6, 0x3d, 0x9, 0xffffffff, 0x1, 0x1, 0x0, 0x3d2af391, 0x0, 0xf}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000380)=""/68, 0x44}], 0x2, &(0x7f0000001500)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}, 0x40002020) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0xb9, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000040), &(0x7f0000000440)=""/183}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r1, &(0x7f0000000040)}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r1, &(0x7f0000000000)="bb7bce55534ca917042f975087d2f3f2", &(0x7f0000000180)=""/43}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e032800008c71ef288563"], 0xffdd) 887.295994ms ago: executing program 0 (id=7325): perf_event_open(&(0x7f0000001340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x2021, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x50) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000180)=r3) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000001c00)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r1, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 749.236167ms ago: executing program 2 (id=7326): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="aeaa000000000000711013000000000095000000000000002020e4bd8503f8ab2215f80bc72d5b764d019741c507000000920a5fea5629126f02f22fbe444467069b956e57cdd4b3434573eae5fb148b55fe50ecc9bb6eecf85aab6369a66c"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x9001}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0xa, 0x42, 0x40, 0xc2, 0x1}, 0x50) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000f40)={0xffffffffffffffff, 0x0, 0xaa, 0x78, &(0x7f0000000d00)="e948678a318e07d3add697d73120b23c2a7540a6304aec9f1d38ade80f6070904a518b4b7c8636b353bb6e00f957d58f0908ce0862d569125311270e76ae0bcb2577dfc36f6006b49157d6962dc47219d22c59ceb4a50d83addb63566a512f7fdeff7c31ca58bf98d7b77ec4d0f72af957d84d1fb0ed31b6e80f5aa17a50cf3ce1ab38a0dfce88bb2ed31e059640b151aea58f7970d40538b3ae6f609733f8c07da548c82794a52f2c0d", &(0x7f0000000dc0)=""/120, 0x5, 0x0, 0x5, 0xbd, &(0x7f0000000e40)="cfe031c597", &(0x7f0000000e80)="eccaefe1caa07eecf5129c36aff91f190b1a99c542d4a319dc7ad87aeedf1a7a72003f6f01ca722d32f1052c4b421d5d0b96ec6b8e1ff7a57dcc8344d6a4eb7dd0d2fd53c589ce130b295d1e5bd69401b57a042074cee963d27e2112602399a53cec988bf2c3222c4f23b35e6ff09fa25d254b1c571ea18ac3d1a37470eb1e83f9b2dc078887ce04cad090a33d874e6d4e43c40c1c796792ebf16dd47cd6acd2aa3c6b8366d424d6a8b118d55bce50bd4efe261cc03ec82732007fd42d", 0x5, 0x0, 0x7ff}, 0x50) (async, rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) (rerun: 64) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r5, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r6}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000500)=[0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000580), &(0x7f0000000800), 0x8, 0x100000e2, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0x1a, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, [@alu={0x4, 0x0, 0x6, 0x0, 0x2, 0x6, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @alu={0x7, 0x0, 0x8, 0x9, 0x1, 0xffffffffffffffff, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @generic={0xce, 0x5, 0xb, 0xa5c, 0x7}, @tail_call, @map_val={0x18, 0x0, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}]}, &(0x7f00000002c0)='GPL\x00', 0x12c, 0x60, &(0x7f00000003c0)=""/96, 0x41000, 0x6c, '\x00', r8, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000009c0)={0x0, 0x7, 0x1, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000a00)=[r5, r5], &(0x7f0000000a40)=[{0x5, 0x3, 0x9, 0x4}], 0x10, 0x9}, 0x94) (async) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1d000000faffffff030000000900000000080000", @ANYRES32=r1, @ANYBLOB="0600"/20, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="050000000400000002000000000000000000000000000000000000b1ad63b368a53d21b97e97280b"], 0x50) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8946, &(0x7f0000000080)) 585.632245ms ago: executing program 0 (id=7327): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000004f000000850000000800000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000004f000000850000000800000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) (async) write$cgroup_pid(r2, &(0x7f00000001c0), 0x12) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) (async) openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) (async) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 574.788943ms ago: executing program 4 (id=7328): recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0}, 0x1f00) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={0xffffffffffffffff, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0, 0xc8, &(0x7f00000007c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x6b, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) sendmsg$inet(r0, &(0x7f0000000bc0)={&(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000100)="0213aee1bccc1fdb3f6eae87a91ba1fcb166a204b288b8d55feda7b08fc70c1566aedfc33851cc4cc82da7cfdb9355934b16e1b1b850304aa34e", 0x3a}, {&(0x7f00000003c0)="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", 0xfc}, {&(0x7f0000000140)="6c04244f2fe25ad733e03df6068a3e58aedd029e61624b0df0561018bf9d2c9ad9a8db2ef418078f92eb35ff83345c59c40770d9b04c558f46c1d67a02eeae9ff39a1e4c4a23ee27ee98eee9c886724f566f80cc50031512bfccdc912bae2e5194ffacf562e4af6fcc5961b6cd81d89028ecbba4c244528a79", 0x79}, {&(0x7f0000000540)="63c4fe78851ece389a7d94657f51a2167e45630d3ecb3caec37ceccc19c47b58da9a4a738d55a64c5a4ea4708efd34b7bd32dae1ff6e92f29f22c3655094128a90f58d3f5d648ed4088d3b09995dbd67ea6fb70dcd10f437feca913a520caeacbd0a1d7718dd59e0b1f0413972a2b440b743f4cd370f670d2fd73890", 0x7c}, {&(0x7f00000005c0)="4988855f61a2323877f8854e7e359cac40891efa56bbf162e96cd00f6bb1e9ba17b59e3af760521805b2104407d90f3250866d25d6b57ba48d95961dba184ac194ec2ae5eb21d01cd7878f108ee0120d9fa8aabe8a32482d69632cd5a7771ee3923861936e52745619276f23c1bfb8a32be2dafb8081ed9fa53bc89a91c2ec1f8c43d99f28e59cd04afcbd70ce7c", 0x8e}, {&(0x7f00000004c0)="3f281cd7d18a7535743de3b2a25f461dc922bd465764e85b445e7204e5490dcec67d405ac2a45d8d9fc1241215d1ce23", 0x30}], 0x6, &(0x7f0000000a80)=[@ip_tos_u8={{0x11}}, @ip_retopts={{0x34, 0x0, 0x7, {[@rr={0x7, 0x7, 0x9, [@empty]}, @timestamp={0x44, 0x1c, 0x9b, 0x0, 0xc, [0x631, 0xffffffc2, 0x5, 0x7ff, 0x4, 0x1ff]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xe}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @dev={0xac, 0x14, 0x14, 0x27}, @multicast2}}}, @ip_retopts={{0x38, 0x0, 0x7, {[@end, @timestamp_prespec={0x44, 0x24, 0x3a, 0x3, 0xc, [{@multicast1, 0x4}, {@local, 0xff}, {@local, 0x65}, {@multicast2, 0xff}]}]}}}, @ip_retopts={{0x74, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x44, 0xf1, 0x3, 0xd, [{@dev={0xac, 0x14, 0x14, 0x35}, 0x4}, {@rand_addr=0x64010101, 0xd}, {@empty, 0xdae}, {@empty, 0x3c}, {@broadcast, 0x101}, {@remote, 0x1}, {@multicast1, 0xc03e}, {@rand_addr=0x64010102, 0x5}]}, @generic={0x94, 0x10, "f16c76889ca54b6d34ab0210b2df"}, @timestamp_prespec={0x44, 0xc, 0xca, 0x3, 0x2, [{@local, 0x6}]}, @noop]}}}], 0x138}, 0x40000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0500000005000000fd09000085"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x1ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xa}, 0x10}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r2}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000005c0), 0x6d, r2}, 0x38) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 340.200787ms ago: executing program 2 (id=7329): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0xda, &(0x7f00000003c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x34, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x6, 0x6, &(0x7f0000000280)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}, @ldst={0x3, 0x0, 0x6, 0x0, 0x3, 0x4}]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0xd2, &(0x7f0000000080)=""/210, 0x40f00, 0x20, '\x00', r1}, 0x94) 311.368092ms ago: executing program 2 (id=7330): r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000700000000000000000000001801000020646c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000002300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xc, 0xff}, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x81, 0x1, 0x0, 0x7f, 0x0, 0x7f, 0x400, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x2, 0x53091f84}, 0x28, 0x2, 0x7, 0x3, 0x4, 0x3af1, 0x3, 0x0, 0x80000001, 0x0, 0x80000000}, r2, 0x2, r0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) close(0x3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r5, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r7 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@cgroup, 0xb, 0x0, 0x6, &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000300), 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@cgroup=r7, r8, 0x1, 0x2030, 0x0, @void, @void, @value, @void, r9}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@ifindex=r10, 0xffffffffffffffff, 0x22, 0x2008, 0x0, @value, @void, @void, @void, r9}, 0x20) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='cgroup.kill\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x1a, 0x1, &(0x7f0000000a00)=@raw=[@jmp={0x5, 0x0, 0x3, 0xa, 0x0, 0x30, 0xfffffffffffffff0}], &(0x7f0000000a40)='GPL\x00', 0x0, 0x98, &(0x7f0000000a80)=""/152, 0x40f00, 0x0, '\x00', r10, @tracing=0x18, r11, 0x8, &(0x7f0000000b80)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000bc0)={0x2, 0x9, 0x10, 0x1}, 0x10, r4, r1, 0x2, &(0x7f0000000c00), &(0x7f0000000c40)=[{0x5, 0x4, 0x2, 0x9}, {0x1, 0x3, 0x1, 0x9}], 0x10, 0x80}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)=r12}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r12, r3}, 0xc) r14 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r15 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r14}, 0x8) write$cgroup_int(r15, &(0x7f00000001c0), 0xfffffdef) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x10, &(0x7f0000000540)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r15}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000380)='GPL\x00', 0x9, 0x8b, &(0x7f0000000680)=""/139, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000880)=[r13, r14, r6, r6, r15, r13, r6], &(0x7f00000008c0)=[{0x1, 0x3, 0x0, 0x2}, {0x2, 0x3, 0x3, 0x2}, {0x2, 0x4, 0xa, 0x2}, {0x4, 0x4, 0x3, 0x7}, {0x4, 0x1, 0xc, 0x1}, {0x3, 0x1, 0x0, 0x5}, {0x1, 0x5, 0x8}], 0x10, 0x10000}, 0x94) 101.912781ms ago: executing program 4 (id=7331): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='+\x00') syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='+\x00') (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 42.855009ms ago: executing program 1 (id=7332): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="04000000040000000400050005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 42.314449ms ago: executing program 3 (id=7333): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac14141686099f034d2f870289106aab845013f2325f1a39018602038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711815000000000095"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x20, &(0x7f0000000480)={&(0x7f0000000400)=""/97, 0x61, 0x0, &(0x7f0000000580)=""/194, 0xc2}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000680)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000780)={{0x1, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)=r1}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0x1, 0xffffffffffffffff}, 0x4) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x10}, 0x18) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x68d, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x16, &(0x7f0000000040)=@raw=[@alu={0x7, 0x0, 0xc, 0x2, 0x3, 0x20}, @jmp={0x5, 0x0, 0xd, 0xa, 0x2, 0x50, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xa560}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8000}}], &(0x7f0000000100)='syzkaller\x00', 0x7fffffff, 0x56, &(0x7f0000000140)=""/86, 0x41000, 0x0, '\x00', r2, @fallback=0x3, r3, 0x8, &(0x7f0000000380)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x8, 0xfffffffd}, 0x10, r4, r1, 0x9, &(0x7f0000000900)=[0xffffffffffffffff, 0xffffffffffffffff, r5, 0x1, r6, r7, r8, r9], &(0x7f0000000940)=[{0x2, 0x5, 0x7, 0x1}, {0x0, 0x5, 0x3, 0xb}, {0x2, 0x3, 0x0, 0x5}, {0x4, 0x4, 0xe, 0xb}, {0x0, 0x2, 0x5, 0x3}, {0x0, 0x3, 0x4, 0x7}, {0x2, 0x3, 0x1, 0xa}, {0x4, 0x4, 0xa, 0x9}, {0x0, 0x1, 0xfffffffb, 0x9}], 0x10, 0x80000001}, 0x94) 0s ago: executing program 0 (id=7334): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020200008500000070000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0xe, 0x0, &(0x7f0000000a80)="b8000005000000000152912e5763", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x9b47, 0x2110, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0xff, 0x5}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x10000000}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x1, 0x4, 0x8}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000400000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x8, 0xd, &(0x7f00000011c0)=ANY=[@ANYBLOB="74367bd23f6b3aece25354eaeffda74602ee2b244f1e88fa49d3df03fe7bd108e4794ae8c229e939448213214b5336671a2a8fbecc31290119652677ee2959ea154cdce89abdaf76c652cfd0afa0bd2eebf8c3ee971c05b4e957f1eea3e05c9e6cae4cbbbb887be3ef2d93e388e1be4fde56280faeb3a529764100a2b177099584e5f38258501344853a08b6b0d12ec95919f99bdaeb2d17b35c96d5f3e0b08f62e0caca222aae7890bd5f462820b3d97ef15b82b9f76b2f44b0290ce5c6a8c0111aebcd4e71916ac20b3393a7c7eb6a44499c61de"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xd, &(0x7f0000000ec0)=ANY=[@ANYBLOB="180000000300000000000000f7ffffff181100006496d0053d71834d4bda85276d03646b928d41b37d3e3159bace08310c46dde8e0e06fcfb125a7b6b287dbd975371029a7ad4987ba87246a4ab8ece1a45891ed79f2449339478027541a0fe49340f7200cb25fff47", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000500000009500000000000000"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r4, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, &(0x7f0000000580)=[0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9b, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xea, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f00000008c0)="7a7fa22c2aff88df53ef2a2d280f", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000f80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2a, 0x2a, 0xb, [@datasec={0x1, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x0, 0xffff0000}], '<_['}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], '\x00\x00\x00'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x2e, 0x1e]}}, &(0x7f00000002c0)=""/254, 0x4f, 0xfe, 0x1, 0xffffffff}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000dc0)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="05160025817bdf2e9fac0000000000000800000000d522dc304a6225784ad58b9a7367dadd7ebb67c03a0026ab97fdf1a1cc5181a7094796dc06b645c79d8ef74cd720b869d39be4593d50f2bfe0221bfb39eb7c94d5a464e713a5d69207e01f959da90fbf0332da7123b9c246da88bf0a8df620f9a57835fb647b90dbf817bbf1d4b0d6cd3888f087afe1a066dd5de3472b3290e2497e2e3339a7ea19d07b0c06f00b00500c3ca792c262f8b151ded47cafa3f359a6aec12427dbcaeff47c84bc4746c717bc00", @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x10) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)=ANY=[], 0x10) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x6, 0x0, 0x6, 0x0, 0x4, 0x200a, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5b2, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0xffffffffffffffc0, 0x2, 0x7, 0x80000001, 0x4, 0x1, 0x0, 0xd22, 0x0, 0x8}, 0x0, 0x5, r2, 0x3) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x2e, 0x2e]}}, 0x0, 0x2d}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0a00000003000000020000000300000000000000", @ANYRES32, @ANYBLOB="033061500807c6493cb1216bb53bb1800fae405736357f00000000ca5ee42d7e75b488916222a987830ed42590f6e765636ac257602927d7d388ffe9f879b65711863108eca57c8a59383d9511a7ca458e287bda44598fd83f03937f00c0025f4a5c7af9af8c117ae84fd08e46956732a148b13bc6b48ed8246161378dc104abb9832efc7fc69ed7ae54d02bbd396a71fa63e8c4", @ANYRESHEX=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000bc0)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x9, &(0x7f0000000cc0)=ANY=[@ANYBLOB="030000000400000004"], 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x15, &(0x7f00000004c0)=ANY=[], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r9, 0x18000000000002a0, 0x26, 0x0, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632f77fbac141411e0000601be3e7d2a", 0x0, 0x104, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000711847000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): PU: 1 PID: 944 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 36.681828][ T944] Modules linked in: [ 36.741191][ T944] CPU: 1 PID: 944 Comm: syz.4.178 Not tainted syzkaller #0 [ 36.824163][ T944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 36.850869][ T944] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 36.861893][ T944] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 20 cd 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 36.884873][ T944] RSP: 0018:ffffc90001377448 EFLAGS: 00010246 [ 36.894888][ T944] RAX: 66d94f87eace3900 RBX: 0000000000000001 RCX: 0000000000080000 [ 36.903162][ T944] RDX: ffffc90002d51000 RSI: 0000000000002cd9 RDI: 0000000000002cda [ 36.911221][ T944] RBP: ffffc90001377490 R08: ffff8881f7127453 R09: 1ffff1103ee24e8a [ 36.920041][ T944] R10: dffffc0000000000 R11: ffffed103ee24e8b R12: ffff888116690000 [ 36.929163][ T944] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810b99e800 [ 36.937421][ T944] FS: 00007f8af0a056c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 36.947616][ T944] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 36.956301][ T944] CR2: 0000000000000000 CR3: 000000011b1a1000 CR4: 00000000003506a0 [ 36.985061][ T944] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 36.994037][ T944] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 37.002772][ T944] Call Trace: [ 37.052370][ T944] ? __fdget+0x1a1/0x230 [ 37.103042][ T944] resolve_pseudo_ldimm64+0x55e/0x1060 [ 37.112398][ T24] audit: type=1400 audit(1773113994.090:128): avc: denied { create } for pid=980 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 37.173866][ T944] ? bpf_check+0xdb10/0xdb10 [ 37.242206][ T944] ? kvmalloc_node+0x88/0x130 [ 37.298547][ T944] bpf_check+0x9058/0xdb10 [ 37.342877][ T944] ? bpf_get_btf_vmlinux+0x60/0x60 [ 37.362279][ T944] ? 0xffffffffa0028000 [ 37.372213][ T944] ? is_bpf_text_address+0x177/0x190 [ 37.423128][ T944] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.482191][ T944] ? __kernel_text_address+0xa0/0x100 [ 37.487612][ T944] ? unwind_get_return_address+0x4d/0x90 [ 37.557083][ T944] ? stack_trace_save+0xf0/0xf0 [ 37.567063][ T944] ? arch_stack_walk+0xee/0x140 [ 37.571951][ T944] ? stack_trace_save+0xa6/0xf0 [ 37.615070][ T944] ? stack_trace_snprint+0xf0/0xf0 [ 37.620259][ T944] ? __kasan_slab_alloc+0x69/0xf0 [ 37.640960][ T944] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.672259][ T944] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.687186][ T944] ? __kasan_kmalloc+0xec/0x110 [ 37.705150][ T944] ? __kasan_kmalloc+0xda/0x110 [ 37.710028][ T944] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 37.744758][ T944] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.750292][ T944] ? security_bpf_prog_alloc+0x62/0x90 [ 37.756229][ T944] ? bpf_prog_load+0x9d8/0x14a0 [ 37.761146][ T944] ? __se_sys_bpf+0x49a/0x740 [ 37.766396][ T944] ? __x64_sys_bpf+0x7b/0x90 [ 37.771082][ T944] ? do_syscall_64+0x31/0x40 [ 37.779836][ T944] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 37.786149][ T944] ? memset+0x35/0x40 [ 37.790265][ T944] ? bpf_obj_name_cpy+0x193/0x1e0 [ 37.820302][ T944] bpf_prog_load+0xfca/0x14a0 [ 37.827287][ T944] ? map_freeze+0x320/0x320 [ 37.836187][ T944] ? selinux_bpf+0xc7/0xf0 [ 37.844967][ T944] ? security_bpf+0x82/0xa0 [ 37.854949][ T944] __se_sys_bpf+0x49a/0x740 [ 37.865992][ T944] ? __x64_sys_bpf+0x90/0x90 [ 37.878246][ T944] ? __kasan_check_read+0x11/0x20 [ 37.907834][ T944] __x64_sys_bpf+0x7b/0x90 [ 37.924068][ T944] do_syscall_64+0x31/0x40 [ 37.928522][ T944] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 37.961549][ T944] RIP: 0033:0x7f8af1faa799 [ 37.996148][ T944] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 38.127013][ T944] RSP: 002b:00007f8af0a05028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 38.135731][ T944] RAX: ffffffffffffffda RBX: 00007f8af2223fa0 RCX: 00007f8af1faa799 [ 38.144090][ T944] RDX: 0000000000000094 RSI: 00002000000002c0 RDI: 0000000000000005 [ 38.210016][ T944] RBP: 00007f8af2040bd9 R08: 0000000000000000 R09: 0000000000000000 [ 38.218264][ T944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 38.226403][ T944] R13: 00007f8af2224038 R14: 00007f8af2223fa0 R15: 00007ffeef27eed8 [ 38.234573][ T944] ---[ end trace cef367d00668a7d0 ]--- [ 38.463691][ T1032] device syzkaller0 entered promiscuous mode [ 38.964509][ T1044] tap0: tun_chr_ioctl cmd 1074025680 [ 39.170032][ T1069] tap0: tun_chr_ioctl cmd 1074025680 [ 41.251004][ T1125] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 41.282796][ T24] audit: type=1400 audit(1773113998.260:129): avc: denied { ioctl } for pid=1122 comm="syz.0.225" path="net:[4026532531]" dev="nsfs" ino=4026532531 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 42.295420][ T24] audit: type=1400 audit(1773113999.270:130): avc: denied { create } for pid=1164 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 43.175269][ T24] audit: type=1400 audit(1773114000.150:131): avc: denied { create } for pid=1199 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 43.195733][ T1204] device wg2 entered promiscuous mode [ 45.259916][ T1290] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 45.474948][ T1303] device syzkaller0 entered promiscuous mode [ 46.426623][ T1345] device syzkaller0 entered promiscuous mode [ 46.571096][ T24] audit: type=1400 audit(1773114003.540:132): avc: denied { create } for pid=1348 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 47.251876][ T1373] device syzkaller0 entered promiscuous mode [ 47.292289][ T24] audit: type=1400 audit(1773114004.250:133): avc: denied { create } for pid=1376 comm="syz.3.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 47.312455][ T24] audit: type=1400 audit(1773114004.250:134): avc: denied { create } for pid=1376 comm="syz.3.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 49.313940][ T1442] tap0: tun_chr_ioctl cmd 1074025677 [ 49.319258][ T1442] tap0: linktype set to 805 [ 49.526640][ T1440] tap0: tun_chr_ioctl cmd 21731 [ 49.598289][ T24] audit: type=1400 audit(1773114006.570:135): avc: denied { ioctl } for pid=1439 comm="syz.0.313" path="" dev="cgroup2" ino=310 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 49.861368][ T1446] device syzkaller0 entered promiscuous mode [ 50.189795][ T24] audit: type=1400 audit(1773114007.160:136): avc: denied { create } for pid=1461 comm="syz.2.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 50.627225][ T1491] device sit0 left promiscuous mode [ 50.775147][ T1502] device syzkaller0 entered promiscuous mode [ 53.425116][ T24] audit: type=1400 audit(1773114010.400:137): avc: denied { create } for pid=1614 comm="syz.4.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 54.402892][ T1638] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.410552][ T1638] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.508376][ T1638] device bridge0 left promiscuous mode [ 54.590808][ T1645] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.598016][ T1645] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.786762][ T1648] device bridge_slave_1 left promiscuous mode [ 54.866067][ T1648] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.874153][ T1648] device bridge_slave_0 left promiscuous mode [ 54.880362][ T1648] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.497483][ T1666] device sit0 entered promiscuous mode [ 56.057511][ T24] audit: type=1400 audit(1773114013.030:138): avc: denied { create } for pid=1679 comm="syz.1.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 57.370512][ T1743] device syzkaller0 entered promiscuous mode [ 57.489684][ T1751] device syzkaller0 entered promiscuous mode [ 57.846212][ T24] audit: type=1400 audit(1773114014.820:139): avc: denied { create } for pid=1762 comm="syz.4.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 58.674188][ T1813] device veth1_macvtap left promiscuous mode [ 58.885850][ T1818] device veth1_macvtap entered promiscuous mode [ 58.952196][ T1818] device macsec0 entered promiscuous mode [ 59.018541][ T1819] device syzkaller0 entered promiscuous mode [ 60.256946][ T24] audit: type=1400 audit(1773114017.230:140): avc: denied { create } for pid=1864 comm="syz.3.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 60.888604][ T1898] Â: renamed from pim6reg1 [ 61.116570][ T1906] -: renamed from syzkaller0 [ 61.566930][ T1916] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.574127][ T1916] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.607832][ T1916] device bridge_slave_1 left promiscuous mode [ 61.614984][ T1916] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.622735][ T1916] device bridge_slave_0 left promiscuous mode [ 61.628957][ T1916] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.048848][ T24] audit: type=1400 audit(1773114020.020:141): avc: denied { create } for pid=1968 comm="syz.3.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 63.603129][ T1973] -: renamed from syzkaller0 [ 63.877394][ T2014] device syzkaller0 entered promiscuous mode [ 63.911839][ T2016] device syzkaller0 entered promiscuous mode [ 64.426248][ T2064] device syzkaller0 entered promiscuous mode [ 64.583801][ T24] audit: type=1400 audit(1773114021.560:142): avc: denied { create } for pid=2086 comm="syz.4.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 64.804984][ T2101] device syzkaller0 entered promiscuous mode [ 64.811904][ T2101] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 64.823122][ T2101] device wg2 left promiscuous mode [ 64.976504][ T24] audit: type=1400 audit(1773114021.950:143): avc: denied { create } for pid=2102 comm="syz.4.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 65.113108][ T2117] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 65.245951][ T2117] device syzkaller0 entered promiscuous mode [ 65.835287][ T2128] device wg2 left promiscuous mode [ 65.956618][ T2128] device wg2 entered promiscuous mode [ 66.020440][ T2141] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 66.148490][ T2147] device syzkaller0 entered promiscuous mode [ 66.167651][ T24] audit: type=1400 audit(1773114023.140:144): avc: denied { create } for pid=2165 comm="syz.3.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 71.255551][ T2344] device syzkaller0 entered promiscuous mode [ 72.233839][ T2391] device team_slave_1 entered promiscuous mode [ 72.250477][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.293263][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.857190][ T2415] device syzkaller0 entered promiscuous mode [ 73.609870][ T2463] device syzkaller0 entered promiscuous mode [ 75.051498][ T2532] device syzkaller0 entered promiscuous mode [ 75.441025][ T24] audit: type=1400 audit(1773114032.410:145): avc: denied { create } for pid=2549 comm="syz.4.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 75.539656][ T2554] device veth1_macvtap left promiscuous mode [ 75.546466][ T2554] device macsec0 left promiscuous mode [ 76.351956][ T2596] device syzkaller0 entered promiscuous mode [ 76.965648][ T2617] device syzkaller0 entered promiscuous mode [ 77.488874][ T2638] syz.0.653[2638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.488920][ T2638] syz.0.653[2638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.808861][ T2655] device syzkaller0 entered promiscuous mode [ 77.863886][ T2659] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 78.053608][ T2652] syzkaller0: tun_net_xmit 1280 [ 78.058619][ T2652] syzkaller0: create flow: hash 1975879125 index 3 [ 78.209892][ T2655] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 78.313898][ T2651] syzkaller0: delete flow: hash 1975879125 index 3 [ 78.843643][ T2673] device syzkaller0 entered promiscuous mode [ 79.173330][ T2685] pimreg0: tun_chr_ioctl cmd 35111 [ 79.327453][ T2694] device syzkaller0 entered promiscuous mode [ 79.506593][ T2698] device syzkaller0 entered promiscuous mode [ 82.442004][ T2779] device veth0_vlan left promiscuous mode [ 82.540573][ T2779] device veth0_vlan entered promiscuous mode [ 82.826533][ T2814] device syzkaller0 entered promiscuous mode [ 83.485436][ T2820] device syzkaller0 entered promiscuous mode [ 83.597229][ T2838] @0Ù: renamed from bond_slave_1 [ 84.144326][ T2868] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 84.193727][ T2857] device veth0_vlan left promiscuous mode [ 84.261254][ T2857] device veth0_vlan entered promiscuous mode [ 84.576794][ T2870] device syzkaller0 entered promiscuous mode [ 85.055588][ T2903] @ÿ: renamed from bond_slave_0 [ 86.290696][ T2954] device syzkaller0 entered promiscuous mode [ 86.368073][ T24] audit: type=1400 audit(1773114043.340:146): avc: denied { create } for pid=2955 comm="syz.2.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 87.018197][ T2972] @0Ù: renamed from bond_slave_1 [ 87.216308][ T2981] device syzkaller0 entered promiscuous mode [ 87.263745][ T2979] device syzkaller0 entered promiscuous mode [ 88.090590][ T3039] device syzkaller0 entered promiscuous mode [ 89.254764][ T3112] device syzkaller0 entered promiscuous mode [ 89.407692][ T3125] device syzkaller0 entered promiscuous mode [ 90.095101][ T3132] device syzkaller0 entered promiscuous mode [ 90.153146][ T24] audit: type=1400 audit(1773114047.130:147): avc: denied { create } for pid=3145 comm="syz.3.799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 90.547666][ T3171] device syzkaller0 entered promiscuous mode [ 91.030757][ T3218] device syzkaller0 entered promiscuous mode [ 91.665522][ T3273] device syzkaller0 entered promiscuous mode [ 91.870762][ T3279] device syzkaller0 entered promiscuous mode [ 92.200382][ T3315] device syzkaller0 entered promiscuous mode [ 92.818503][ T3355] device syzkaller0 entered promiscuous mode [ 93.200682][ T3365] device syzkaller0 entered promiscuous mode [ 94.311485][ T3408] device syzkaller0 entered promiscuous mode [ 94.577652][ T24] audit: type=1400 audit(1773114051.550:148): avc: denied { create } for pid=3442 comm="syz.2.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 95.119785][ T3455] device syzkaller0 entered promiscuous mode [ 95.126453][ T3449] batadv0: tun_chr_ioctl cmd 2147767521 [ 95.773390][ T3513] device syzkaller0 entered promiscuous mode [ 96.429573][ T3538] device syzkaller0 entered promiscuous mode [ 96.891400][ T3566] device syzkaller0 entered promiscuous mode [ 97.391288][ T3623] device syzkaller0 entered promiscuous mode [ 98.512695][ T3684] device syzkaller0 entered promiscuous mode [ 98.576763][ T3690] device syzkaller0 entered promiscuous mode [ 98.826923][ T3700] device wg2 entered promiscuous mode [ 98.886685][ T3704] device syzkaller0 entered promiscuous mode [ 99.220043][ T3727] device xfrm0 entered promiscuous mode [ 99.380454][ T3741] device syzkaller0 entered promiscuous mode [ 100.180210][ T3804] device wg2 entered promiscuous mode [ 100.512448][ T3836] device veth1_macvtap left promiscuous mode [ 101.775504][ T3884] device xfrm0 entered promiscuous mode [ 102.688553][ T3915] cgroup: fork rejected by pids controller in /syz1 [ 102.830039][ T3925] device syzkaller0 entered promiscuous mode [ 103.116497][ T3940] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.124419][ T3940] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.131951][ T3940] device bridge_slave_0 entered promiscuous mode [ 103.141854][ T3940] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.149365][ T3940] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.157350][ T3940] device bridge_slave_1 entered promiscuous mode [ 103.315852][ T24] audit: type=1400 audit(1773114060.290:149): avc: denied { create } for pid=3940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.360848][ T24] audit: type=1400 audit(1773114060.310:150): avc: denied { write } for pid=3940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.379128][ T3940] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.388311][ T3940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.395596][ T3940] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.402626][ T3940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.402796][ T24] audit: type=1400 audit(1773114060.310:151): avc: denied { read } for pid=3940 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.527140][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.567844][ T790] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.600157][ T790] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.619377][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.632550][ T790] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.639619][ T790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.649156][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.682555][ T790] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.689620][ T790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.718772][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.728921][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.757497][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.768527][ T3980] device veth1_macvtap left promiscuous mode [ 103.774780][ T3980] device macsec0 entered promiscuous mode [ 103.817116][ T3940] device veth0_vlan entered promiscuous mode [ 103.832773][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.845180][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.858105][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.896378][ T3940] device veth1_macvtap entered promiscuous mode [ 103.915420][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.924184][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 103.932929][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.344631][ T4002] device syzkaller0 entered promiscuous mode [ 104.541626][ T296] device veth0_vlan left promiscuous mode [ 104.736631][ T4027] device syzkaller0 entered promiscuous mode [ 105.581012][ T4076] : port 1(ip6gretap0) entered blocking state [ 105.608183][ T4076] : port 1(ip6gretap0) entered disabled state [ 105.669542][ T4076] device ip6gretap0 entered promiscuous mode [ 107.063733][ T4122] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.655262][ T4167] device syzkaller0 entered promiscuous mode [ 107.793478][ T790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.829254][ T790] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.836341][ T790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.888135][ T4203] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 108.900185][ T4203] device syzkaller0 entered promiscuous mode [ 109.390917][ T24] audit: type=1400 audit(1773114066.360:152): avc: denied { create } for pid=4231 comm="syz.0.1108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 109.504327][ T4236] device syzkaller0 entered promiscuous mode [ 109.649231][ T24] audit: type=1400 audit(1773114066.620:153): avc: denied { read } for pid=4253 comm="syz.3.1116" dev="nsfs" ino=4026532290 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 109.720113][ T24] audit: type=1400 audit(1773114066.650:154): avc: denied { open } for pid=4253 comm="syz.3.1116" path="net:[4026532290]" dev="nsfs" ino=4026532290 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 110.458768][ T4265] device syzkaller0 entered promiscuous mode [ 113.336481][ T4366] device syzkaller0 entered promiscuous mode [ 116.224805][ T4437] device syzkaller0 entered promiscuous mode [ 116.421627][ T4444] device sit0 left promiscuous mode [ 116.468561][ T4444] device sit0 entered promiscuous mode [ 116.529318][ T24] audit: type=1400 audit(1773114073.500:155): avc: denied { create } for pid=4453 comm="syz.4.1172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 116.735921][ T4469] device syzkaller0 entered promiscuous mode [ 117.047368][ T4497] device sit0 entered promiscuous mode [ 118.066317][ T4525] device syzkaller0 entered promiscuous mode [ 119.082289][ T4579] device syzkaller0 entered promiscuous mode [ 119.168455][ T4583] device syzkaller0 entered promiscuous mode [ 119.714150][ T24] audit: type=1400 audit(1773114076.690:156): avc: denied { create } for pid=4611 comm="syz.4.1214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 120.945896][ T4638] device syzkaller0 entered promiscuous mode [ 122.790720][ T4686] device syzkaller0 entered promiscuous mode [ 124.480342][ T4735] device syzkaller0 entered promiscuous mode [ 127.359796][ T4817] device syzkaller0 entered promiscuous mode [ 128.601605][ T4844] device syzkaller0 entered promiscuous mode [ 129.037298][ T4900] ÿ: renamed from team_slave_1 [ 130.086063][ T4954] tap1: tun_chr_ioctl cmd 2147767520 [ 130.364292][ T4961] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 130.370165][ T4961] syzkaller0: linktype set to 0 [ 131.050566][ T5019] device syzkaller0 entered promiscuous mode [ 131.469054][ T5044] device wg2 left promiscuous mode [ 131.623407][ T5062] device syzkaller0 entered promiscuous mode [ 131.712885][ T5078] ÿÊ”: renamed from veth0_vlan [ 132.403957][ T5127] Q±6ã`Ò˜: renamed from lo [ 133.246986][ T5173] device syzkaller0 entered promiscuous mode [ 135.269225][ T5230] ÿ: renamed from team_slave_1 [ 136.399979][ T5327] €Â0: renamed from pim6reg1 [ 136.646945][ T5342] device syzkaller0 entered promiscuous mode [ 137.286780][ T24] audit: type=1400 audit(1773114094.260:157): avc: denied { create } for pid=5387 comm="syz.4.1443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 138.020291][ T5428] device syzkaller0 entered promiscuous mode [ 138.504994][ T5448] device syzkaller0 entered promiscuous mode [ 139.155245][ T5470] device syzkaller0 entered promiscuous mode [ 139.416293][ T5489] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.428161][ T5489] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.435934][ T5489] device bridge_slave_0 entered promiscuous mode [ 139.451863][ T5489] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.459622][ T5489] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.486481][ T5489] device bridge_slave_1 entered promiscuous mode [ 139.566624][ T24] audit: type=1400 audit(1773114096.540:158): avc: denied { ioctl } for pid=5501 comm="syz.0.1479" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 139.621962][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.622455][ T5515] cgroup: fork rejected by pids controller in /syz2 [ 139.636768][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.647782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.655306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.664087][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.672664][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.679692][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.687378][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.695772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.705452][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.712522][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.734411][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.744048][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.768514][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.789708][ T5489] device veth0_vlan entered promiscuous mode [ 139.811885][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.871418][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.954439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.020936][ T5489] device veth1_macvtap entered promiscuous mode [ 140.138772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.230172][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.238693][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.937229][ T5654] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.989143][ T5654] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.997112][ T5654] device bridge_slave_0 entered promiscuous mode [ 141.004504][ T5654] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.011673][ T5654] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.019353][ T5654] device bridge_slave_1 entered promiscuous mode [ 141.172757][ T5661] device syzkaller0 entered promiscuous mode [ 141.286653][ T5654] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.293765][ T5654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.301063][ T5654] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.308103][ T5654] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.348378][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.520630][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.544658][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.660110][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.679273][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.759474][ T5654] device veth0_vlan entered promiscuous mode [ 141.870567][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.218547][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 142.270427][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 142.278338][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.291225][ T5654] device veth1_macvtap entered promiscuous mode [ 142.315339][ T7] device bridge_slave_1 left promiscuous mode [ 142.321577][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.329589][ T7] device bridge_slave_0 left promiscuous mode [ 142.335843][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.344481][ T7] device veth1_macvtap left promiscuous mode [ 142.350488][ T7] device veth0_vlan left promiscuous mode [ 142.469800][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 142.480227][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 142.488887][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 142.508446][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 142.517036][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 142.526230][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 142.539444][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.569071][ T5753] device syzkaller0 entered promiscuous mode [ 143.764516][ T5770] bridge0: port 3(veth0_to_bridge) entered blocking state [ 143.771948][ T5770] bridge0: port 3(veth0_to_bridge) entered disabled state [ 143.781389][ T5770] device veth0_to_bridge entered promiscuous mode [ 143.788122][ T5770] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 143.807160][ T5770] bridge0: port 3(veth0_to_bridge) entered blocking state [ 143.814342][ T5770] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 143.863751][ T5776] device veth1_macvtap left promiscuous mode [ 143.897753][ T5774] device veth1_macvtap entered promiscuous mode [ 143.904443][ T5774] device macsec0 entered promiscuous mode [ 143.938028][ T7] device veth1_macvtap left promiscuous mode [ 143.950018][ T7] device veth0_vlan left promiscuous mode [ 144.185397][ T5782] bridge0: port 3(veth0_to_bridge) entered disabled state [ 144.192698][ T5782] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.200363][ T5782] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.215353][ T5791] device veth0_to_bridge left promiscuous mode [ 144.222190][ T5791] bridge0: port 3(veth0_to_bridge) entered disabled state [ 144.232643][ T5791] device bridge_slave_1 left promiscuous mode [ 144.266740][ T5791] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.289603][ T5791] device bridge_slave_0 left promiscuous mode [ 144.295925][ T5791] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.438179][ T5806] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.445402][ T5806] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.475236][ T5806] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.482314][ T5806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.489716][ T5806] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.496842][ T5806] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.535263][ T5806] device bridge0 entered promiscuous mode [ 145.081624][ T5846] tap0: tun_chr_ioctl cmd 2147767520 [ 145.259503][ T5868] device syzkaller0 entered promiscuous mode [ 146.543908][ T5938] device syzkaller0 entered promiscuous mode [ 148.369826][ T6059] device syzkaller0 entered promiscuous mode [ 149.308345][ T6150] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 149.507243][ T6161] device veth0_vlan left promiscuous mode [ 149.515059][ T6161] device veth0_vlan entered promiscuous mode [ 149.706356][ T6172] device syzkaller0 entered promiscuous mode [ 152.684532][ T6286] device syzkaller0 entered promiscuous mode [ 154.123432][ T24] audit: type=1400 audit(1773114111.100:159): avc: denied { create } for pid=6330 comm="syz.0.1688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 154.956092][ T6376] device veth1_macvtap left promiscuous mode [ 155.414857][ T275] cgroup: fork rejected by pids controller in /syz3 [ 155.460124][ T24] audit: type=1400 audit(1773114112.430:160): avc: denied { create } for pid=6409 comm="syz.2.1711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 155.978159][ T6436] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.989749][ T6436] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.002590][ T6436] device bridge_slave_0 entered promiscuous mode [ 156.022442][ T6436] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.029489][ T6436] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.057765][ T6436] device bridge_slave_1 entered promiscuous mode [ 156.113111][ T6443] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.120313][ T6443] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.571519][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.581341][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.595426][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.616318][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.632813][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.639889][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.658147][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.666587][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.675000][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.682073][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.833555][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.841580][ T6475] device wg2 left promiscuous mode [ 156.849086][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.039451][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.075423][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 157.090233][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 157.110058][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 157.118375][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 157.142671][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 157.151444][ T6436] device veth0_vlan entered promiscuous mode [ 157.333051][ T6436] device veth1_macvtap entered promiscuous mode [ 157.473334][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 157.502420][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 157.514125][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 157.605194][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 157.613752][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 157.624266][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 157.632618][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 157.872156][ T6515] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 159.562499][ T6577] tap0: tun_chr_ioctl cmd 1074025681 [ 160.254852][ T6601] device syzkaller0 entered promiscuous mode [ 162.673690][ T6654] device aaaaaaaaaaaaaaa entered promiscuous mode [ 167.598666][ T6835] bridge0: port 3(gretap0) entered blocking state [ 167.651887][ T6835] bridge0: port 3(gretap0) entered disabled state [ 167.659769][ T6835] device gretap0 entered promiscuous mode [ 167.666657][ T6835] bridge0: port 3(gretap0) entered blocking state [ 167.673131][ T6835] bridge0: port 3(gretap0) entered forwarding state [ 171.609631][ T6978] device dummy0 entered promiscuous mode [ 172.741196][ T7057] device  entered promiscuous mode [ 173.916972][ T7112] device syzkaller0 entered promiscuous mode [ 174.071109][ T24] audit: type=1400 audit(1773114131.040:161): avc: denied { attach_queue } for pid=7123 comm="syz.0.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 174.709502][ T7151] device syzkaller0 entered promiscuous mode [ 174.787899][ T7151] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 175.106740][ T7168] batadv0: tun_chr_ioctl cmd 2148553947 [ 176.372703][ T7234] device syzkaller0 entered promiscuous mode [ 177.173939][ T7255] : port 1(ip6gretap0) entered blocking state [ 177.192177][ T7255] : port 1(ip6gretap0) entered disabled state [ 177.199114][ T7255] device ip6gretap0 entered promiscuous mode [ 177.488522][ T7292] device wg2 entered promiscuous mode [ 179.391666][ T7425] device syzkaller0 entered promiscuous mode [ 180.011146][ T7445] device bridge_slave_1 left promiscuous mode [ 180.024780][ T7445] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.057995][ T7445] device bridge_slave_0 left promiscuous mode [ 180.079206][ T7445] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.854239][ T7493] device wg0 entered promiscuous mode [ 180.966579][ T7501] -: renamed from syzkaller0 [ 181.773809][ T7545] 0: mtu greater than device maximum [ 182.490589][ T7586] tun0: tun_chr_ioctl cmd 1074025676 [ 182.495925][ T7586] tun0: owner set to 0 [ 182.712277][ T7584] tun0: tun_chr_ioctl cmd 35108 [ 183.800249][ T7616] sock: sock_set_timeout: `syz.0.2049' (pid 7616) tries to set negative timeout [ 185.484183][ T24] audit: type=1400 audit(1773114142.460:162): avc: denied { create } for pid=7684 comm="syz.0.2067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 186.653693][ T7711] batadv0: tun_chr_ioctl cmd 2148553947 [ 186.980504][ T7729] device syzkaller0 entered promiscuous mode [ 187.848697][ T7763] device syzkaller0 entered promiscuous mode [ 189.055497][ T7805] device sit0 entered promiscuous mode [ 189.629193][ T7821] device wg2 entered promiscuous mode [ 190.335677][ T7858] device syzkaller0 entered promiscuous mode [ 190.590795][ T7871] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 191.814240][ T7908] syz.0.2128 (7908) used obsolete PPPIOCDETACH ioctl [ 192.863262][ T7941] device syzkaller0 entered promiscuous mode [ 195.664557][ T8012] device pim6reg1 entered promiscuous mode [ 195.836934][ T8024] device syzkaller0 entered promiscuous mode [ 195.965327][ T8024] device syzkaller0 left promiscuous mode [ 196.300287][ T8037] device syzkaller0 entered promiscuous mode [ 196.603259][ T24] audit: type=1400 audit(1773114153.580:163): avc: denied { create } for pid=8039 comm="syz.2.2163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 197.317837][ T8061] device syzkaller0 entered promiscuous mode [ 197.531742][ T8068] device syzkaller0 entered promiscuous mode [ 199.466100][ T8224] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 199.589714][ T8242] IPv6: pim6reg1: Disabled Multicast RS [ 202.516359][ T8414] syz.4.2267[8414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.516412][ T8414] syz.4.2267[8414] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.597134][ T8416] device syzkaller0 entered promiscuous mode [ 202.831595][ T8420] device veth1_macvtap left promiscuous mode [ 203.045661][ T8434] tun0: tun_chr_ioctl cmd 1074025677 [ 203.206762][ T8434] tun0: linktype set to 804 [ 203.235539][ T8437] device wg2 left promiscuous mode [ 203.250881][ T8439] device wg2 entered promiscuous mode [ 205.484006][ T8526] tap0: tun_chr_ioctl cmd 1074025675 [ 205.490069][ T8526] tap0: persist disabled [ 208.249537][ T8623] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.256679][ T8623] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.272933][ T8623] device bridge0 left promiscuous mode [ 208.286750][ T8623] device bridge_slave_1 left promiscuous mode [ 208.306597][ T8623] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.328646][ T8623] device bridge_slave_0 left promiscuous mode [ 208.344580][ T8623] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.881112][ T8650] device bond_slave_0 entered promiscuous mode [ 208.951354][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 208.983063][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.171198][ T8671] device syzkaller0 entered promiscuous mode [ 209.615491][ T8728] device syzkaller0 entered promiscuous mode [ 209.737718][ T8746] tun0: tun_chr_ioctl cmd 1074025676 [ 209.743289][ T8746] tun0: owner set to 0 [ 213.134985][ T8910] device syzkaller0 entered promiscuous mode [ 213.144949][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 213.697071][ T8923] device wg2 entered promiscuous mode [ 215.605570][ T8992] device syzkaller0 entered promiscuous mode [ 218.135002][ T9086] device syzkaller0 entered promiscuous mode [ 220.341251][ T9143] device syzkaller0 entered promiscuous mode [ 220.833279][ T9151] device bond_slave_0 entered promiscuous mode [ 221.043932][ T9163] device wg2 left promiscuous mode [ 221.464289][ T9177] device veth1_macvtap entered promiscuous mode [ 221.492128][ T9177] device macsec0 entered promiscuous mode [ 221.498195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.462371][ T9216] macsec0: mtu less than device minimum [ 224.235920][ T9325] device syzkaller0 entered promiscuous mode [ 224.414197][ T9356] tap0: tun_chr_ioctl cmd 1074025677 [ 224.419565][ T9356] tap0: linktype set to 769 [ 224.635551][ T9392] device xfrm0 entered promiscuous mode [ 225.137711][ T24] audit: type=1400 audit(1773114182.110:164): avc: denied { setattr } for pid=9405 comm="syz.1.2555" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 227.179757][ T9473] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.264444][ T9473] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.365675][ T9473] device bridge_slave_0 entered promiscuous mode [ 227.482162][ T9473] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.496729][ T9473] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.525723][ T9473] device bridge_slave_1 entered promiscuous mode [ 227.783457][ T9499] device syzkaller0 entered promiscuous mode [ 228.016677][ T7] device ip6gretap0 left promiscuous mode [ 228.080489][ T7] : port 1(ip6gretap0) entered disabled state [ 228.133290][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.141424][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.149987][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.158527][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.166827][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.173877][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.181654][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.190488][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.198797][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.205838][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.213841][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.244611][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.253147][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.261277][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.274408][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.289878][ T9473] device veth0_vlan entered promiscuous mode [ 228.314085][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.322766][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.332514][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.340527][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.349433][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.365019][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.380312][ T9473] device veth1_macvtap entered promiscuous mode [ 228.392784][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.401336][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.412987][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 228.438428][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.449039][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.514583][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.594404][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 228.749532][ T9525] device syzkaller0 entered promiscuous mode [ 229.564797][ T7] device bridge_slave_1 left promiscuous mode [ 229.610330][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.691497][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.815981][ T7] device veth1_macvtap left promiscuous mode [ 230.737881][ T9613] device syzkaller0 entered promiscuous mode [ 231.900254][ T9664] device syzkaller0 entered promiscuous mode [ 232.142406][ T9668] tun0: tun_chr_ioctl cmd 1074025677 [ 232.183975][ T9668] tun0: linktype set to 804 [ 234.465788][ T9770] macsec0: mtu less than device minimum [ 235.912685][ T9826] device syzkaller0 entered promiscuous mode [ 236.979078][ T9861] ref_ctr_offset mismatch. inode: 0x393 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 237.864717][ T24] audit: type=1400 audit(1773114194.840:165): avc: denied { append } for pid=9877 comm="syz.2.2683" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 238.794059][ T24] audit: type=1400 audit(1773114195.770:166): avc: denied { setattr } for pid=9886 comm="syz.1.2685" path="pipe:[33338]" dev="pipefs" ino=33338 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 239.217493][ T9914] device syzkaller0 entered promiscuous mode [ 239.272679][ T9921] tap0: tun_chr_ioctl cmd 1074025675 [ 239.315144][ T9921] tap0: persist enabled [ 239.326973][ T9931] tap0: tun_chr_ioctl cmd 1074025675 [ 239.352096][ T9931] tap0: persist disabled [ 242.010836][T10040] device syzkaller0 entered promiscuous mode [ 242.254888][T10053] syz.1.2732[10053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.254936][T10053] syz.1.2732[10053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.951499][T10133] ±ÿ: renamed from team_slave_1 [ 244.245897][T10159] device syzkaller0 entered promiscuous mode [ 247.663743][T10267] device syzkaller0 entered promiscuous mode [ 248.941778][ T24] audit: type=1400 audit(1773114205.910:167): avc: denied { create } for pid=10323 comm="syz.3.2811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 249.924791][T10397] tun0: tun_chr_ioctl cmd 1074025677 [ 249.981929][T10397] tun0: linktype set to 820 [ 250.355635][T10408] device syzkaller0 entered promiscuous mode [ 250.453585][T10424] device syzkaller0 entered promiscuous mode [ 250.605704][T10427] device syzkaller0 entered promiscuous mode [ 250.982995][T10462] device syzkaller0 entered promiscuous mode [ 251.237319][T10492] device syzkaller0 entered promiscuous mode [ 251.305004][T10492] syzkaller0: tun_net_xmit 1280 [ 251.661855][T10527] device syzkaller0 entered promiscuous mode [ 253.635675][T10647] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 254.452854][T10686] @0Ù: renamed from bond_slave_1 [ 257.325803][T10846] device macsec0 left promiscuous mode [ 257.950976][T10867] device wg2 entered promiscuous mode [ 259.327027][T10910] device veth1_macvtap left promiscuous mode [ 259.456578][T10910] device veth1_macvtap entered promiscuous mode [ 259.463396][T10910] device macsec0 entered promiscuous mode [ 259.704602][T10919] device wg2 left promiscuous mode [ 259.714347][T10921] device wg2 entered promiscuous mode [ 260.101268][T10964] : port 1(ip6gretap0) entered blocking state [ 260.107613][T10964] : port 1(ip6gretap0) entered disabled state [ 260.114289][T10964] device ip6gretap0 entered promiscuous mode [ 260.492997][T10994] device syzkaller0 entered promiscuous mode [ 261.877190][T11053] device syzkaller0 entered promiscuous mode [ 262.403290][T11060] device syzkaller0 entered promiscuous mode [ 262.545632][T11069] device syzkaller0 left promiscuous mode [ 262.641448][T11085] device veth1_macvtap left promiscuous mode [ 262.700208][T11085] device macsec0 left promiscuous mode [ 264.098246][T11110] device syzkaller0 entered promiscuous mode [ 268.789982][T11223] -: renamed from syzkaller0 [ 268.979590][T11235] device syzkaller0 entered promiscuous mode [ 269.182091][T11238] device syzkaller0 left promiscuous mode [ 270.727784][T11284] device syzkaller0 entered promiscuous mode [ 270.836742][ T24] audit: type=1400 audit(1773114227.810:168): avc: denied { mounton } for pid=11294 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 270.926392][T11298] device syzkaller0 entered promiscuous mode [ 271.011892][T11295] device syzkaller0 entered promiscuous mode [ 271.150855][T11294] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.212990][T11294] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.220446][T11294] device bridge_slave_0 entered promiscuous mode [ 271.232152][T11297] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 271.498490][T11294] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.506138][T11294] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.513714][T11294] device bridge_slave_1 entered promiscuous mode [ 271.866171][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.889651][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.021475][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.029865][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.038723][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.045798][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.053618][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.062168][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.070655][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.077801][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.093904][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.106556][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.115014][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.140624][T11294] device veth0_vlan entered promiscuous mode [ 272.155780][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.164400][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.172562][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.180021][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.203119][T11348] device syzkaller0 entered promiscuous mode [ 272.216364][T11294] device veth1_macvtap entered promiscuous mode [ 272.271975][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.294679][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.432803][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.463605][ T24] audit: type=1400 audit(1773114229.440:169): avc: denied { unmount } for pid=11294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 273.661980][T11399] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.367446][T11418] device syzkaller0 entered promiscuous mode [ 275.669964][T11447] nr0: port 1(macsec0) entered blocking state [ 275.678802][T11447] nr0: port 1(macsec0) entered disabled state [ 275.685480][T11447] device macsec0 entered promiscuous mode [ 277.304183][T11530] device syzkaller0 entered promiscuous mode [ 278.017760][T11558] device syzkaller0 entered promiscuous mode [ 278.962876][ T24] audit: type=1400 audit(1773114235.940:170): avc: denied { create } for pid=11595 comm="syz.0.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 281.338528][T11703] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 281.382127][T11703] device syzkaller0 entered promiscuous mode [ 283.414210][T11764] device syzkaller0 entered promiscuous mode [ 284.672358][T11792] device syzkaller0 entered promiscuous mode [ 286.171638][T11834] device syzkaller0 entered promiscuous mode [ 288.261911][T11901] device sit0 entered promiscuous mode [ 289.622172][T11964] device syzkaller0 entered promiscuous mode [ 291.732486][T12036] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 291.811812][T12036] device syzkaller0 entered promiscuous mode [ 292.251549][T12054] erspan0: refused to change device tx_queue_len [ 292.481595][T12068] ÿÿÿÿÿÿõ: renamed from vlan1 [ 292.635440][T12075] device sit0 entered promiscuous mode [ 293.831511][T12118] device syzkaller0 entered promiscuous mode [ 293.931094][T12127] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 293.968085][T12130] syz.3.3308[12130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.968141][T12130] syz.3.3308[12130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.572415][T12150] device syzkaller0 entered promiscuous mode [ 294.663112][T12163] device sit0 left promiscuous mode [ 295.064139][T12174] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 295.714773][T12214] device syzkaller0 entered promiscuous mode [ 296.109375][T12223] device wg2 entered promiscuous mode [ 297.124950][T12230] device syzkaller0 entered promiscuous mode [ 298.357851][T12280] device pim6reg1 entered promiscuous mode [ 298.742780][T12307] tap0: tun_chr_ioctl cmd 1074025675 [ 298.748401][T12307] tap0: persist enabled [ 298.763614][T12307] tap0: tun_chr_ioctl cmd 1074025675 [ 298.769171][T12307] tap0: persist disabled [ 298.883357][T12350] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 298.889034][T12350] pim6reg0: linktype set to 768 [ 299.098984][T12357] device veth1_macvtap left promiscuous mode [ 299.248567][T12358] device veth1_macvtap entered promiscuous mode [ 299.323277][T12358] device macsec0 entered promiscuous mode [ 300.042844][T12401] device syzkaller0 entered promiscuous mode [ 300.070501][T12404] device syzkaller0 left promiscuous mode [ 301.116030][T12430] device bridge0 entered promiscuous mode [ 301.349537][T12455] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.699873][T12566] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 301.711542][T12566] device syzkaller0 entered promiscuous mode [ 301.762964][T12580] device syzkaller0 entered promiscuous mode [ 303.139736][T12673] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.179173][T12673] device bridge0 left promiscuous mode [ 303.200232][T12675] device bridge_slave_1 left promiscuous mode [ 303.219007][T12675] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.234537][T12675] device bridge_slave_0 left promiscuous mode [ 303.240709][T12675] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.315463][T12671] device syzkaller0 entered promiscuous mode [ 303.385053][T12691] syz.4.3464[12691] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.805724][T12792] tap0: tun_chr_ioctl cmd 35108 [ 309.434517][T12869] device syzkaller0 entered promiscuous mode [ 311.205798][T12889] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 311.225391][T12889] device syzkaller0 entered promiscuous mode [ 312.240256][T12915] device sit0 entered promiscuous mode [ 312.836100][T12959] device syzkaller0 entered promiscuous mode [ 314.180513][T13037] device syzkaller0 entered promiscuous mode [ 314.590386][T13052] syz.3.3570[13052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.590442][T13052] syz.3.3570[13052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.757450][T13065] Â: renamed from pim6reg1 [ 315.828273][T13156] device syzkaller0 entered promiscuous mode [ 316.006445][T13174] device syzkaller0 entered promiscuous mode [ 316.118642][T13191] device syzkaller0 entered promiscuous mode [ 316.165910][T13191] device syzkaller0 left promiscuous mode [ 318.432764][T13300] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 318.835480][T13322] bridge0: port 3(veth0_to_bridge) entered blocking state [ 318.845988][T13322] bridge0: port 3(veth0_to_bridge) entered disabled state [ 318.853801][T13322] device veth0_to_bridge entered promiscuous mode [ 319.117689][T13338] device syzkaller0 entered promiscuous mode [ 322.476117][T13445] device syzkaller0 entered promiscuous mode [ 328.152620][T13566] IPv6: pim6reg1: Disabled Multicast RS [ 329.617297][T13623] device syzkaller0 entered promiscuous mode [ 329.648445][T13618] device sit0 entered promiscuous mode [ 331.873338][T13714] device sit0 left promiscuous mode [ 332.013786][T13719] device sit0 entered promiscuous mode [ 332.071316][T13718] device syzkaller0 entered promiscuous mode [ 334.121001][T13784] geneve1: tun_chr_ioctl cmd 1074025672 [ 334.211156][T13784] geneve1: ignored: set checksum enabled [ 335.913840][T13815] device syzkaller0 entered promiscuous mode [ 339.437417][T13863] batadv0: tun_chr_ioctl cmd 1074025673 [ 339.445921][T13862] batadv0: tun_chr_ioctl cmd 1074025681 [ 339.457321][T13861] batadv0: tun_chr_ioctl cmd 2147767521 [ 345.786666][T14010] FAULT_INJECTION: forcing a failure. [ 345.786666][T14010] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 345.874587][T14010] CPU: 0 PID: 14010 Comm: syz.2.3840 Tainted: G W syzkaller #0 [ 345.883461][T14010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 345.893516][T14010] Call Trace: [ 345.896809][T14010] __dump_stack+0x21/0x24 [ 345.901123][T14010] dump_stack_lvl+0x1a7/0x208 [ 345.905784][T14010] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 345.911923][T14010] ? show_regs_print_info+0x18/0x18 [ 345.917104][T14010] ? dump_stack+0x9/0x1c [ 345.921337][T14010] dump_stack+0x15/0x1c [ 345.925479][T14010] should_fail+0x3c1/0x510 [ 345.929881][T14010] should_fail_usercopy+0x1a/0x20 [ 345.934989][T14010] _copy_from_user+0x20/0xd0 [ 345.939560][T14010] __se_sys_bpf+0x1bb/0x740 [ 345.944037][T14010] ? __x64_sys_bpf+0x90/0x90 [ 345.948634][T14010] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 345.954675][T14010] ? debug_smp_processor_id+0x17/0x20 [ 345.960030][T14010] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 345.966064][T14010] __x64_sys_bpf+0x7b/0x90 [ 345.970451][T14010] do_syscall_64+0x31/0x40 [ 345.974843][T14010] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 345.980705][T14010] RIP: 0033:0x7f170e5f0799 [ 345.985102][T14010] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 346.004678][T14010] RSP: 002b:00007f170d04b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 346.013064][T14010] RAX: ffffffffffffffda RBX: 00007f170e869fa0 RCX: 00007f170e5f0799 [ 346.021008][T14010] RDX: 0000000000000020 RSI: 0000200000000040 RDI: 0000000000000004 [ 346.028952][T14010] RBP: 00007f170d04b090 R08: 0000000000000000 R09: 0000000000000000 [ 346.036897][T14010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.044851][T14010] R13: 00007f170e86a038 R14: 00007f170e869fa0 R15: 00007ffc032fa188 [ 346.134699][T14022] tap0: tun_chr_ioctl cmd 2147767520 [ 346.597356][T14062] FAULT_INJECTION: forcing a failure. [ 346.597356][T14062] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.613355][T14062] CPU: 1 PID: 14062 Comm: syz.1.3857 Tainted: G W syzkaller #0 [ 346.622212][T14062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 346.632254][T14062] Call Trace: [ 346.635524][T14062] __dump_stack+0x21/0x24 [ 346.640694][T14062] dump_stack_lvl+0x1a7/0x208 [ 346.645341][T14062] ? thaw_kernel_threads+0x220/0x220 [ 346.650601][T14062] ? vsnprintf+0x189c/0x1990 [ 346.655165][T14062] ? show_regs_print_info+0x18/0x18 [ 346.660335][T14062] dump_stack+0x15/0x1c [ 346.664464][T14062] should_fail+0x3c1/0x510 [ 346.668851][T14062] should_fail_usercopy+0x1a/0x20 [ 346.673847][T14062] _copy_to_user+0x20/0x90 [ 346.678237][T14062] simple_read_from_buffer+0xe9/0x160 [ 346.683579][T14062] proc_fail_nth_read+0x1a6/0x220 [ 346.688577][T14062] ? proc_fault_inject_write+0x310/0x310 [ 346.694180][T14062] ? rw_verify_area+0x1c0/0x360 [ 346.699000][T14062] ? proc_fault_inject_write+0x310/0x310 [ 346.704600][T14062] vfs_read+0x209/0xa60 [ 346.708730][T14062] ? kernel_read+0x70/0x70 [ 346.713122][T14062] ? __kasan_check_write+0x14/0x20 [ 346.718207][T14062] ? mutex_lock+0x92/0xf0 [ 346.722505][T14062] ? mutex_trylock+0xa0/0xa0 [ 346.727081][T14062] ? __fget_files+0x2c4/0x320 [ 346.731726][T14062] ? __fdget_pos+0x2d2/0x380 [ 346.736290][T14062] ? ksys_read+0x71/0x250 [ 346.740590][T14062] ksys_read+0x149/0x250 [ 346.744801][T14062] ? vfs_write+0xdc0/0xdc0 [ 346.749187][T14062] __x64_sys_read+0x7b/0x90 [ 346.753661][T14062] do_syscall_64+0x31/0x40 [ 346.758049][T14062] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 346.763910][T14062] RIP: 0033:0x7f80ddd64fce [ 346.768298][T14062] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 346.787976][T14062] RSP: 002b:00007f80dc7fefe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 346.796363][T14062] RAX: ffffffffffffffda RBX: 00007f80dc7ff6c0 RCX: 00007f80ddd64fce [ 346.804315][T14062] RDX: 000000000000000f RSI: 00007f80dc7ff0a0 RDI: 0000000000000004 [ 346.812273][T14062] RBP: 00007f80dc7ff090 R08: 0000000000000000 R09: 0000000000000000 [ 346.820228][T14062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.828185][T14062] R13: 00007f80de01e038 R14: 00007f80de01dfa0 R15: 00007ffcd744dca8 [ 348.309417][T14173] sock: sock_set_timeout: `syz.0.3891' (pid 14173) tries to set negative timeout [ 348.331762][T14174] sock: sock_set_timeout: `syz.0.3891' (pid 14174) tries to set negative timeout [ 349.100190][T14223] device veth1_macvtap entered promiscuous mode [ 349.107307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 349.251462][T14232] device syzkaller0 entered promiscuous mode [ 349.945936][T14264] device syzkaller0 entered promiscuous mode [ 350.303806][T14300] device syzkaller0 entered promiscuous mode [ 351.075891][T14359] device syzkaller0 entered promiscuous mode [ 352.741676][T14425] device syzkaller0 entered promiscuous mode [ 352.873752][T14422] device sit0 left promiscuous mode [ 358.378064][T14638] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 358.404681][T14638] syzkaller0: linktype set to 825 [ 359.262149][T14665] device syzkaller0 entered promiscuous mode [ 359.461943][T14692] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 359.467911][T14692] syzkaller0: linktype set to 0 [ 360.026905][ T24] audit: type=1400 audit(1773114317.000:171): avc: denied { create } for pid=14714 comm="syz.1.4043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 360.277498][T14743] device syzkaller0 entered promiscuous mode [ 360.343644][T14724] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 360.744134][T14761] device syzkaller0 entered promiscuous mode [ 363.909951][T14898] device syzkaller0 entered promiscuous mode [ 364.209520][ T24] audit: type=1400 audit(1773114321.180:172): avc: denied { create } for pid=14905 comm="syz.0.4095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 364.618336][T14929] device syzkaller0 entered promiscuous mode [ 364.968177][T14950] syz.0.4111[14950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.426011][T14996] device syzkaller0 entered promiscuous mode [ 365.486472][T15005] syz.1.4126 uses obsolete (PF_INET,SOCK_PACKET) [ 367.895698][T15104] device wg2 entered promiscuous mode [ 369.548794][T15161] device sit0 left promiscuous mode [ 371.942576][T15217] nr0: port 1(macsec0) entered blocking state [ 371.948673][T15217] nr0: port 1(macsec0) entered disabled state [ 380.567774][T15450] device syzkaller0 entered promiscuous mode [ 380.755107][T15476] device syzkaller0 entered promiscuous mode [ 380.833941][T15485] device veth1_macvtap left promiscuous mode [ 380.839975][T15485] device macsec0 left promiscuous mode [ 380.847237][T15485] device veth1_macvtap entered promiscuous mode [ 380.853582][T15485] device macsec0 entered promiscuous mode [ 384.053564][T15618] device syzkaller0 entered promiscuous mode [ 384.300006][T15626] €Â0: renamed from pim6reg1 [ 384.676658][T15645] device veth1_macvtap left promiscuous mode [ 384.739023][T15645] device macsec0 left promiscuous mode [ 384.806890][T15654] device veth1_macvtap entered promiscuous mode [ 384.842366][T15654] device macsec0 entered promiscuous mode [ 386.018227][T15706] device syzkaller0 entered promiscuous mode [ 386.145852][T15706] tap0: tun_chr_ioctl cmd 1074025681 [ 388.563209][T15795] device veth1_macvtap left promiscuous mode [ 389.041129][T15809] device syzkaller0 entered promiscuous mode [ 389.328542][T15814] device wg2 left promiscuous mode [ 390.588421][T15867] ªªªªªª™™: renamed from vlan0 [ 391.103566][T15894] device syzkaller0 entered promiscuous mode [ 391.200231][T15914] device syzkaller0 entered promiscuous mode [ 391.277904][T15918] device sit0 left promiscuous mode [ 391.296715][T15916] device syzkaller0 entered promiscuous mode [ 393.803905][T16040] device syzkaller0 entered promiscuous mode [ 393.831606][T16045] tap0: tun_chr_ioctl cmd 1074025677 [ 393.837495][T16045] tap0: linktype set to 6 [ 393.854322][T16038] device veth0_vlan left promiscuous mode [ 393.878894][T16038] device veth0_vlan entered promiscuous mode [ 393.908470][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.916955][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.929720][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.005129][T16043] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.032291][T16043] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.039630][T16043] device bridge_slave_0 entered promiscuous mode [ 394.058721][T16043] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.071991][T16043] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.079412][T16043] device bridge_slave_1 entered promiscuous mode [ 394.176421][T16043] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.183509][T16043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.190795][T16043] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.197840][T16043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.374952][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.395550][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.403162][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.412799][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.421024][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.428074][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.562896][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.669861][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.676964][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.919360][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 394.961878][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 395.085005][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 395.132461][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 395.181074][T16043] device veth0_vlan entered promiscuous mode [ 395.224493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 395.234051][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 395.244910][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 395.256298][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 395.276727][T16043] device veth1_macvtap entered promiscuous mode [ 395.354212][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 395.382783][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 395.422862][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 395.483004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 395.531844][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 395.581789][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 395.622498][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 395.663374][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 395.682286][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 396.070336][T16131] syz.3.4456[16131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 396.070389][T16131] syz.3.4456[16131] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.454410][T16179] device syzkaller0 entered promiscuous mode [ 398.590414][T16204] nr0: port 1(macsec0) entered blocking state [ 398.692622][T16204] nr0: port 1(macsec0) entered disabled state [ 398.699202][T16204] device macsec0 entered promiscuous mode [ 403.039983][T16306] bridge0: port 3(gretap0) entered disabled state [ 403.046633][T16306] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.053840][T16306] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.084114][T16320] bridge0: port 3(gretap0) entered blocking state [ 403.090556][T16320] bridge0: port 3(gretap0) entered forwarding state [ 403.097252][T16320] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.104306][T16320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.111554][T16320] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.118593][T16320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.619336][T16320] device bridge0 entered promiscuous mode [ 408.259915][T16589] device veth1_macvtap entered promiscuous mode [ 408.285875][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.152939][T16625] device wg2 entered promiscuous mode [ 410.517272][T16697] device syzkaller0 entered promiscuous mode [ 410.634041][T16695] device syzkaller0 left promiscuous mode [ 411.420775][T16717] device syzkaller0 entered promiscuous mode [ 415.240031][T16873] device syzkaller0 entered promiscuous mode [ 416.279019][T16918] device veth1_macvtap left promiscuous mode [ 416.887249][T16957] device syzkaller0 entered promiscuous mode [ 417.216440][T16961] device veth1_macvtap left promiscuous mode [ 417.225468][T16961] device macsec0 left promiscuous mode [ 417.377418][T16961] device veth1_macvtap entered promiscuous mode [ 417.402717][T16961] device macsec0 entered promiscuous mode [ 420.702292][T17109] device veth0_vlan left promiscuous mode [ 420.746593][T17109] device veth0_vlan entered promiscuous mode [ 420.890777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.899237][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 420.912483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 423.772356][T17202] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 423.781122][T17202] device syzkaller0 entered promiscuous mode [ 424.005079][T17217] syz.2.4768[17217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.005135][T17217] syz.2.4768[17217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.738662][T17251] device syzkaller0 entered promiscuous mode [ 425.461347][T17336] device syzkaller0 entered promiscuous mode [ 426.167458][T17402] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 426.182982][T17402] device syzkaller0 entered promiscuous mode [ 426.888167][T17453] device syzkaller0 entered promiscuous mode [ 427.073680][T17466] device syzkaller0 entered promiscuous mode [ 427.720806][T17514] : port 1(ip6gretap0) entered blocking state [ 427.732006][T17514] : port 1(ip6gretap0) entered disabled state [ 427.782754][T17514] device ip6gretap0 entered promiscuous mode [ 427.798353][T17510] device ip6gretap0 left promiscuous mode [ 427.846183][T17510] : port 1(ip6gretap0) entered disabled state [ 428.319539][T17535] device syzkaller0 entered promiscuous mode [ 429.055388][T17570] syz_tun: tun_chr_ioctl cmd 3221758986 [ 430.238027][ T24] audit: type=1400 audit(1773114387.210:173): avc: denied { create } for pid=17634 comm="syz.0.4897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 431.301123][T17651] ÿÿÿÿÿÿ: renamed from vlan1 [ 432.284376][T17692] device syzkaller0 entered promiscuous mode [ 433.718030][T17743] device veth1_macvtap entered promiscuous mode [ 433.732194][T17743] device macsec0 entered promiscuous mode [ 433.748111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 439.969831][T17950] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.997973][T17950] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.016545][T17950] device bridge_slave_0 entered promiscuous mode [ 440.084598][T17950] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.091648][T17950] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.222582][T17950] device bridge_slave_1 entered promiscuous mode [ 440.343758][T17950] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.350827][T17950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.358107][T17950] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.365147][T17950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.538085][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 440.545966][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.553410][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.585883][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 440.594277][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 440.601275][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 440.611503][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 440.620122][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 440.627149][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 440.634515][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 440.648782][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 440.657882][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 440.675370][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 440.683754][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 440.698450][T17950] device veth0_vlan entered promiscuous mode [ 440.706216][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 440.715736][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 440.734632][T17950] device veth1_macvtap entered promiscuous mode [ 440.741487][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 440.749517][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.758821][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 440.769092][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 440.779690][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 440.794426][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 440.802780][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 440.818227][T17996] device syzkaller0 entered promiscuous mode [ 440.826090][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 440.834509][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 440.843334][T17996] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 440.849164][T17996] syzkaller0: Linktype set failed because interface is up [ 440.897939][T17999] -: renamed from syzkaller0 [ 440.911069][T17999] device syzkaller0 entered promiscuous mode [ 441.192627][ T322] nr0: port 1(macsec0) entered disabled state [ 441.200371][ T322] device veth1_macvtap left promiscuous mode [ 441.206684][ T322] device veth0_vlan left promiscuous mode [ 441.494292][T18029] cgroup: fork rejected by pids controller in /syz0 [ 441.641580][T18034] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.648672][T18034] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.656471][T18034] device bridge_slave_0 entered promiscuous mode [ 441.666358][T18034] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.673405][T18034] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.680792][T18034] device bridge_slave_1 entered promiscuous mode [ 441.725738][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 441.733207][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 441.741823][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 441.750412][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 441.758698][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.765784][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 441.773634][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 441.784451][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 441.792780][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 441.800894][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.807930][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 441.820327][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 441.829824][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 441.843872][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 441.854744][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.862895][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.870259][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.878631][T18034] device veth0_vlan entered promiscuous mode [ 441.889049][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 441.898304][T18034] device veth1_macvtap entered promiscuous mode [ 441.908618][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 441.918800][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 443.217221][T18092] batadv0: tun_chr_ioctl cmd 1074025677 [ 443.223704][T18092] batadv0: linktype set to 775 [ 444.619095][T18139] device syzkaller0 entered promiscuous mode [ 445.141426][T18156] device syzkaller0 entered promiscuous mode [ 445.416766][T18171] device syzkaller0 entered promiscuous mode [ 445.596252][T18172] device syzkaller0 entered promiscuous mode [ 446.566677][T18223] device syzkaller0 entered promiscuous mode [ 447.998655][T18225] device syzkaller0 entered promiscuous mode [ 448.038378][T18257] IPv6: pim6reg1: Disabled Multicast RS [ 448.659075][T18290] device wg2 entered promiscuous mode [ 449.157697][T18295] nr0: port 1(macsec0) entered blocking state [ 449.166129][T18295] nr0: port 1(macsec0) entered disabled state [ 449.746664][T18319] device syzkaller0 entered promiscuous mode [ 452.579736][T18397] device syzkaller0 entered promiscuous mode [ 452.913255][T18405] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.920469][T18405] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.949726][T18407] device bridge_slave_1 left promiscuous mode [ 452.965776][T18407] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.996638][T18407] device bridge_slave_0 left promiscuous mode [ 453.037236][T18407] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.192100][T18485] device pim6reg1 entered promiscuous mode [ 454.319022][ T24] audit: type=1400 audit(1773114411.290:174): avc: denied { associate } for pid=18493 comm="syz.1.5139" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 454.811346][T18512] device syzkaller0 entered promiscuous mode [ 454.982218][T18524] tap0: tun_chr_ioctl cmd 1074025677 [ 455.043002][T18524] tap0: linktype set to 823 [ 457.125242][T18645] device syzkaller0 entered promiscuous mode [ 458.354922][T18710] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 458.722954][T18722] IPv6: pim6reg1: Disabled Multicast RS [ 459.449773][T18772] batadv0: tun_chr_ioctl cmd 2147767521 [ 459.610079][T18799] device syzkaller0 entered promiscuous mode [ 462.333781][T18908] device ip6gretap0 left promiscuous mode [ 462.344831][T18908] : port 1(ip6gretap0) entered disabled state [ 462.460436][T18913] device veth0_vlan left promiscuous mode [ 462.467948][T18913] device veth0_vlan entered promiscuous mode [ 462.476157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 462.486229][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 462.494145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿõ: link becomes ready [ 462.638278][T18926] device bond_slave_0 entered promiscuous mode [ 462.646923][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 462.662135][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 463.293615][T18982] device syzkaller0 entered promiscuous mode [ 463.495340][T19010] device syzkaller0 entered promiscuous mode [ 463.518813][T19010] device wg2 left promiscuous mode [ 464.552047][T19060] device veth0_vlan left promiscuous mode [ 464.611561][T19060] device veth0_vlan entered promiscuous mode [ 464.836768][T19077] FAULT_INJECTION: forcing a failure. [ 464.836768][T19077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 464.980090][T19077] CPU: 1 PID: 19077 Comm: syz.0.5313 Tainted: G W syzkaller #0 [ 464.988961][T19077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 464.999003][T19077] Call Trace: [ 465.002289][T19077] __dump_stack+0x21/0x24 [ 465.006616][T19077] dump_stack_lvl+0x1a7/0x208 [ 465.011278][T19077] ? thaw_kernel_threads+0x220/0x220 [ 465.016552][T19077] ? vsnprintf+0x189c/0x1990 [ 465.021217][T19077] ? show_regs_print_info+0x18/0x18 [ 465.026401][T19077] dump_stack+0x15/0x1c [ 465.030542][T19077] should_fail+0x3c1/0x510 [ 465.034958][T19077] should_fail_usercopy+0x1a/0x20 [ 465.039973][T19077] _copy_to_user+0x20/0x90 [ 465.044374][T19077] simple_read_from_buffer+0xe9/0x160 [ 465.049729][T19077] proc_fail_nth_read+0x1a6/0x220 [ 465.054736][T19077] ? proc_fault_inject_write+0x310/0x310 [ 465.060354][T19077] ? rw_verify_area+0x1c0/0x360 [ 465.065276][T19077] ? proc_fault_inject_write+0x310/0x310 [ 465.070897][T19077] vfs_read+0x209/0xa60 [ 465.075040][T19077] ? kernel_read+0x70/0x70 [ 465.079442][T19077] ? __kasan_check_write+0x14/0x20 [ 465.084535][T19077] ? mutex_lock+0x92/0xf0 [ 465.088848][T19077] ? mutex_trylock+0xa0/0xa0 [ 465.093423][T19077] ? __fget_files+0x2c4/0x320 [ 465.098086][T19077] ? __fdget_pos+0x2d2/0x380 [ 465.102660][T19077] ? ksys_read+0x71/0x250 [ 465.106979][T19077] ksys_read+0x149/0x250 [ 465.111210][T19077] ? vfs_write+0xdc0/0xdc0 [ 465.115608][T19077] ? ____fput+0x15/0x20 [ 465.119753][T19077] ? debug_smp_processor_id+0x17/0x20 [ 465.125113][T19077] __x64_sys_read+0x7b/0x90 [ 465.129604][T19077] do_syscall_64+0x31/0x40 [ 465.134005][T19077] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 465.139867][T19077] RIP: 0033:0x7f3e5f93dfce [ 465.144255][T19077] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 465.163830][T19077] RSP: 002b:00007f3e5e3d7fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 465.172217][T19077] RAX: ffffffffffffffda RBX: 00007f3e5e3d86c0 RCX: 00007f3e5f93dfce [ 465.180167][T19077] RDX: 000000000000000f RSI: 00007f3e5e3d80a0 RDI: 0000000000000008 [ 465.188111][T19077] RBP: 00007f3e5e3d8090 R08: 0000000000000000 R09: 0000000000000000 [ 465.196055][T19077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.203998][T19077] R13: 00007f3e5fbf7038 R14: 00007f3e5fbf6fa0 R15: 00007ffe5dc9f848 [ 466.567671][T19136] syz.3.5329[19136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.567722][T19136] syz.3.5329[19136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.510166][T19255] : port 1(syz_tun) entered blocking state [ 468.528610][T19255] : port 1(syz_tun) entered disabled state [ 468.538050][T19255] device syz_tun entered promiscuous mode [ 468.576249][T19260] device vlan0 entered promiscuous mode [ 469.569484][T19334] device syzkaller0 entered promiscuous mode [ 470.143075][T19398] ªªªªªª™™: renamed from vlan0 [ 470.455869][T19430] ÿÿÿÿÿÿ: renamed from vlan1 [ 472.081466][T19494] device syzkaller0 entered promiscuous mode [ 472.524026][T19517] device syzkaller0 entered promiscuous mode [ 474.384645][T19628] tap0: tun_chr_ioctl cmd 1074025692 [ 474.745694][T19644] device syzkaller0 entered promiscuous mode [ 475.245629][T19683] device pim6reg1 entered promiscuous mode [ 476.052081][T19728] device syzkaller0 entered promiscuous mode [ 476.438957][T19767] device syzkaller0 entered promiscuous mode [ 476.608546][T19771] device syzkaller0 entered promiscuous mode [ 476.695162][T19778] device syzkaller0 entered promiscuous mode [ 476.854447][T19781] device syzkaller0 left promiscuous mode [ 477.533913][T19806] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.541428][T19806] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.553808][T19806] device bridge_slave_0 entered promiscuous mode [ 477.560843][T19806] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.568351][T19806] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.576005][T19806] device bridge_slave_1 entered promiscuous mode [ 477.634703][T19828] device syzkaller0 entered promiscuous mode [ 477.685768][T19806] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.692841][T19806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.700073][T19806] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.707103][T19806] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.729385][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 477.737109][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.745013][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.781889][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 477.798831][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.805935][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 477.814917][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 477.823156][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.830207][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 477.837944][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 477.855355][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 477.871446][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 477.880341][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 477.889230][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 477.905209][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 477.913667][T19806] device veth0_vlan entered promiscuous mode [ 477.934195][T19842] device syzkaller0 entered promiscuous mode [ 477.946145][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 477.972835][T19806] device veth1_macvtap entered promiscuous mode [ 477.987638][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 477.998384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 478.007759][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 478.016285][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 478.097242][T19852] device syzkaller0 entered promiscuous mode [ 479.520284][T19965] device syzkaller0 entered promiscuous mode [ 479.734363][T19988] device syzkaller0 entered promiscuous mode [ 479.783553][T19969] device syzkaller0 entered promiscuous mode [ 480.554819][T20036] device syzkaller0 entered promiscuous mode [ 480.809867][T20049] device wg2 entered promiscuous mode [ 481.082609][T20088] device syzkaller0 entered promiscuous mode [ 481.094047][T20088] device syzkaller0 left promiscuous mode [ 481.545101][T20124] device syzkaller0 entered promiscuous mode [ 481.791963][T20133] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 481.919032][T20145] device syzkaller0 entered promiscuous mode [ 482.949328][T20189] device syzkaller0 entered promiscuous mode [ 483.000921][T20192] device wg2 entered promiscuous mode [ 483.299297][T20201] device aaaaaaaaaaaaaaa entered promiscuous mode [ 483.854829][T20259] device syzkaller0 entered promiscuous mode [ 488.157270][T20446] device dummy0 entered promiscuous mode [ 488.166824][T20446] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 489.329202][T20526] tap0: tun_chr_ioctl cmd 1074025677 [ 489.347755][T20526] tap0: linktype set to 6 [ 489.354601][T20528] veth0_vlan: mtu greater than device maximum [ 489.708137][T20551] device veth1_macvtap left promiscuous mode [ 491.503365][T20626] device syzkaller0 entered promiscuous mode [ 491.970176][T20658] device syzkaller0 entered promiscuous mode [ 492.226218][T20660] nr0: port 1(macsec0) entered blocking state [ 492.232379][T20660] nr0: port 1(macsec0) entered disabled state [ 492.238854][T20660] device macsec0 entered promiscuous mode [ 492.765906][T20718] device syzkaller0 entered promiscuous mode [ 494.365609][T20820] device syzkaller0 entered promiscuous mode [ 496.366363][T20897] tun0: tun_chr_ioctl cmd 1074025677 [ 496.371825][T20897] tun0: linktype set to 820 [ 497.139008][T20913] tun0: tun_chr_ioctl cmd 1074025677 [ 497.241513][T20913] tun0: linktype set to 804 [ 497.452421][T11294] device syz_tun left promiscuous mode [ 497.459527][T11294] : port 1(syz_tun) entered disabled state [ 497.621815][T20932] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.655118][T20932] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.663083][T20932] device bridge_slave_0 entered promiscuous mode [ 497.670690][T20932] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.681966][T20932] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.696112][T20932] device bridge_slave_1 entered promiscuous mode [ 497.898692][T20932] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.905777][T20932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.913078][T20932] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.920117][T20932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 497.960101][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 497.976815][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 497.995535][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.010837][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 498.033068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 498.046620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 498.059846][T20932] device veth0_vlan entered promiscuous mode [ 498.069291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 498.078090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 498.091610][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 498.126630][T20932] device veth1_macvtap entered promiscuous mode [ 498.165653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 498.189079][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 498.240176][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 498.292532][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 498.312332][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 498.348539][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 498.373570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 498.768015][ T112] device macsec0 left promiscuous mode [ 498.803931][ T112] nr0: port 1(macsec0) entered disabled state [ 498.881482][ T112] device bridge_slave_1 left promiscuous mode [ 498.927337][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.015613][ T112] device bridge_slave_0 left promiscuous mode [ 499.021766][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.074346][ T112] device veth1_macvtap left promiscuous mode [ 499.783347][T21071] sock: sock_set_timeout: `syz.2.5903' (pid 21071) tries to set negative timeout [ 499.893270][T21083] device syzkaller0 entered promiscuous mode [ 501.042639][T21134] IPv6: pim6reg1: Disabled Multicast RS [ 502.412746][T21222] tap0: tun_chr_ioctl cmd 1074025677 [ 502.418055][T21222] tap0: linktype set to 784 [ 502.506326][T21236] device syzkaller0 entered promiscuous mode [ 502.514105][T21237] tap0: tun_chr_ioctl cmd 2147767520 [ 503.460828][T21312] device syzkaller0 entered promiscuous mode [ 504.252131][T21350] ÿÿÿÿÿÿ: renamed from vlan1 [ 504.739218][ T24] audit: type=1400 audit(1773114461.710:175): avc: denied { create } for pid=21387 comm="syz.1.5992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 506.440951][T21518] device syzkaller0 entered promiscuous mode [ 509.391764][T21645] : port 1(ip6gretap0) entered blocking state [ 509.399171][T21645] : port 1(ip6gretap0) entered disabled state [ 509.444106][T21645] device ip6gretap0 entered promiscuous mode [ 509.452686][T21655] device ip6gretap0 left promiscuous mode [ 509.458604][T21655] : port 1(ip6gretap0) entered disabled state [ 509.499404][T21664] device syzkaller0 entered promiscuous mode [ 509.511489][T21666] device veth1_macvtap left promiscuous mode [ 509.521184][T21666] device macsec0 entered promiscuous mode [ 510.228642][T21712] device wg2 entered promiscuous mode [ 510.919158][T21738] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.926806][T21738] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.012302][T21745] device bridge_slave_1 left promiscuous mode [ 511.021449][T21745] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.036664][T21745] device bridge_slave_0 left promiscuous mode [ 511.051203][T21745] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.631615][T21804] device pim6reg1 entered promiscuous mode [ 511.653543][T21802] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.660683][T21802] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.671110][T21802] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.678180][T21802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.685457][T21802] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.692584][T21802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.700003][T21802] device bridge0 entered promiscuous mode [ 516.656807][T21998] device aaaaaaaaaaaaaaa entered promiscuous mode [ 516.900778][ T24] audit: type=1400 audit(1773114473.870:176): avc: denied { create } for pid=22021 comm="syz.4.6184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 519.511049][T22138] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.924991][T22143] device wg2 left promiscuous mode [ 521.873244][T22204] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 521.897601][T22204] device syzkaller0 entered promiscuous mode [ 522.585676][T22221] device veth1_macvtap entered promiscuous mode [ 522.894108][T22256] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 523.192575][T22265] -1: renamed from syzkaller0 [ 524.149471][T22323] tap0: tun_chr_ioctl cmd 1074025675 [ 524.172183][T22323] tap0: persist enabled [ 524.184140][T22323] tap0: tun_chr_ioctl cmd 1074025675 [ 524.232008][T22323] tap0: persist enabled [ 524.267153][T22323] tap0: tun_chr_ioctl cmd 1074025698 [ 524.879539][T22345] device syzkaller0 entered promiscuous mode [ 525.076711][T22350] ÿÿÿÿÿÿ: renamed from vlan1 [ 525.301471][T22367] tun0: tun_chr_ioctl cmd 1074025677 [ 525.328820][T22367] tun0: linktype set to 820 [ 525.495486][T22393] nr0: port 1(macsec0) entered blocking state [ 525.511985][T22393] nr0: port 1(macsec0) entered disabled state [ 526.002550][T22435] device wg2 left promiscuous mode [ 526.089392][T22435] device wg2 entered promiscuous mode [ 528.801534][T22480] device syzkaller0 entered promiscuous mode [ 529.492532][T22556] device syzkaller0 entered promiscuous mode [ 529.878626][T22573] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 533.730101][T22727] device syzkaller0 entered promiscuous mode [ 540.892706][T22899] device syzkaller0 entered promiscuous mode [ 541.614952][T22935] device wg2 left promiscuous mode [ 541.774091][T22939] device wg2 entered promiscuous mode [ 543.409740][T22955] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.813124][T22956] device syzkaller0 entered promiscuous mode [ 544.953080][T23011] device veth0_vlan left promiscuous mode [ 545.030538][T23011] device veth0_vlan entered promiscuous mode [ 546.410358][T23052] device pim6reg1 left promiscuous mode [ 546.925325][T23066] @0Ù: renamed from bond_slave_1 [ 548.167206][T23105] syzkaller0: refused to change device tx_queue_len [ 552.318291][T23248] device sit0 entered promiscuous mode [ 554.093240][T23295] device syzkaller0 entered promiscuous mode [ 554.575043][T23345] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.582271][T23345] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.661928][T23339] device bridge_slave_1 left promiscuous mode [ 554.688711][T23339] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.850605][T23339] device bridge_slave_0 left promiscuous mode [ 554.882845][T23339] bridge0: port 1(bridge_slave_0) entered disabled state [ 555.402267][T23359] tap0: tun_chr_ioctl cmd 1074812118 [ 555.407881][T23361] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 555.421490][T23361] device syzkaller0 entered promiscuous mode [ 562.211418][T23608] device syzkaller0 entered promiscuous mode [ 562.964634][ T24] audit: type=1400 audit(1773114519.940:177): avc: denied { create } for pid=23634 comm="syz.4.6650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 563.027753][T23632] device syzkaller0 entered promiscuous mode [ 563.135958][T23635] device syzkaller0 entered promiscuous mode [ 563.655406][T23648] device syzkaller0 entered promiscuous mode [ 563.974910][T23668] device syzkaller0 entered promiscuous mode [ 564.746512][T23696] device syzkaller0 entered promiscuous mode [ 566.588268][T23769] device syzkaller0 entered promiscuous mode [ 566.778661][T23800] device syzkaller0 entered promiscuous mode [ 566.795845][T23800] syzkaller0: create flow: hash 3545054198 index 2 [ 566.805997][T23800] syzkaller0: delete flow: hash 3545054198 index 2 [ 567.285632][T23830] device syzkaller0 entered promiscuous mode [ 567.599488][T23851] device syzkaller0 entered promiscuous mode [ 567.623718][T23851] syzkaller0: create flow: hash 3545054198 index 2 [ 567.634913][T23851] syzkaller0: delete flow: hash 3545054198 index 2 [ 568.946659][T23906] lo: mtu less than device minimum [ 569.187810][T23929] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.197707][T23929] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.272456][T23929] device bridge0 left promiscuous mode [ 569.314299][T23932] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.321331][T23932] bridge0: port 2(bridge_slave_1) entered forwarding state [ 569.328602][T23932] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.335806][T23932] bridge0: port 1(bridge_slave_0) entered forwarding state [ 569.346373][T23932] device bridge0 entered promiscuous mode [ 569.464367][T23945] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 569.582892][T23938] device syzkaller0 entered promiscuous mode [ 569.594608][T23938] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 569.801283][T23980] device syzkaller0 entered promiscuous mode [ 570.255559][T24019] device wg2 left promiscuous mode [ 570.265592][T24018] device wg2 entered promiscuous mode [ 571.367551][T24053] device syzkaller0 entered promiscuous mode [ 573.205443][T24108] device syzkaller0 entered promiscuous mode [ 574.842524][T24159] FAULT_INJECTION: forcing a failure. [ 574.842524][T24159] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.876033][T24159] CPU: 0 PID: 24159 Comm: syz.4.6810 Tainted: G W syzkaller #0 [ 574.885065][T24159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 574.895098][T24159] Call Trace: [ 574.895204][T24148] device syzkaller0 entered promiscuous mode [ 574.898390][T24159] __dump_stack+0x21/0x24 [ 574.908642][T24159] dump_stack_lvl+0x1a7/0x208 [ 574.913315][T24159] ? show_regs_print_info+0x18/0x18 [ 574.918510][T24159] dump_stack+0x15/0x1c [ 574.922648][T24159] should_fail+0x3c1/0x510 [ 574.927038][T24159] should_fail_usercopy+0x1a/0x20 [ 574.932042][T24159] _copy_from_user+0x20/0xd0 [ 574.936717][T24159] sock_ioctl+0x678/0x760 [ 574.941036][T24159] ? sock_poll+0x350/0x350 [ 574.945437][T24159] ? __fget_files+0x2c4/0x320 [ 574.950103][T24159] ? security_file_ioctl+0x84/0xa0 [ 574.955199][T24159] ? sock_poll+0x350/0x350 [ 574.959602][T24159] __se_sys_ioctl+0x121/0x1a0 [ 574.964272][T24159] __x64_sys_ioctl+0x7b/0x90 [ 574.968852][T24159] do_syscall_64+0x31/0x40 [ 574.973258][T24159] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 574.979144][T24159] RIP: 0033:0x7f0f14a75799 [ 574.983548][T24159] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 575.003141][T24159] RSP: 002b:00007f0f134af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 575.011532][T24159] RAX: ffffffffffffffda RBX: 00007f0f14cef090 RCX: 00007f0f14a75799 [ 575.019474][T24159] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 575.027417][T24159] RBP: 00007f0f134af090 R08: 0000000000000000 R09: 0000000000000000 [ 575.035365][T24159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 575.043309][T24159] R13: 00007f0f14cef128 R14: 00007f0f14cef090 R15: 00007ffde95ece08 [ 575.062758][T24158] device wg2 left promiscuous mode [ 575.225812][T24189] device syzkaller0 entered promiscuous mode [ 575.252686][T24194] FAULT_INJECTION: forcing a failure. [ 575.252686][T24194] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 575.265886][T24194] CPU: 0 PID: 24194 Comm: syz.4.6821 Tainted: G W syzkaller #0 [ 575.274707][T24194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 575.284760][T24194] Call Trace: [ 575.288028][T24194] __dump_stack+0x21/0x24 [ 575.292332][T24194] dump_stack_lvl+0x1a7/0x208 [ 575.296979][T24194] ? show_regs_print_info+0x18/0x18 [ 575.302145][T24194] dump_stack+0x15/0x1c [ 575.306271][T24194] should_fail+0x3c1/0x510 [ 575.310656][T24194] should_fail_usercopy+0x1a/0x20 [ 575.315682][T24194] _copy_from_user+0x20/0xd0 [ 575.320244][T24194] ip_tunnel_ioctl+0xda/0x230 [ 575.324890][T24194] ? ip_tunnel_update+0xca0/0xca0 [ 575.329883][T24194] ? do_vfs_ioctl+0x1302/0x14c0 [ 575.334701][T24194] ? full_name_hash+0xa0/0xf0 [ 575.339346][T24194] dev_ifsioc+0x6b4/0xa90 [ 575.343644][T24194] ? dev_ioctl+0xb80/0xb80 [ 575.348037][T24194] dev_ioctl+0x5ea/0xb80 [ 575.352259][T24194] sock_ioctl+0x6ce/0x760 [ 575.356570][T24194] ? sock_poll+0x350/0x350 [ 575.360961][T24194] ? __fget_files+0x2c4/0x320 [ 575.365608][T24194] ? security_file_ioctl+0x84/0xa0 [ 575.370688][T24194] ? sock_poll+0x350/0x350 [ 575.375074][T24194] __se_sys_ioctl+0x121/0x1a0 [ 575.379720][T24194] __x64_sys_ioctl+0x7b/0x90 [ 575.384285][T24194] do_syscall_64+0x31/0x40 [ 575.388675][T24194] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 575.394533][T24194] RIP: 0033:0x7f0f14a75799 [ 575.398915][T24194] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 575.418492][T24194] RSP: 002b:00007f0f134d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 575.426877][T24194] RAX: ffffffffffffffda RBX: 00007f0f14ceefa0 RCX: 00007f0f14a75799 [ 575.434830][T24194] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 575.442899][T24194] RBP: 00007f0f134d0090 R08: 0000000000000000 R09: 0000000000000000 [ 575.450860][T24194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 575.458811][T24194] R13: 00007f0f14cef038 R14: 00007f0f14ceefa0 R15: 00007ffde95ece08 [ 576.441328][T24227] device syzkaller0 entered promiscuous mode [ 577.119270][T24232] device syzkaller0 entered promiscuous mode [ 577.298847][T24237] FAULT_INJECTION: forcing a failure. [ 577.298847][T24237] name failslab, interval 1, probability 0, space 0, times 1 [ 577.321720][T24237] CPU: 1 PID: 24237 Comm: syz.4.6832 Tainted: G W syzkaller #0 [ 577.330592][T24237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 577.340644][T24237] Call Trace: [ 577.343931][T24237] __dump_stack+0x21/0x24 [ 577.348257][T24237] dump_stack_lvl+0x1a7/0x208 [ 577.353020][T24237] ? thaw_kernel_threads+0x220/0x220 [ 577.358297][T24237] ? fib6_clean_all+0x22d/0x290 [ 577.363142][T24237] ? show_regs_print_info+0x18/0x18 [ 577.368416][T24237] ? rt6_sync_up+0x160/0x160 [ 577.372997][T24237] ? fib6_del+0xfa0/0xfa0 [ 577.377320][T24237] dump_stack+0x15/0x1c [ 577.381459][T24237] should_fail+0x3c1/0x510 [ 577.385872][T24237] ? __alloc_skb+0x9e/0x520 [ 577.390370][T24237] __should_failslab+0xa4/0xe0 [ 577.395158][T24237] should_failslab+0x9/0x20 [ 577.399661][T24237] kmem_cache_alloc+0x3d/0x2d0 [ 577.404422][T24237] __alloc_skb+0x9e/0x520 [ 577.408765][T24237] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 577.414052][T24237] rtmsg_ifinfo+0x7a/0x130 [ 577.418477][T24237] netdev_state_change+0x190/0x230 [ 577.423581][T24237] ? netdev_features_change+0x190/0x190 [ 577.429120][T24237] ? perf_sched_cb_inc+0x240/0x240 [ 577.434225][T24237] ? _raw_spin_unlock_irq+0x4e/0x70 [ 577.439412][T24237] ip_tunnel_update+0x7bf/0xca0 [ 577.444261][T24237] ip_tunnel_ctl+0x11ac/0x1990 [ 577.449039][T24237] ipgre_tunnel_ctl+0x2a1/0x790 [ 577.453885][T24237] ip_tunnel_ioctl+0x158/0x230 [ 577.458636][T24237] ? ip_tunnel_update+0xca0/0xca0 [ 577.463653][T24237] ? do_vfs_ioctl+0x1302/0x14c0 [ 577.468496][T24237] ? full_name_hash+0xa0/0xf0 [ 577.473168][T24237] dev_ifsioc+0x6b4/0xa90 [ 577.477492][T24237] ? dev_ioctl+0xb80/0xb80 [ 577.481904][T24237] dev_ioctl+0x5ea/0xb80 [ 577.486140][T24237] sock_ioctl+0x6ce/0x760 [ 577.490630][T24237] ? sock_poll+0x350/0x350 [ 577.495018][T24237] ? __fget_files+0x2c4/0x320 [ 577.499702][T24237] ? security_file_ioctl+0x84/0xa0 [ 577.504832][T24237] ? sock_poll+0x350/0x350 [ 577.509216][T24237] __se_sys_ioctl+0x121/0x1a0 [ 577.513869][T24237] __x64_sys_ioctl+0x7b/0x90 [ 577.518427][T24237] do_syscall_64+0x31/0x40 [ 577.522818][T24237] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 577.528680][T24237] RIP: 0033:0x7f0f14a75799 [ 577.533069][T24237] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 577.552646][T24237] RSP: 002b:00007f0f134af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 577.561030][T24237] RAX: ffffffffffffffda RBX: 00007f0f14cef090 RCX: 00007f0f14a75799 [ 577.568993][T24237] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 577.576940][T24237] RBP: 00007f0f134af090 R08: 0000000000000000 R09: 0000000000000000 [ 577.584884][T24237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 577.592828][T24237] R13: 00007f0f14cef128 R14: 00007f0f14cef090 R15: 00007ffde95ece08 [ 577.875693][T24279] FAULT_INJECTION: forcing a failure. [ 577.875693][T24279] name failslab, interval 1, probability 0, space 0, times 0 [ 577.888450][T24279] CPU: 0 PID: 24279 Comm: syz.1.6844 Tainted: G W syzkaller #0 [ 577.897282][T24279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 577.907323][T24279] Call Trace: [ 577.910600][T24279] __dump_stack+0x21/0x24 [ 577.914916][T24279] dump_stack_lvl+0x1a7/0x208 [ 577.919589][T24279] ? show_regs_print_info+0x18/0x18 [ 577.924781][T24279] dump_stack+0x15/0x1c [ 577.928924][T24279] should_fail+0x3c1/0x510 [ 577.933331][T24279] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 577.938778][T24279] __should_failslab+0xa4/0xe0 [ 577.943527][T24279] should_failslab+0x9/0x20 [ 577.948020][T24279] __kmalloc_track_caller+0x5f/0x320 [ 577.953291][T24279] ? kmem_cache_alloc+0x162/0x2d0 [ 577.958300][T24279] ? __alloc_skb+0x9e/0x520 [ 577.962791][T24279] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 577.968236][T24279] __alloc_skb+0xdc/0x520 [ 577.972551][T24279] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 577.977822][T24279] rtmsg_ifinfo+0x7a/0x130 [ 577.982225][T24279] netdev_state_change+0x190/0x230 [ 577.987320][T24279] ? netdev_features_change+0x190/0x190 [ 577.992852][T24279] ? avc_has_extended_perms+0x802/0xca0 [ 577.998387][T24279] ip_tunnel_update+0x7bf/0xca0 [ 578.003227][T24279] ip_tunnel_ctl+0x11ac/0x1990 [ 578.007983][T24279] ipgre_tunnel_ctl+0x2a1/0x790 [ 578.012820][T24279] ip_tunnel_ioctl+0x158/0x230 [ 578.017572][T24279] ? ip_tunnel_update+0xca0/0xca0 [ 578.022583][T24279] ? do_vfs_ioctl+0x1302/0x14c0 [ 578.027424][T24279] ? full_name_hash+0xa0/0xf0 [ 578.032085][T24279] dev_ifsioc+0x6b4/0xa90 [ 578.036407][T24279] ? dev_ioctl+0xb80/0xb80 [ 578.040810][T24279] dev_ioctl+0x5ea/0xb80 [ 578.045039][T24279] sock_ioctl+0x6ce/0x760 [ 578.049354][T24279] ? sock_poll+0x350/0x350 [ 578.053772][T24279] ? __fget_files+0x2c4/0x320 [ 578.058441][T24279] ? security_file_ioctl+0x84/0xa0 [ 578.063539][T24279] ? sock_poll+0x350/0x350 [ 578.067937][T24279] __se_sys_ioctl+0x121/0x1a0 [ 578.072601][T24279] __x64_sys_ioctl+0x7b/0x90 [ 578.077186][T24279] do_syscall_64+0x31/0x40 [ 578.081723][T24279] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 578.087608][T24279] RIP: 0033:0x7fc38582b799 [ 578.092021][T24279] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 578.111733][T24279] RSP: 002b:00007fc384286028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 578.120307][T24279] RAX: ffffffffffffffda RBX: 00007fc385aa4fa0 RCX: 00007fc38582b799 [ 578.128280][T24279] RDX: 0000200000000080 RSI: 00000000000089f3 RDI: 0000000000000004 [ 578.136247][T24279] RBP: 00007fc384286090 R08: 0000000000000000 R09: 0000000000000000 [ 578.144208][T24279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.152184][T24279] R13: 00007fc385aa5038 R14: 00007fc385aa4fa0 R15: 00007ffe558eb5a8 [ 578.450473][T24300] tap0: tun_chr_ioctl cmd 1074025675 [ 578.456649][T24300] tap0: persist enabled [ 578.833434][T24315] device wg2 left promiscuous mode [ 578.964983][T24315] device wg2 entered promiscuous mode [ 579.179935][T24332] device syzkaller0 entered promiscuous mode [ 581.566778][T24427] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 581.959709][T24427] syzkaller0: linktype set to 773 [ 583.554421][T24459] device veth1_macvtap left promiscuous mode [ 583.735407][T24461] device veth1_macvtap entered promiscuous mode [ 583.742053][T24461] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 583.753659][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 583.854519][T24472] device syzkaller0 entered promiscuous mode [ 584.841416][T24505] device syzkaller0 entered promiscuous mode [ 584.894221][T24502] device syzkaller0 entered promiscuous mode [ 585.546731][T24535] sock: sock_set_timeout: `syz.4.6917' (pid 24535) tries to set negative timeout [ 585.847307][T24541] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 586.423110][T24589] device syzkaller0 entered promiscuous mode [ 588.252118][T24681] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 588.290344][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 588.355367][T24686] device syzkaller0 entered promiscuous mode [ 588.913811][T24736] batadv0: tun_chr_ioctl cmd 2148553947 [ 589.188592][T24759] syz.2.6987[24759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.696692][T24847] bridge0: port 1(bridge_slave_0) entered blocking state [ 591.739389][T24847] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.756591][T24847] device bridge_slave_0 entered promiscuous mode [ 591.772568][T24847] bridge0: port 2(bridge_slave_1) entered blocking state [ 591.787829][T24847] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.802409][T24847] device bridge_slave_1 entered promiscuous mode [ 592.873791][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 592.919740][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 593.009918][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 593.081844][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 593.097992][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.105073][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 593.118241][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 593.154364][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 593.162768][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 593.171000][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.178049][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 593.304270][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 593.381102][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 593.436200][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 593.572841][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 593.605946][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 593.632806][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 593.652932][T24847] device veth0_vlan entered promiscuous mode [ 593.691418][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 593.700427][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 593.708863][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 593.722246][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 593.756095][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 593.774078][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 593.790242][T24911] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 593.803772][T24847] device veth1_macvtap entered promiscuous mode [ 593.830368][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 593.838571][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 593.850221][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 593.869918][T24923] device syzkaller0 entered promiscuous mode [ 593.882582][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 593.891109][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 594.044608][ T9] nr0: port 1(macsec0) entered disabled state [ 594.088025][ T9] device bridge_slave_1 left promiscuous mode [ 594.113156][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.183855][ T9] device bridge_slave_0 left promiscuous mode [ 594.190005][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.296849][ T9] device veth1_macvtap left promiscuous mode [ 594.912576][T24949] device syzkaller0 entered promiscuous mode [ 595.093046][T24943] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.100138][T24943] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.108685][T24943] device bridge_slave_0 entered promiscuous mode [ 595.116722][T24943] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.124038][T24943] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.131301][T24943] device bridge_slave_1 entered promiscuous mode [ 595.183757][T24943] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.190795][T24943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.198064][T24943] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.205096][T24943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.229390][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 595.237392][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.244873][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.271871][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.289461][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.296539][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.317003][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 595.325348][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.332398][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.339762][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 595.351517][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 595.430140][T24943] device veth0_vlan entered promiscuous mode [ 595.437081][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 595.445922][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 595.454122][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 595.461566][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 595.476678][T24943] device veth1_macvtap entered promiscuous mode [ 595.494367][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 595.660711][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 595.670232][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 596.287641][T25004] -: renamed from syzkaller0 [ 596.747598][ T9] device macsec0 left promiscuous mode [ 596.753271][ T9] nr0: port 1(macsec0) entered disabled state [ 596.795496][ T9] device bridge_slave_1 left promiscuous mode [ 596.801816][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.860651][ T9] device bridge_slave_0 left promiscuous mode [ 596.888336][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.459762][T25068] device syzkaller0 entered promiscuous mode [ 599.341230][T25159] device sit0 entered promiscuous mode [ 599.528854][T25164] device wg2 entered promiscuous mode [ 599.627523][T25174] tap0: tun_chr_ioctl cmd 1074025675 [ 599.634993][T25174] tap0: persist enabled [ 599.743705][T25159] tap0: tun_chr_ioctl cmd 1074025675 [ 599.751654][T25159] tap0: persist enabled [ 600.169851][T25201] device veth1_macvtap left promiscuous mode [ 600.186961][T25205] device veth1_macvtap entered promiscuous mode [ 600.193545][T25205] device macsec0 entered promiscuous mode [ 600.202244][T25205] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 600.342923][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 601.096941][T25231] device syzkaller0 entered promiscuous mode [ 604.834508][T25280] device veth0_vlan left promiscuous mode [ 604.844785][T25280] device veth0_vlan entered promiscuous mode [ 608.621333][T25354] device wg2 left promiscuous mode [ 609.007799][T25356] device wg2 entered promiscuous mode [ 609.130803][T25362] device syzkaller0 entered promiscuous mode [ 610.773648][T25392] device syzkaller0 entered promiscuous mode [ 612.410725][T25444] ³þ: renamed from bond_slave_0 [ 612.602990][T25455] device team_slave_1 entered promiscuous mode [ 612.609587][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 612.628505][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 612.699810][T25455] cgroup: fork rejected by pids controller in /syz4 [ 614.034931][T25483] device veth1_macvtap left promiscuous mode [ 614.361978][T25483] device veth1_macvtap entered promiscuous mode [ 614.368269][T25483] device macsec0 entered promiscuous mode [ 614.437787][T25476] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.480092][T25476] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.524864][T25476] device bridge_slave_0 entered promiscuous mode [ 614.532763][T25487] device aaaaaaaaaaaaaaa entered promiscuous mode [ 614.566097][ T9] device veth1_macvtap left promiscuous mode [ 614.763569][T25476] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.770709][T25476] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.778325][T25476] device bridge_slave_1 entered promiscuous mode [ 614.973490][T25523] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 614.981413][T25523] device syzkaller0 entered promiscuous mode [ 615.089734][T25522] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.104720][T25522] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.282750][T25526] device bridge_slave_1 left promiscuous mode [ 615.290092][T25526] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.300637][T25526] device bridge_slave_0 left promiscuous mode [ 615.316820][T25526] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.508211][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 615.555657][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 615.588139][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 615.602573][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.630893][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.637973][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.646692][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 615.656336][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 615.673769][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 615.688878][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.695953][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.741436][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 615.753670][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 615.763408][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 615.776201][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 615.811317][T25476] device veth0_vlan entered promiscuous mode [ 615.818085][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 615.828034][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 615.837276][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 615.845784][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 615.854322][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 615.902736][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 615.952110][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 616.042474][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 616.063565][T25476] device veth1_macvtap entered promiscuous mode [ 616.091488][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 616.101201][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 616.118088][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 616.196363][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 616.313903][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 616.542057][T25587] device syzkaller0 entered promiscuous mode [ 617.214164][T25622] device syzkaller0 entered promiscuous mode [ 617.479571][T25636] device syzkaller0 entered promiscuous mode [ 619.152705][T25735] device syzkaller0 entered promiscuous mode [ 619.698216][T25740] ÿÿÿÿÿÿ: renamed from vlan1 [ 621.354007][T25856] device syzkaller0 entered promiscuous mode [ 621.977375][T25869] device syzkaller0 entered promiscuous mode [ 622.417589][T25880] device syzkaller0 entered promiscuous mode [ 622.910723][T25904] device veth0_vlan left promiscuous mode [ 622.924275][T25904] device veth0_vlan entered promiscuous mode [ 623.292993][T25921] device syzkaller0 entered promiscuous mode [ 623.995122][T25939] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 624.006855][T25939] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 624.015258][T25939] CPU: 0 PID: 25939 Comm: syz.2.7330 Tainted: G W syzkaller #0 [ 624.024091][T25939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 624.034151][T25939] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 624.040111][T25939] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 624.059704][T25939] RSP: 0018:ffffc9000144f400 EFLAGS: 00010202 [ 624.065753][T25939] RAX: 0000000000000004 RBX: 1ffff1102331cd79 RCX: 0000000000080000 [ 624.073704][T25939] RDX: ffffc9000a2b0000 RSI: 0000000000000904 RDI: 0000000000000905 [ 624.081656][T25939] RBP: ffffc9000144f500 R08: ffff88811bb5a780 R09: 0000000000000004 [ 624.089601][T25939] R10: 0000000000000078 R11: 0000000000000002 R12: 000000001bb5a780 [ 624.097547][T25939] R13: 0000000000000020 R14: 1ffff92000289e88 R15: dffffc0000000000 [ 624.105506][T25939] FS: 00007f9731d006c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 624.114405][T25939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 624.120969][T25939] CR2: 000020000001b000 CR3: 00000001212bd000 CR4: 00000000003506b0 [ 624.128919][T25939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 624.136864][T25939] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 624.144809][T25939] Call Trace: [ 624.148080][T25939] ? sched_clock_cpu+0x1b/0x3d0 [ 624.152909][T25939] ? perf_pending_event+0x560/0x560 [ 624.158083][T25939] ? __this_cpu_preempt_check+0x13/0x20 [ 624.163610][T25939] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 624.169837][T25939] __perf_event_overflow+0x1b3/0x340 [ 624.175097][T25939] perf_swevent_event+0x2f7/0x530 [ 624.180100][T25939] ___perf_sw_event+0x3aa/0x4d0 [ 624.184926][T25939] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 624.191326][T25939] ? __irq_exit_rcu+0x40/0x150 [ 624.196066][T25939] ? irq_exit_rcu+0x9/0x10 [ 624.200457][T25939] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 624.206236][T25939] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 624.212364][T25939] __perf_sw_event+0x134/0x270 [ 624.217102][T25939] do_user_addr_fault+0xc76/0xc90 [ 624.222101][T25939] ? sched_clock+0x3a/0x40 [ 624.226580][T25939] ? do_kern_addr_fault+0x80/0x80 [ 624.231581][T25939] ? __alloc_pages_nodemask+0x620/0x620 [ 624.237101][T25939] ? __irq_exit_rcu+0x40/0x150 [ 624.241839][T25939] exc_page_fault+0x5a/0xc0 [ 624.246318][T25939] asm_exc_page_fault+0x1e/0x30 [ 624.251152][T25939] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 624.257740][T25939] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 624.277321][T25939] RSP: 0018:ffffc9000144fa20 EFLAGS: 00050206 [ 624.283360][T25939] RAX: ffffffff823cf701 RBX: 0000000000001000 RCX: 00000000000001c0 [ 624.291308][T25939] RDX: 0000000000001000 RSI: 000020000001b000 RDI: ffff88813950be40 [ 624.299261][T25939] RBP: ffffc9000144fab0 R08: ffff88813950bfff R09: 1ffff110272a17ff [ 624.307213][T25939] R10: dffffc0000000000 R11: ffffed10272a1800 R12: 0000000000001000 [ 624.315162][T25939] R13: dffffc00000000ff R14: 000020000001a1c0 R15: ffff88813950b000 [ 624.323125][T25939] ? copy_page_from_iter+0x331/0x6c0 [ 624.328389][T25939] ? copy_page_from_iter+0x3fa/0x6c0 [ 624.333650][T25939] pipe_write+0x912/0x18b0 [ 624.338042][T25939] ? sched_clock+0x3a/0x40 [ 624.342441][T25939] ? pipe_write+0xde1/0x18b0 [ 624.347005][T25939] ? pipe_write+0xde1/0x18b0 [ 624.351578][T25939] ? pipe_read+0x1010/0x1010 [ 624.356141][T25939] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 624.362279][T25939] vfs_write+0x758/0xdc0 [ 624.366497][T25939] ? kernel_write+0x3c0/0x3c0 [ 624.371184][T25939] ? __fget_files+0x2c4/0x320 [ 624.375971][T25939] ? __fdget_pos+0x1f7/0x380 [ 624.380547][T25939] ? ksys_write+0x71/0x250 [ 624.384953][T25939] ksys_write+0x149/0x250 [ 624.389261][T25939] ? __ia32_sys_read+0x90/0x90 [ 624.394005][T25939] __x64_sys_write+0x7b/0x90 [ 624.398574][T25939] do_syscall_64+0x31/0x40 [ 624.402971][T25939] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 624.408838][T25939] RIP: 0033:0x7f97332a5799 [ 624.413246][T25939] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 624.432848][T25939] RSP: 002b:00007f9731d00028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 624.441246][T25939] RAX: ffffffffffffffda RBX: 00007f973351efa0 RCX: 00007f97332a5799 [ 624.449197][T25939] RDX: 00000000fffffdef RSI: 00002000000001c0 RDI: 0000000000000000 [ 624.457150][T25939] RBP: 00007f973333bbd9 R08: 0000000000000000 R09: 0000000000000000 [ 624.465107][T25939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 624.473055][T25939] R13: 00007f973351f038 R14: 00007f973351efa0 R15: 00007ffffe0d0808 [ 624.481022][T25939] Modules linked in: [ 624.486585][T25939] ---[ end trace cef367d00668a7d1 ]--- [ 624.492277][T25939] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 624.498308][T25939] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 624.518078][T25939] RSP: 0018:ffffc9000144f400 EFLAGS: 00010202 [ 624.524233][T25939] RAX: 0000000000000004 RBX: 1ffff1102331cd79 RCX: 0000000000080000 [ 624.532259][T25939] RDX: ffffc9000a2b0000 RSI: 0000000000000904 RDI: 0000000000000905 [ 624.537691][ T24] audit: type=1400 audit(1773114581.510:178): avc: denied { read } for pid=76 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 624.540457][T25939] RBP: ffffc9000144f500 R08: ffff88811bb5a780 R09: 0000000000000004 [ 624.564195][ T24] audit: type=1400 audit(1773114581.510:179): avc: denied { search } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 624.570118][T25939] R10: 0000000000000078 R11: 0000000000000002 R12: 000000001bb5a780 [ 624.591541][ T24] audit: type=1400 audit(1773114581.510:180): avc: denied { write } for pid=76 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 624.599534][T25939] R13: 0000000000000020 R14: 1ffff92000289e88 R15: dffffc0000000000 [ 624.620846][ T24] audit: type=1400 audit(1773114581.510:181): avc: denied { add_name } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 624.629737][T25939] FS: 00007f9731d006c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 624.658928][T25939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 624.659320][ T24] audit: type=1400 audit(1773114581.510:182): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 624.665580][T25939] CR2: 000020000001b000 CR3: 00000001212bd000 CR4: 00000000003506b0 [ 624.691912][ T24] audit: type=1400 audit(1773114581.510:183): avc: denied { append open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 624.694084][T25939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 624.721913][ T24] audit: type=1400 audit(1773114581.510:184): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 624.725615][T25939] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 624.755567][T25939] Kernel panic - not syncing: Fatal exception [ 624.761914][T25939] Kernel Offset: disabled [ 624.766229][T25939] Rebooting in 86400 seconds..