last executing test programs: 1m15.740335103s ago: executing program 0 (id=7841): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x5, 0x2, 0xb4, 0x7f}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x3, 0x3800, 0x7, 0x11}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x61, 0x0, 0x0, 0x64}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x5}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, &(0x7f00000001c0)="1839970c19441dd1dfd7fbd12910949077afca6175a98e8421727bb66e6f04d28b515f7e5aaee31d349b45b4911c8ed6e97235ad062665b563c9fa38b90739f71d9b3b0354eac0bdbd4376d3ab3c224740cd335bc57750b229735ca572c2612e37130faf9430f2826ceedaf2f7d27145816a9a5134c63a0ca4770886d2db04429e17a40411fdc5f6f92891e4d07f41327a09ab58d9677feb7c9ea6d49517f6c920319c41d32e24f44ad2c9628448dfb499ceb46f7a601e124db42336165590e2673258b5d8e4", &(0x7f0000000700)=""/4096, 0x4}, 0x20) 1m15.716879574s ago: executing program 0 (id=7842): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x2f, 0xe8034000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x5dc}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a80)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000003ec0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=[{0x10}, {0x408, 0x1, 0x1, "31e0319fff450f6d5e86e59f0fb6ee41bc288d978d65fbcc667a0ce68f2987694b219f386f93dce6172e2413530b5c6f8b654b91158dc922c40bd13eda4b1c253772e2cdad6c61a9a255d69bb34c4a9b6948c011439b0c589054b81566c45ef4a32f1e49f1156fa77f42ae96ce6d737f69c3087ef0595edfcf072c998df97d6f5b1011f759ae5f88383842972c08aba8821498cf7d8f9e4b42ba150cacaa94cffd02e33efc4e755f2f10693f31d27971e5b0e5178552b10b5ac62bcf8e722ec9facb1596b21da4b40c2e2a5c51462135ad5646f7408e3ca8dac1115335eb9058f62303ce0243d73d9762b8d9fbdefea850b69ca5bc990ac62029b1507e50dc02e3c1655752584dfc48e7511baae257264cdbc6580029ad51af1d7e641c46ac82e3cc446bab3007cc3ad8880a60d2dba7c9f204cde20d8d977c0cd19ac749b1cc96f277c12f0e8ab6e935a227b571fc6f88358c23b7af1013cd73aaea5bc0f6c73ffa85406c37bf38154216d5750f3348bf0eff287e07ae548e8b0662d4447100d7699929d3424e1ee95fd3f87fe81d19fb4c171a533657967e6e95d676ad5b5bc17bc19b7b1a2c75e844597247eded56e952055779bb995f467b08b498a7e8ecb06775a480cbed877cabf55615230000d1d1a8c5603074221e021c048fe1745d3c48eab34b0b8099b03fe2a418238181a971495ed095fcd3747b6ce03ee23c6f331a30a16fde6514709f9be52e9736cab5f86f44e0626e4f03918a6617db147dccfb1d3a494f772c7a98f3d6988a07df9058ee24eaf2898d5c36bb5b1352a389f7a3f3928ccc9901511051a00a64f201d1997ca2fb0e09e21b8c12055d4add2e4fbad58b69c71d6e9ab213b9a04902b3efcd9113a6670426b22129a6fefd787f6a5f466fbc5aeec583b39f596e31b4fd6622fbafb69c651229bb9dad449c0e548bde1ac486b5e0f9eb54094823c048c4a4818d05378772bccaa159bf36a5e29086089bf76ce96318a2f412d7220c2752b0b8e566fedeabbc8ea945834f93925b11e2c80274bfb9ac5b619a490c3b8af772d5186742e957c354c64c8f4eacf27f838caf46ac45f52ce3ddbb9eb2b853211f1832b5f321eabfda9b6e29585d603195ca8f216284167b7e2deddcac3910c1d412f35dc986f851ed8bec28c129e2fd039326f067c23020ef140fb63a12fbf4409449af2b9693ba2b0361cff1e667d5c237f0cffb480b51ca6da7bde7b470290a1612d5b51618cc8b181730004dcce57f34383c43ae343eff3a2b8979daa442726e2d297c49f26ad2544d66a320fd4aefdde42bbe40524e47cce2521f400b968a1801d17396c8ad6d953f6409198888be2ac2f93df7c087fee077cfcf69eea19e863019ff1a3df1a4a857e61b940cfebc4ae2b8a84cfd951c62a2c56b6cac8ea8"}], 0x418}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 1m15.502400773s ago: executing program 0 (id=7846): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x8, 0x5, 0x7, 0xc1}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1b"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8946, &(0x7f0000000040)={'veth0_vlan\x00', @random='\x00\x00\x00\x00\x00 '}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000300), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073012200000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x5, 0xc3, &(0x7f0000000080)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 1m15.392019867s ago: executing program 0 (id=7849): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000004000000000000000000000d000000000200000000000085"], &(0x7f0000002540)=""/4096, 0x44, 0x1000, 0x4}, 0x28) (fail_nth: 8) 1m14.950425854s ago: executing program 0 (id=7853): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfffffffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000700000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r1, r0}, 0x6) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x40305839, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'veth0_macvtap\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) syz_clone(0x64087000, 0x0, 0xffffff59, 0x0, 0x0, 0x0) gettid() 1m14.634559226s ago: executing program 0 (id=7857): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xcda7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x2}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000002c0)={&(0x7f0000000000)="69546cb3f36f5f6e71f64a8f4a27664fc2d529a0d9957e48becace4c5a4380291b5ebb896a48c79d697d1d73a2275f8c0347780784158d33c9cb9171dc76e48ba6d85cbfc039662e9c595536092b4607765dccbb3d2abcd090928f9ea853a8ec24c6bcefbeaa6c4f0bf38878263b2aa93b9dfee76007991677812f1a41c931a9a4a318c4adda5f8a21fc306b239baa59877afcc28631b12135440274f85a655d", &(0x7f00000000c0)=""/90, &(0x7f0000000140)="a2bd0cec6ab6e8753da971962c854fe16f2bc8266d82a82396e3959f1df29a9c4dcabc42e735099652cdccb266bd962db8c68f9b24aef264190f27d978848aadbb2a6e5279d4fe38f3454814bd8cfc68d648f35544449695c972a40b7d048c18560f792f89", &(0x7f00000001c0)="38e959e52c5c29a4f4a54d9fded8861d883436e294d09ccb9f3609bfb4871e1297651eff022d4a1769db4e0523c08f11c2575406f357b965a74fe60f9f4dad9c83c20d6485784e311371fbb6d3177a2a64be19c7", 0x2, r0, 0x4}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=r0, 0x26, 0x1, 0x4, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000840)={0x4, 0x0}, 0x8) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)=@generic={&(0x7f0000000880)='./file0\x00', 0x0, 0x18}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x1, 0x80000000, 0x8, 0x1020, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3, 0x7}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x1e, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x8001}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='syzkaller\x00', 0x4, 0xfd, &(0x7f00000006c0)=""/253, 0x41000, 0x2, '\x00', r2, @fallback=0xd, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0xc, 0x8ee8, 0xff}, 0x10, r4, r5, 0xa, &(0x7f0000000980)=[r3, r6, r1, r0], &(0x7f00000009c0)=[{0x4, 0x3, 0xc, 0xa}, {0x1, 0x5, 0xb, 0x5}, {0x3, 0x3, 0xe, 0xc}, {0x5, 0x2, 0xf}, {0x3, 0x4, 0xb}, {0x5, 0x5, 0xb, 0x15}, {0x0, 0x2, 0xd, 0x7}, {0x4, 0x2, 0x3}, {0x4, 0x3, 0x1, 0x3}, {0x1, 0x5, 0x4, 0x9}], 0x10, 0x2}, 0x94) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000bc0)=@generic={&(0x7f0000000b80)='./file0\x00', r3}, 0x18) r9 = getpid() r10 = perf_event_open(&(0x7f0000000c80)={0x2, 0x80, 0x80, 0x81, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0xe1218, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xc3c, 0x5}, 0x8000, 0x5, 0x101, 0x8, 0x3ff, 0x8000000, 0xf041, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000c00)={0x4, 0x80, 0x1, 0x8, 0x9, 0x2, 0x0, 0x6, 0x1, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xe000, 0x0, @perf_config_ext={0x7, 0x8}, 0x100840, 0x268, 0xed60, 0x3, 0x8000, 0x1, 0x4fb, 0x0, 0x37}, r9, 0xffffffffffffffff, r10, 0x3) r11 = gettid() perf_event_open(&(0x7f0000000d00)={0x4, 0x80, 0x1, 0x7, 0x4, 0xf, 0x0, 0x8, 0x41000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x60}, 0x1880, 0x8, 0x80000000, 0x0, 0x9, 0x0, 0x9, 0x0, 0x2, 0x0, 0x1d4}, r11, 0xd, 0xffffffffffffffff, 0x8) r12 = openat$cgroup_procs(r8, &(0x7f0000000d80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r12, &(0x7f0000000dc0)=r11, 0x12) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000e00)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001000)={r13, &(0x7f0000000e80)="8db5d9c70e29c80752f33e079e841132f6837e154f0da4dd06a1a21d2b2bde354db425efbfe2550efb4074255cc9e7d33d8ebe08aa3d2ee954d088b99b0426e7dae793f35a48136100041470fbd5645a5ffbb87b9b409b1bca2a790b4a0e89c828c45c43b1d576c9dc23169ec379a57cd269e6fab8d58e4d4b61330593b7adb026b7e02dfd74785ffda185b7d965d346719c20eed5ecd5c4b663dcfa9c1538649d231ac0f329d390fb19d1c3a3382ebedfcedde38e59ca084ed0af344c18834da9a4dc1452012710c8c8cf7ea3f20c2a7ebed34264f163e5b73a7398", &(0x7f0000000f80)=""/83}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000011c0)={r3, 0x58, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000012c0)={0xfffffffa, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x5, 0xe, &(0x7f0000001040)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xfffffffd}, @exit], &(0x7f00000010c0)='GPL\x00', 0x7, 0x38, &(0x7f0000001100)=""/56, 0x41100, 0x10, '\x00', r14, @fallback, r15, 0x8, &(0x7f0000001240)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0x9, 0x4, 0x7fffffff}, 0x10, r16, r7, 0x3, &(0x7f0000001300)=[r13, r1, r13], &(0x7f0000001340)=[{0x4, 0x2, 0x2, 0xc}, {0x0, 0x4, 0xa, 0xa}, {0x1, 0x4, 0xc, 0x6}], 0x10, 0x2}, 0x94) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000001440), 0x1c043, 0x0) ioctl$TUNSETLINK(r17, 0x400454cd, 0x3) r18 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@const={0xf, 0x0, 0x0, 0xa, 0x2}, @restrict={0xe}, @enum={0xa, 0x8, 0x0, 0x6, 0x4, [{0x7, 0x4}, {0xc, 0x7fffffff}, {0x2, 0x8}, {0xb, 0x9}, {0xd, 0x3}, {0xb, 0x3}, {0x6, 0x1}, {0x2, 0xafa}]}, @ptr={0xc, 0x0, 0x0, 0x2, 0x4}, @var={0x4, 0x0, 0x0, 0xe, 0x1, 0x2}, @enum64={0x4, 0x8, 0x0, 0x13, 0x1, 0x7, [{0xd, 0x4, 0xd}, {0x7, 0x9, 0x9}, {0xb, 0x101, 0xa9}, {0xf, 0x6, 0x4}, {0x3, 0x8, 0x6}, {0x9, 0x7ff, 0x7}, {0x5, 0x8, 0x34}, {0x7, 0x71, 0x1}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001780)=""/172, 0x108, 0xac, 0x1, 0x101, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x27, &(0x7f0000001480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcd81, 0x0, 0x0, 0x0, 0xf}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @map_fd={0x18, 0x7, 0x1, 0x0, r0}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf}}, @exit, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x1, 0x1, 0x4, 0x3, 0x5, 0x4, 0xfffffffffffffff0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}]}, &(0x7f00000015c0)='syzkaller\x00', 0x10000, 0xa, &(0x7f0000001600)=""/10, 0x41100, 0x7d, '\x00', 0x0, 0x25, r18, 0x8, &(0x7f0000001880)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x61, 0x5, 0x7f, 0xfff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001900)=[0xffffffffffffffff, r0], &(0x7f0000001940)=[{0x4, 0x4, 0xf, 0x6}, {0x5, 0x1, 0xe, 0x6}, {0x4, 0x3, 0x6, 0x7}, {0x1, 0x5, 0x4, 0x4}, {0x5, 0x4, 0x2, 0x1}], 0x10, 0x3}, 0x94) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001c00)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0xfb3c, '\x00', r14, r3, 0x4, 0x3, 0x4}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001d00)=@bpf_tracing={0x1a, 0x16, &(0x7f0000001a80)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xbb7}, @exit, @ldst={0xad48602040ae9c03, 0x2, 0x2, 0x2, 0x5, 0x1, 0x8}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0x3, 0x1, 0x0, r6}], &(0x7f0000001b40)='syzkaller\x00', 0x3a, 0xf, &(0x7f0000001b80)=""/15, 0x41100, 0x40, '\x00', r14, 0x1a, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x2, 0x8, 0x4, 0x2}, 0x10, 0xeec, 0xffffffffffffffff, 0x2, &(0x7f0000001c80)=[r6, r13, r6, r6, r19], &(0x7f0000001cc0)=[{0x3, 0x5, 0xa, 0x3}, {0x1, 0x2, 0xc, 0x1}], 0x10, 0x4}, 0x94) 59.621380394s ago: executing program 32 (id=7857): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000240)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xcda7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x2}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000002c0)={&(0x7f0000000000)="69546cb3f36f5f6e71f64a8f4a27664fc2d529a0d9957e48becace4c5a4380291b5ebb896a48c79d697d1d73a2275f8c0347780784158d33c9cb9171dc76e48ba6d85cbfc039662e9c595536092b4607765dccbb3d2abcd090928f9ea853a8ec24c6bcefbeaa6c4f0bf38878263b2aa93b9dfee76007991677812f1a41c931a9a4a318c4adda5f8a21fc306b239baa59877afcc28631b12135440274f85a655d", &(0x7f00000000c0)=""/90, &(0x7f0000000140)="a2bd0cec6ab6e8753da971962c854fe16f2bc8266d82a82396e3959f1df29a9c4dcabc42e735099652cdccb266bd962db8c68f9b24aef264190f27d978848aadbb2a6e5279d4fe38f3454814bd8cfc68d648f35544449695c972a40b7d048c18560f792f89", &(0x7f00000001c0)="38e959e52c5c29a4f4a54d9fded8861d883436e294d09ccb9f3609bfb4871e1297651eff022d4a1769db4e0523c08f11c2575406f357b965a74fe60f9f4dad9c83c20d6485784e311371fbb6d3177a2a64be19c7", 0x2, r0, 0x4}, 0x38) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@map=r0, 0x26, 0x1, 0x4, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x8, '\x00', r2, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000840)={0x4, 0x0}, 0x8) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)=@generic={&(0x7f0000000880)='./file0\x00', 0x0, 0x18}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x1, 0x80000000, 0x8, 0x1020, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3, 0x7}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x1e, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x8001}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='syzkaller\x00', 0x4, 0xfd, &(0x7f00000006c0)=""/253, 0x41000, 0x2, '\x00', r2, @fallback=0xd, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0xc, 0x8ee8, 0xff}, 0x10, r4, r5, 0xa, &(0x7f0000000980)=[r3, r6, r1, r0], &(0x7f00000009c0)=[{0x4, 0x3, 0xc, 0xa}, {0x1, 0x5, 0xb, 0x5}, {0x3, 0x3, 0xe, 0xc}, {0x5, 0x2, 0xf}, {0x3, 0x4, 0xb}, {0x5, 0x5, 0xb, 0x15}, {0x0, 0x2, 0xd, 0x7}, {0x4, 0x2, 0x3}, {0x4, 0x3, 0x1, 0x3}, {0x1, 0x5, 0x4, 0x9}], 0x10, 0x2}, 0x94) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000b40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000bc0)=@generic={&(0x7f0000000b80)='./file0\x00', r3}, 0x18) r9 = getpid() r10 = perf_event_open(&(0x7f0000000c80)={0x2, 0x80, 0x80, 0x81, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0xe1218, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xc3c, 0x5}, 0x8000, 0x5, 0x101, 0x8, 0x3ff, 0x8000000, 0xf041, 0x0, 0x2, 0x0, 0x2}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000c00)={0x4, 0x80, 0x1, 0x8, 0x9, 0x2, 0x0, 0x6, 0x1, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xe000, 0x0, @perf_config_ext={0x7, 0x8}, 0x100840, 0x268, 0xed60, 0x3, 0x8000, 0x1, 0x4fb, 0x0, 0x37}, r9, 0xffffffffffffffff, r10, 0x3) r11 = gettid() perf_event_open(&(0x7f0000000d00)={0x4, 0x80, 0x1, 0x7, 0x4, 0xf, 0x0, 0x8, 0x41000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x60}, 0x1880, 0x8, 0x80000000, 0x0, 0x9, 0x0, 0x9, 0x0, 0x2, 0x0, 0x1d4}, r11, 0xd, 0xffffffffffffffff, 0x8) r12 = openat$cgroup_procs(r8, &(0x7f0000000d80)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r12, &(0x7f0000000dc0)=r11, 0x12) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000e00)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001000)={r13, &(0x7f0000000e80)="8db5d9c70e29c80752f33e079e841132f6837e154f0da4dd06a1a21d2b2bde354db425efbfe2550efb4074255cc9e7d33d8ebe08aa3d2ee954d088b99b0426e7dae793f35a48136100041470fbd5645a5ffbb87b9b409b1bca2a790b4a0e89c828c45c43b1d576c9dc23169ec379a57cd269e6fab8d58e4d4b61330593b7adb026b7e02dfd74785ffda185b7d965d346719c20eed5ecd5c4b663dcfa9c1538649d231ac0f329d390fb19d1c3a3382ebedfcedde38e59ca084ed0af344c18834da9a4dc1452012710c8c8cf7ea3f20c2a7ebed34264f163e5b73a7398", &(0x7f0000000f80)=""/83}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000011c0)={r3, 0x58, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r15 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=r4, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000012c0)={0xfffffffa, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x5, 0xe, &(0x7f0000001040)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xc}, @map_val={0x18, 0x0, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xfffffffd}, @exit], &(0x7f00000010c0)='GPL\x00', 0x7, 0x38, &(0x7f0000001100)=""/56, 0x41100, 0x10, '\x00', r14, @fallback, r15, 0x8, &(0x7f0000001240)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0x9, 0x4, 0x7fffffff}, 0x10, r16, r7, 0x3, &(0x7f0000001300)=[r13, r1, r13], &(0x7f0000001340)=[{0x4, 0x2, 0x2, 0xc}, {0x0, 0x4, 0xa, 0xa}, {0x1, 0x4, 0xc, 0x6}], 0x10, 0x2}, 0x94) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000001440), 0x1c043, 0x0) ioctl$TUNSETLINK(r17, 0x400454cd, 0x3) r18 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001840)={&(0x7f0000001640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x4, [@const={0xf, 0x0, 0x0, 0xa, 0x2}, @restrict={0xe}, @enum={0xa, 0x8, 0x0, 0x6, 0x4, [{0x7, 0x4}, {0xc, 0x7fffffff}, {0x2, 0x8}, {0xb, 0x9}, {0xd, 0x3}, {0xb, 0x3}, {0x6, 0x1}, {0x2, 0xafa}]}, @ptr={0xc, 0x0, 0x0, 0x2, 0x4}, @var={0x4, 0x0, 0x0, 0xe, 0x1, 0x2}, @enum64={0x4, 0x8, 0x0, 0x13, 0x1, 0x7, [{0xd, 0x4, 0xd}, {0x7, 0x9, 0x9}, {0xb, 0x101, 0xa9}, {0xf, 0x6, 0x4}, {0x3, 0x8, 0x6}, {0x9, 0x7ff, 0x7}, {0x5, 0x8, 0x34}, {0x7, 0x71, 0x1}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000001780)=""/172, 0x108, 0xac, 0x1, 0x101, 0x10000}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0x27, &(0x7f0000001480)=@framed={{0x18, 0x0, 0x0, 0x0, 0xcd81, 0x0, 0x0, 0x0, 0xf}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @map_fd={0x18, 0x7, 0x1, 0x0, r0}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xf}}, @exit, @map_val={0x18, 0x4, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @ldst={0x1, 0x1, 0x4, 0x3, 0x5, 0x4, 0xfffffffffffffff0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x3}]}, &(0x7f00000015c0)='syzkaller\x00', 0x10000, 0xa, &(0x7f0000001600)=""/10, 0x41100, 0x7d, '\x00', 0x0, 0x25, r18, 0x8, &(0x7f0000001880)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000018c0)={0x61, 0x5, 0x7f, 0xfff}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001900)=[0xffffffffffffffff, r0], &(0x7f0000001940)=[{0x4, 0x4, 0xf, 0x6}, {0x5, 0x1, 0xe, 0x6}, {0x4, 0x3, 0x6, 0x7}, {0x1, 0x5, 0x4, 0x4}, {0x5, 0x4, 0x2, 0x1}], 0x10, 0x3}, 0x94) r19 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001c00)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0xfb3c, '\x00', r14, r3, 0x4, 0x3, 0x4}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001d00)=@bpf_tracing={0x1a, 0x16, &(0x7f0000001a80)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xbb7}, @exit, @ldst={0xad48602040ae9c03, 0x2, 0x2, 0x2, 0x5, 0x1, 0x8}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r13}}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, @map_fd={0x18, 0x3, 0x1, 0x0, r6}], &(0x7f0000001b40)='syzkaller\x00', 0x3a, 0xf, &(0x7f0000001b80)=""/15, 0x41100, 0x40, '\x00', r14, 0x1a, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001bc0)={0x2, 0x8, 0x4, 0x2}, 0x10, 0xeec, 0xffffffffffffffff, 0x2, &(0x7f0000001c80)=[r6, r13, r6, r6, r19], &(0x7f0000001cc0)=[{0x3, 0x5, 0xa, 0x3}, {0x1, 0x2, 0xc, 0x1}], 0x10, 0x4}, 0x94) 7.54957237s ago: executing program 4 (id=8844): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x306) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/cgroup\x00') r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000007111a400000400ff8410000004000000183800000200"/56], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x41100, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x9, 0x41000}, 0x50) r4 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x8, 0xfc, 0x40, 0x3, 0x0, 0xfffffffffffffffe, 0x42001, 0xa, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe6, 0x1, @perf_config_ext={0x2, 0x8000}, 0x10, 0x4, 0x1, 0x7, 0xce8, 0x1, 0x0, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1b) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b00000000000000000000009502000000000000", @ANYRES32=r3, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04006cc7b77000000400"/28], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0], 0x0, 0x85, &(0x7f0000000640)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x26, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000940)={{r3, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1e, 0x21, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='syzkaller\x00', 0x9, 0x5d, &(0x7f00000003c0)=""/93, 0x5a0a677b0d1f520, 0x8, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x3, 0xe, 0x4, 0x43}, 0x10, r6, 0xffffffffffffffff, 0x40, &(0x7f0000000980)=[r3, r7, r3, r0, r3, r3], &(0x7f0000000a40)=[{0x4, 0x4, 0xe, 0x9}, {0x0, 0x4, 0xe, 0x18}, {0x1, 0x5, 0x3}, {0x5, 0x1, 0x2, 0x5}, {0x3, 0x3, 0x1, 0x9}, {0x0, 0x2, 0x5, 0x9}, {0x1, 0x1, 0x6, 0x9}, {0x5, 0x2, 0x3, 0xc}, {0x2, 0x2, 0x7, 0xa}]}, 0x94) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$MAP_CREATE(0x0, 0x0, 0x50) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r10, &(0x7f00000000c0)=ANY=[@ANYBLOB="1103"], 0xffdd) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000000), &(0x7f00000000c0)=r2}, 0x20) 7.043169369s ago: executing program 4 (id=8855): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000540000000000000070000006b110a000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r0, 0x40047438, 0x110c230041) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xf, 0x16, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRES64=0x0, @ANYRESHEX=r0, @ANYRES8=r0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES16=r0, @ANYRESOCT=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device=0x6, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) 6.405257534s ago: executing program 4 (id=8863): ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x31, 0xac, 0x1, 0x0, 0x9, 0x40200, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x3c, 0x8}, 0x4, 0x6, 0x404, 0x5, 0x1, 0x8000, 0x9, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='-:$\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000140)={'team0\x00'}) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$LINK_DETACH(0x22, &(0x7f00000001c0)=r2, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x303800, 0x0) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000240)=0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x2, 0x15, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, [@btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x4, 0x0, 0xd, 0x7, 0x4, 0x40}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0xffffa56c}, @jmp={0x5, 0x0, 0x9, 0x1, 0x1, 0xc, 0xffffffffffffffff}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000340)='GPL\x00', 0xfff, 0x49, &(0x7f0000000380)=""/73, 0x41000, 0x8, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000440)=[0x1], &(0x7f0000000480)=[{0x1, 0x1, 0x8, 0xa}, {0x3, 0x5, 0xe, 0xd}, {0x2, 0x9, 0x3, 0x4}], 0x10, 0x2}, 0x94) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x6, 0x28, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001}, {}, {}, [@map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x84}, @alu={0x4, 0x1, 0xd, 0x7, 0x2, 0xfffffffffffffffc}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x14}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='GPL\x00', 0x3, 0x1b, &(0x7f0000000700)=""/27, 0x40f00, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x7fff, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f00000007c0)=[{0x0, 0x3, 0x4}, {0x2, 0x5, 0x4, 0xc}, {0x2, 0x2, 0x10, 0xa}, {0x2, 0x5, 0x4, 0x3}], 0x10, 0x5}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000009c0)={@cgroup=0xffffffffffffffff, 0x28, 0x1, 0x7, &(0x7f00000008c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000900)=[0x0, 0x0], &(0x7f0000000940)=[0x0], &(0x7f0000000980)=[0x0], 0x0}, 0x40) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000cc0)={0x6, 0x19, &(0x7f0000000a40)=@raw=[@btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @jmp={0x5, 0x1, 0x6, 0xb, 0x2, 0x80, 0x10}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10001}, @jmp={0x5, 0x1, 0x7, 0x9, 0x5, 0xfffffffffffffff8}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x8}], &(0x7f0000000b40)='GPL\x00', 0x0, 0x41, &(0x7f0000000b80)=""/65, 0x0, 0x24, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x2, 0xc, 0x2, 0x2}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000c40)=[0xffffffffffffffff, 0x1], &(0x7f0000000c80)=[{0x1, 0x5, 0x10, 0x1}, {0x5, 0x2, 0xa, 0x7}], 0x10, 0x7fff}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@cgroup, r3, 0x16, 0x4, r4, @void, @value=r7, @void, @void, r6}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)=r3}, 0x20) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000f80)={&(0x7f0000000e40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x9, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x5, 0x2, 0xff}, {0x4, 0x6, 0x1000}], "d5"}, @const={0x2, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x0, 0x30, 0x30, 0x0, 0x61, 0x2e, 0x61]}}, &(0x7f0000000ec0)=""/131, 0x55, 0x83, 0x0, 0x17, 0x10000}, 0x28) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x13, 0x8, 0xffffff81, 0x2, 0x601d0, r8, 0x6, '\x00', 0x0, r9, 0x3, 0x4}, 0x50) r11 = openat$cgroup(r5, &(0x7f00000010c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000001040)={0x1, 0x80, 0x6, 0x4, 0x7, 0x9, 0x0, 0x94e, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x7, 0x1}, 0x15108, 0x7fff, 0xb2, 0x4, 0x0, 0x2183, 0x8001, 0x0, 0x3, 0x0, 0x1}, r11, 0x6, r0, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001200)={@cgroup=r11, 0x17, 0x0, 0x3, &(0x7f0000001100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000001140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000011c0)=[0x0, 0x0, 0x0]}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r3, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000012c0)=[0x0, 0x0], 0x0, 0xe4, &(0x7f0000001300)=[{}], 0x8, 0x10, &(0x7f0000001340), &(0x7f0000001380), 0x8, 0xa6, 0x8, 0x8, &(0x7f00000013c0)}}, 0x10) perf_event_open(&(0x7f0000001580)={0x5, 0x80, 0x0, 0x8, 0x4, 0x4, 0x0, 0x2, 0x38100, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @perf_bp={&(0x7f0000001540), 0x4}, 0x200, 0x8, 0x3, 0x0, 0x7, 0x7, 0x10, 0x0, 0x7, 0x0, 0x8}, 0xffffffffffffffff, 0xc, r0, 0x0) r15 = openat$cgroup_ro(r11, &(0x7f0000001680)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001600)=@bloom_filter={0x1e, 0xcae4, 0x5f6, 0x1, 0xe401, 0x1, 0x8, '\x00', r14, r9, 0x2, 0x1, 0x2, 0xb, @value=r15}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000016c0)=@bloom_filter={0x1e, 0x80000001, 0x8, 0x2, 0x4000, r10, 0x3, '\x00', r14, r15, 0x0, 0x5, 0x2, 0xa}, 0x50) r17 = openat$cgroup_procs(r12, &(0x7f0000001780)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001740)={@fallback=r17, r16, 0x0, 0x28, r7, @void, @void, @void, @value=r13, r6}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f00000017c0), 0x400000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r15) 2.946336817s ago: executing program 4 (id=8899): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="09000000030000000400010005"], 0x48) close(0x3) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0e000000040000000800000002000dc76f15b8edca4c8cf522d1cf1e31b1dfe8b915dd094578158c759c1b6c9f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000007200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000000c0)={r1}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007111aa000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x39}, 0x4d) 2.152416908s ago: executing program 1 (id=8913): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xa000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20) close(0x3) 1.512246732s ago: executing program 3 (id=8915): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x4, 0xf}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0f0000000400000004000000a2"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) 1.511623343s ago: executing program 4 (id=8916): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xcc, 0xc}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x7, 0x101, 0x0, 0x8000}, 0x50) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000440)={r3, r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x64}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="050000000400000008040000cd"], 0x50) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x8, 0x2e}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f00000006c0)={&(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000400)="244ee0b5f9ad24a349838869674252c4242966066aa3d83c1938395ddac63d3edae43a", 0x23}, {&(0x7f0000000780)="b7359c36e1d9dcaf434fa8c527ef215d7fcdb5f189adf50b61e4a35411e2702ed5cc63be64bea3b78da61af5688b374b72391281025740592a92dd58d546721ab37f1fd77175a4fde8c75ead2fe08325b791c9d8d144837f7210a0878e31ea409cdeb9c473faa5f4eb05a3c9cbd7166548cb24f1e144c3a3f56c201be3261c0d86d0ce64644aee9c59fc3f813f3f58e42a259a121bfbb668f54f729d5fafeb173645414f14202c43d94e9c9952287242ec97de1aee21a00f0bf56ea4", 0xbc}], 0x2, &(0x7f0000000580)=[@rights={{0x1c, 0x1, 0x1, [r7, r6, r7]}}], 0x20, 0x8040}, 0x40040) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="010000000b000000be00000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r9, &(0x7f00000002c0)}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r11}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x0, &(0x7f0000000040), &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0xffffffffffffffff, 0x40f00, 0x0, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000180)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x8, 0x8, 0x1}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000200)=[0xffffffffffffffff, r9, 0xffffffffffffffff, r1, r11, r0, r1, r1, r1], &(0x7f0000000340)=[{0x4, 0x4, 0x4, 0x9}, {0x1, 0xd, 0x4, 0x8}, {0x3, 0x1, 0x0, 0xb}, {0x0, 0x5, 0x10, 0xc}, {0x3, 0x3, 0x5, 0x1}, {0x4, 0x4, 0xf, 0x418215928e6d673b}, {0x4, 0x4, 0x10, 0xa}, {0x0, 0x2, 0xf}, {0x1, 0x1, 0x3, 0x5}], 0x10, 0xffffb81d}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000080850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) close(r12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40000000}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) 1.510474963s ago: executing program 3 (id=8917): perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0xc, 0x13, 0x6, 0x0, 0x3ff, 0x20001, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffff0dc, 0x1, @perf_bp={&(0x7f0000000080)}, 0x210, 0x1, 0x2, 0x0, 0x7, 0x10, 0x7, 0x0, 0xfe0, 0x0, 0xe6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r0 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0xc, 0x13, 0x6, 0x0, 0x3ff, 0x20001, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffff0dc, 0x1, @perf_bp={&(0x7f0000000080)}, 0x210, 0x1, 0x2, 0x0, 0x7, 0x10, 0x7, 0x0, 0xfe0, 0x0, 0xe6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8080}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x58}, 0x0, 0xffffffffffffffff, r1, 0x0) close(0x3) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x6) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000000030000000200"/28], 0x50) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000000030000000200"/28], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000740)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x20009a, 0x8, 0x0, 0x0}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305829, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000780)={0xffffffffffffffff}, 0x4) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000240)=@raw=[@map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x2}], &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x7f, &(0x7f0000000300)=""/127, 0x40f00, 0x66, '\x00', r4, 0x18, r5, 0x8, &(0x7f00000006c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x27f4d, r5, 0x4, &(0x7f0000000800)=[r6, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000840)=[{0x5, 0x3, 0x10000000, 0x1}, {0x1, 0x1, 0x5, 0xb}, {0x3, 0x2, 0xc, 0x9}, {0x2, 0x2, 0x2, 0x1}], 0x10, 0x10}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000240)=@raw=[@map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x2}], &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x7f, &(0x7f0000000300)=""/127, 0x40f00, 0x66, '\x00', r4, 0x18, r5, 0x8, &(0x7f00000006c0)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x27f4d, r5, 0x4, &(0x7f0000000800)=[r6, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000840)=[{0x5, 0x3, 0x10000000, 0x1}, {0x1, 0x1, 0x5, 0xb}, {0x3, 0x2, 0xc, 0x9}, {0x2, 0x2, 0x2, 0x1}], 0x10, 0x10}, 0x94) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000a40)={0x6, 0x0}, 0x8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000a00)={@ifindex=r4, 0xffffffffffffffff, 0x2e, 0x36, 0xffffffffffffffff, @void, @void, @void, @value=r7}, 0x20) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x2d, 0x8, 0x0, 0xfffff01c}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r9}, 0xc) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0xb, [@fwd={0x8}, @restrict={0x4, 0x0, 0x0, 0xb, 0x5}, @volatile={0xc, 0x0, 0x0, 0x9, 0x3}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xc}, {0x0, 0x3}, {0xd, 0x1}, {0x8}, {0xa, 0x4}]}, @const={0xc9, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x61, 0x61, 0x2e, 0x61, 0x30, 0x30, 0x61, 0x0, 0x2e]}}, &(0x7f00000001c0)=""/23, 0x87, 0x17, 0x1, 0x2}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x9, 0x0}, 0x8) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00419fd91e2fc9b22500000002400000000000", @ANYRES32, @ANYBLOB=' \x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000050000000200"/28], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000700)={r8, 0xffffffffffffffff}, 0x4) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000004000000000001000000800000000000df32abc0e434b3ed896358cfa3191bc6156f0c0d95f2b73ce5b3972355f707e1348b6d1a8beabb7eed040a266e8ae66422bda60257daff0300001dedfbee334453f81bf27eb06871e18ceac556e3ff722469baff070f1570fdc599727de575d5aa1d76447be350fe766fe3ebec0edbdc9385ae9f4c99043402847509bec980da4141ca44b6f84f02f446ec7f3ecb2cf4dc17106b0f6d0370a464720e864d1065e5edfb932e8523ed00"/202, @ANYRES32=r8, @ANYBLOB='\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000030000000400"/28], 0x50) r16 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1c, 0x11, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000fbffffff000000000500000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000000000000030000000000008500000083000000bf090000000000005509010000000000950000000000f356ed9bf4ffecffffffbd20ffff080000bf91000000000000b7020000000600008500000084000000b700000000000000950000000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x83, &(0x7f0000000400)=""/131, 0x41100, 0x30, '\x00', 0x0, @fallback=0x2f, r11, 0x8, &(0x7f00000005c0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x1, 0x4, 0x1}, 0x10, r12, r9, 0xa, &(0x7f0000000840)=[r8, r8, r13, r8, r14, r15, r16, r8, r8], &(0x7f0000000880)=[{0x1, 0x4, 0xc, 0x6}, {0x5, 0x4, 0x0, 0xb}, {0x4, 0x5, 0x1, 0x9}, {0x1, 0x2, 0x7, 0x8}, {0x3, 0x2, 0x1, 0x6}, {0x3, 0x3, 0xf}, {0x3, 0x1, 0x2, 0x5}, {0x3, 0x2, 0xe, 0x8}, {0x3, 0x3, 0xb, 0x8}, {0x2, 0x2, 0xa, 0x9}], 0x10, 0x16}, 0x94) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000040)={'veth1_to_bridge\x00', 0x600}) 1.275933641s ago: executing program 3 (id=8922): bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b400000000000000611404000000030000000000000000000000ba3a80ec32ebbad57c4e5738be516e45382ba40b"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x5, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x9, 0x2, 0x5, 0xb, 0x0, 0x10, 0x53ab529e99b69d72, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x8}, 0x2, 0x3, 0x8, 0x9, 0xfffffffeffffffff, 0x8, 0x9, 0x0, 0x5, 0x0, 0x2dad}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 1.265056662s ago: executing program 1 (id=8923): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1e, 0x1b, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x4ca968ba}, {}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41100, 0xb, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x5, 0x9c80}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0xf703}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={0xffffffffffffffff, r0}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)=r0}, 0x20) write$cgroup_int(r1, &(0x7f0000000400)=0x4f, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000440)='\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r1, 0x0, 0x7c, 0xc7, &(0x7f0000000480)="dd4d344a1fcb78137ea5d4833d8b222828ff17f323786140d56cc30bfb1e72fb9544e9e0de93987a5c4697f4afb04b1df0f837dbd58ffc4da1de1d8e0799f97215d149cb9139bb6d0c296f5eaff49431dc0ef61ef838819aa44705c31f9319a5a672fe200086aad180ce23f0f6ed3c2797b41b3cac408bb470bad125", &(0x7f0000000500)=""/199, 0x0, 0x0, 0x7a, 0xb4, &(0x7f0000000600)="7fdaf0c2af4e57f29892bd055e4fbbcfb90a0e9bc7e5b955ac2d12cabbbb4035e8d3ed15724c00f9ac4f8b323f92a70299bf6a08d537bac5917e50e8d2f24e6a0f507040e67738183027226512ae075811a3ad60719a63f38215b63473c9dc4d5c566a0aeea9455223abc7d00f20fce22a9c0c0fa38654853cc1", &(0x7f0000000680)="cc5c8a32bbbe2276f217298fb999c7beefae16f3d00e8b8fdc7354f515bea64f57a79c5e5d02f0ed7c7ec0e6d437d295db09f6da90dc036ddb4a786ff7b11574aebd9818d0783f4d6ae88aafa5fdd4d5aba451a2741e13e6ad9acc2dbfddeb75a3fe957baed0c68f5258fc5ee1183e98105f438c6bfe32935ae3063ae5f6cf0ec46b3b1fb8d053ec1880520ebeee87c4d5a24942ff64dd11f5bebaf78046b8513bcbc1b6d85822d4730901891a3a66e85dbf3414", 0x2, 0x0, 0x6}, 0x50) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0), 0x43, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000800), 0x8) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000840)=r1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x80, 0x2, 0x470, 0x100, r1, 0x2, '\x00', 0x0, r4, 0x3, 0x2, 0x2}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ac0)={r4, 0x58, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x18, 0x5, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x9}, [@map_fd={0x18, 0x5, 0x1, 0x0, r5}]}, &(0x7f0000000940)='syzkaller\x00', 0x3, 0x97, &(0x7f0000000980)=""/151, 0x0, 0x11, '\x00', r7, 0x0, r4, 0x8, &(0x7f0000000b00)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000b40)={0x5, 0xf, 0x10000, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000b80)=[r2, r1, r4], &(0x7f0000000bc0)=[{0x5, 0x1, 0x9, 0xa}, {0x5, 0x1, 0xe, 0x4}, {0x4, 0x4, 0xb}, {0x5, 0x5, 0x1, 0x9}, {0x1, 0x1, 0x7, 0x9}], 0x10, 0xe3}, 0x94) close(0xffffffffffffffff) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000d00)=0x9) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d40)={0x1b, 0x0, 0x0, 0x0, 0x0, r2, 0x200, '\x00', r7, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e40)={{r5, 0xffffffffffffffff}, &(0x7f0000000dc0), &(0x7f0000000e00)=r4}, 0x20) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001080)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x8, '\x00', r7, r1, 0x4, 0x4, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000011c0)={0x6, 0x1e, &(0x7f0000000e80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffff7}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@ldst={0x1, 0x0, 0x0, 0x7, 0x0, 0x6, 0xffffffffffffffff}, @map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x9}, @ldst={0x3, 0x2, 0x2, 0x8, 0x7, 0xffffffffffffffe0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000f80)='GPL\x00', 0x3ff, 0x62, &(0x7f0000000fc0)=""/98, 0x41100, 0x10, '\x00', r7, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001040)={0x3, 0x3, 0x7, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001100)=[r5, r11, r2, r5], &(0x7f0000001140)=[{0x1, 0x4}, {0x3, 0x2, 0x4, 0x8}, {0x2, 0x3, 0xc, 0x2}, {0x2, 0x3, 0xb, 0x4}, {0x2, 0x5, 0x1, 0xb}, {0x3, 0x3, 0xf, 0x8}], 0x10, 0x4}, 0x94) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000001280)={0x0, 0x2, [@empty, @remote]}) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xdf, '\x00', r7, 0xffffffffffffffff, 0x0, 0x4, 0x9e74}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001600)={0x0, 0x1e, &(0x7f00000012c0)=@raw=[@cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @call={0x85, 0x0, 0x0, 0xb6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffa}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @call={0x85, 0x0, 0x0, 0x80}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xe}, @exit], &(0x7f00000013c0)='syzkaller\x00', 0x4, 0x8b, &(0x7f0000001400)=""/139, 0x41000, 0x4b, '\x00', r7, 0x0, r1, 0x8, &(0x7f00000014c0)={0x9, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[r12], &(0x7f00000015c0), 0x10, 0x2}, 0x94) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000016c0)={r6, 0xdea5, 0x10}, 0xc) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@bloom_filter={0x1e, 0x2, 0x6, 0x3, 0x10000, r13, 0x8, '\x00', r7, r14, 0x2, 0x2, 0x4, 0xa, @void, @value, @value=r1}, 0x50) r15 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001900), 0x4) sendmsg$unix(r4, &(0x7f00000019c0)={&(0x7f00000017c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000018c0)=[{&(0x7f0000001840)="a4db8907c0fab508da01e2692ead18096b9b20bca38d9b75fc1455892389d32333a4fefaf6ccaf9767819bc1755ae5c190c9a116c3a60732d02136c6f7de725478723ffb017b751e664c85261d49853eeeb4d96f073f99", 0x57}], 0x1, &(0x7f0000001940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [r0, r8, r15]}}, @rights={{0x14, 0x1, 0x1, [r8]}}], 0x50, 0x400c0}, 0x4000081) bpf$ITER_CREATE(0x21, &(0x7f0000001a00)={r4}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001bc0)={r5, &(0x7f0000001a40)="41bcdd61d498f839e9d74c5f194076621ebffabc18a0de1735073f1858495fea4481529f29f4ca86688823b2e96b8878bb4bb8d26afe9ae7783e92cf39ae16818819e3237b6ab8a31942090e3c095d529e9637a7e964cc35887f4bc94212eec54e511f4c1563c6615500aced3d345f1f3edafc0610349130df368230755af0594770f50decea7d8723b9555903e865d2af9abc89e13bef1d7efb", &(0x7f0000001b00)=""/183}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000001c00)={r1}, 0x8) 1.159154616s ago: executing program 1 (id=8926): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000004001000000000000000000000000004000000000"], 0x50) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async, rerun: 32) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (rerun: 32) write$cgroup_subtree(r4, 0x0, 0x32600) (async) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) close(r1) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6, 0xc8, 0x6, 0x7}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) (async) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000180)) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x1ff) (async, rerun: 64) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) (async, rerun: 32) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 32) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) (async) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) 1.072182859s ago: executing program 1 (id=8929): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000002800005f2800000004000000000000000000000d000000000200000000000085"], &(0x7f0000002540)=""/4096, 0x44, 0x1000, 0x4}, 0x28) 1.008093492s ago: executing program 1 (id=8930): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000073013b00000000009500000000000300"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0xb0, 0xcf, &(0x7f00000001c0)="efd213e3cf4fc784abf7e25410c7650b956702b262327ecafd1afa4ff3bbe0adc232539c5252c0ffa35e95571f710a143b3a47c1dcdd26dfed4133406bea42a6474c80c956264e56f7a81001b428788d4b9d568716a3f15393b974b48b637122f36af4cf6631acb705472a4e94920396747f1e109cdf1725b13b793597b0ebd005f676ae5298fb4b76ecacb3a0d0fb53919f21dbd6a9ea77cc81918be9f03e710ca03fda59f3ebe26d1c8848db178c8c", &(0x7f0000000800)=""/207, 0x5, 0x0, 0xf2, 0x3, &(0x7f0000000900)="1dd57fb54752489182a6aef5256c7781614229c365f8788223d7b1655d8f3a33f12a23b617d8960e926e588e7157474f07c3a30c479dd92f29c2948b6e4181d32993ef1371ec431fdb2222386ad08b6f018b402f12779698fef71f34d853ef671ccc8f5aa2a3c27fb1bab09e79caa149b95fdab7447470e9190200ce5f48922938ff8c56b41741662a52af7e68a79671c2abe685bf4f7441cd663f36d1af8771958e0b71d325f89666fddc4cdc488b75d38cfc768c064c08fd470a992cdfff6e6ca43cabdfa54891a640bfd5d489bb6e0adcf9c5b2c3e473dbefb0459960dcce0ff3171063d28a2d4b5e8b15d64b22316170", &(0x7f0000000080)="a78702", 0x4, 0x0, 0xd0}, 0x50) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000440)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xf8, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xad, 0x8, 0x0, 0x0}}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000480)=0xffffffffffffffff, 0x12) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x0, 0x0, 0x0, 0x3, 0x46, &(0x7f00000003c0)=""/70, 0x41000, 0xa, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0), 0x0, 0x10, 0x5}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x59, &(0x7f0000000380)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x1, 0xaa, &(0x7f0000000100)=""/170, 0x0, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000}, 0x94) 406.180325ms ago: executing program 2 (id=8944): openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xba, 0x0, 0x0, 0x0, 0x0, 0x24, 0x34194, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x414, 0x2000000, 0x4000000, 0x3, 0xfffffffffffffffe, 0xfffffffd, 0xfffe, 0x0, 0xffff7ffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) (async) close(0xffffffffffffffff) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0004000071106b00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (rerun: 32) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async, rerun: 64) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) (rerun: 64) close(r3) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r4, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext, 0x102002, 0x0, 0x0, 0x2, 0x80010, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) close(r2) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="16cd45d4735594ac0902589d13ca11c3a7db9bb552def449450a0ecb421a7dffff1d911abd5f5906a485530511ab9501223e64c8af1c6a4658e06bc9002bcfcbbc1c88d1", 0x44}, {&(0x7f00000002c0)}], 0x2, &(0x7f0000000480)="749c145b5f772ae255d07c132764cc705fd5b89e38e7c4a0be2a8e9e6422", 0x1e}, 0x20000011) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1a9) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async, rerun: 32) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000000040000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (rerun: 64) 347.105637ms ago: executing program 3 (id=8946): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00'}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x9, 0xaf, 0x400, 0x1, 0x80}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000bc0)={r1, &(0x7f0000000a00), 0x0}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg1\x00', 0x2}) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{0x9, 0x6, 0x3, 0x400}, {0x2, 0x1, 0xd, 0x2}, {0x410, 0x4, 0x6, 0x7}, {0xff27, 0xd, 0x40, 0x7}, {0x8, 0xfc, 0xf0, 0x1}, {0x1, 0x6d, 0x7, 0xea90}]}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x70}, [@ldst={0x6, 0x0, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) 338.100597ms ago: executing program 4 (id=8948): r0 = syz_clone(0x100, &(0x7f0000000180)="18c9c68b99dde258db6b1a4b757ffa3d630e09b586bee543f643206b86e1e17060d0ace80412f3afde7adafe8ae1d1019f93d18c8c88ce2fdc3f41b9cb2bf8b2ac4b5b533eb0fabc0ce81ddc3efbc0bac8f8bde7241667b3cf80df4834c6c7d96c2cd7d8d0138af6ea5da094a573ee05f00d8dd675643d617eba46f9409d05f0b56b137dbe6a17c19b375224c8e11beecdb387914178f68ff55821abbab75c847e5d467155e7cba1527b5b1455febdad631ea913cfa48b834afee6936f1120679d33f7d9238cc723ba06fb", 0xcb, &(0x7f0000000080), &(0x7f0000000280), &(0x7f00000002c0)="c6e8bd094e4574050f9459f69deff9f230ad077b3eda1b9dd2a026d558fa78831232") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000300)='!^\x00'}, 0x30) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080), &(0x7f00000000c0)=""/102}, 0x20) 326.679508ms ago: executing program 2 (id=8950): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0xc, &(0x7f0000001180)=ANY=[@ANYBLOB="180000000000000000000000000000008500000051000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 309.128529ms ago: executing program 5 (id=8951): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000000028000000281c000004000000000000000000000d000000000200000000000085"], &(0x7f0000002540)=""/4096, 0x44, 0x1000, 0x4}, 0x28) 264.098671ms ago: executing program 2 (id=8952): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000a000000080000000200000f75ffffff0e000000000000000300000007000000030000ca75ffffff00000000000000002e"], 0x0, 0x46}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000600)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0xee, &(0x7f00000006c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xc2, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, &(0x7f0000000940)=[0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb0, &(0x7f00000009c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0xd5, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) sendmsg$inet(r0, &(0x7f0000000d80)={&(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000240)="d85dbaa4d0d094c9dc05fe2b15c65599bc3f3f16bd85b71199846fb8a717e9710b53594ade8828ccce63d86b4abe17f5cfcae5f481f27c0de4ba69ae9ab80a1fd36f475937dd3e3266726094fb356b19e501ef03aa869953288584a9d02dbada1fda61654c520126612ee33345cf6499543ae8c836a2c2fd1f07", 0x7a}, {&(0x7f00000002c0)="5abfa8f0315294a3d7b5ba627bb046c8f5cd911e0de24ee30dcb3d9713df49e843d94aeb54930b2f9048e5508cad2660de1a5f3bfe649e4a39d10fa59b33a8336b97f584381382c6d45d7d72eeb6cab9c87bce5ab486884969eb6931008fd004131e647609c156f549d24c5a89f183fc9240a963db91c6e4af200047f38de6c9e4f010a62eee5631b3906d2200b8f78ea9741a2617dfaec72130ba61", 0x9c}, {&(0x7f0000000500)="0adbfd3e2945391ff6c98f25e10f25e846567a7a1702288e9891f6db71af1b842e01dc7bec3c048547fa35ae6a0a15d9e70f7bfff06c07db1c311c445a90845c19e58ab304b581f78b216675c58fba6e0cfa2976ff77713400e0fcb3d865ecd190b46cd303fa0e92e1a0dac3ea5d502e3c3290b5ef4e6f41c380f3d494921d3780a0e8f8a0b037f56a370697e0a0fe699bdf8179c4a5c86d8d40a74e33ac5269393b7b5450adfa2c2067a3d93b6f0335868f8e87244c89fb2c129c5a1d15bf748c4f2471e88055c9a2aae16636f678faf609368b9c46dafb1c8e4f26943be202e346aeb1525c1d107379a12fff13a7cadc1795dc8e92", 0xf6}], 0x3, &(0x7f0000000c00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast1, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x74deb022}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffffc}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @dev={0xac, 0x14, 0x14, 0x13}, @loopback}}}, @ip_retopts={{0x68, 0x0, 0x7, {[@cipso={0x86, 0x30, 0x1, [{0x7, 0xb, "90855daebe7e540bea"}, {0x0, 0x3, "a7"}, {0x7, 0xb, "bacdf98fb3e27c038a"}, {0x5, 0x4, "b9a1"}, {0x0, 0xd, "097d17df98399dd4d08f39"}]}, @ssrr={0x89, 0x7, 0xeb, [@remote]}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x10, 0xf9, 0x0, 0x0, [0x3, 0x8, 0xffffffff]}, @generic={0x89, 0xc, "46ca32bbdb36740d1914"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9a40}}, @ip_retopts={{0x44, 0x0, 0x7, {[@cipso={0x86, 0x32, 0x0, [{0x673bb5cea62671c, 0x8, "27d70c31c623"}, {0x6, 0x6, "d96c8a9a"}, {0x0, 0x2}, {0x0, 0x5, "d82b59"}, {0x0, 0x12, "e55b7ca36a805f78d8bf5cb2bebde26b"}, {0x7, 0x5, "994fc7"}]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}], 0x170}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f00000001c0)=ANY=[@ANYBLOB="b40600000000000071118c0000000000851000000200000085000000070000009500000000000000950000000000000059a30f4936e44feb8adb9474dd7d10406d8bb1f72366e95281c2c0be09e6af23f926d804488628cda2ad6fe64f"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe}, 0x70) 263.13888ms ago: executing program 3 (id=8953): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x680400, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x5}, 0x50) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@map=r1, 0x35, 0x1, 0x100, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0]}, 0x40) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) recvmsg$unix(r4, &(0x7f0000001a80)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f00000018c0)=[{&(0x7f0000000300)=""/85, 0x55}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/153, 0x99}, {&(0x7f0000001440)=""/169, 0xa9}, {&(0x7f0000001500)=""/40, 0x28}, {&(0x7f0000001540)=""/153, 0x99}, {&(0x7f0000001600)=""/156, 0x9c}, {&(0x7f00000016c0)=""/116, 0x74}, {&(0x7f0000001740)=""/109, 0x6d}, {&(0x7f00000017c0)=""/226, 0xe2}], 0xa, &(0x7f0000001980)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}, 0x20) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000001ac0)=""/206) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002000)={r14, 0xe0, &(0x7f0000001f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001d00)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000001d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2b, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000001e40), &(0x7f0000001e80), 0x8, 0xab, 0x8, 0x8, &(0x7f0000001ec0)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001cc0)={@ifindex=r20, 0x9, 0x1, 0xffffffff, &(0x7f0000001bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000001c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001c80)=[0x0]}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000030c0)={&(0x7f0000002040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0xc, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x5f}, @union={0xb, 0x2, 0x0, 0x5, 0x1, 0xc, [{0xf, 0x3, 0x1}, {0x8, 0x5, 0xffff}]}, @const={0xb}]}, {0x0, [0x2e, 0x61, 0x30, 0x30, 0x5f, 0x0, 0x5f, 0x2e, 0x0, 0x30]}}, &(0x7f00000020c0)=""/4096, 0x64, 0x1000, 0x0, 0x8, 0x10000, @value=r9}, 0x28) (async) socketpair(0x2, 0x5, 0x8, &(0x7f0000003100)) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000031c0)={{r13, 0xffffffffffffffff}, &(0x7f0000003140), &(0x7f0000003180)=r14}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003440)={0x11, 0x10, &(0x7f0000003200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffff}, [@ldst={0x3, 0x0, 0x6, 0x4, 0x9, 0x0, 0x4}, @jmp={0x5, 0x1, 0x6, 0xa, 0x8, 0x100, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r22}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x80}]}, &(0x7f0000003280)='syzkaller\x00', 0x1, 0xa4, &(0x7f00000032c0)=""/164, 0x41100, 0x40, '\x00', r21, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000003380)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000033c0)={0x4, 0x3, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000003400)=[r11, r2, r15, r9, r16], 0x0, 0x10, 0x6b55}, 0x94) (async) ioctl$TUNGETFILTER(r17, 0x801054db, &(0x7f0000003500)=""/58) write$cgroup_type(r10, &(0x7f0000003540), 0x9) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000003600)={{r5, 0xffffffffffffffff}, &(0x7f0000003580), &(0x7f00000035c0)=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000003680)={r23, &(0x7f0000003640)="0dfaf89f9e8dd361e0bdf497"}, 0x20) (async, rerun: 64) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000003740)={r12, 0x0, 0x31, 0x0, &(0x7f00000036c0)="de476d0a71619ea17a589060cfaf31c9e5c9352a9a1b3d8808756c211f29c31a63a4f1637629f4c1e7ad22c957a034f2e0", 0x0, 0x8, 0x0, 0x5, 0x0, &(0x7f0000003700)="5897a2f441", 0x0, 0x2, 0x0, 0xc216}, 0x50) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000037c0)='/dev/net/tun\x00') (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r18, 0x4008240b, &(0x7f0000003840)={0x2, 0x80, 0x3e, 0x5, 0x3, 0xd, 0x0, 0x9, 0x80, 0xb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000003800), 0x8}, 0x8039, 0x8000000000000001, 0xfffffffa, 0x3, 0x6, 0x9, 0x0, 0x0, 0x4, 0x0, 0x4}) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000003a00)={r6, 0x20, &(0x7f00000039c0)={&(0x7f00000038c0), 0x0, 0x0, &(0x7f0000003900)=""/184, 0xb8}}, 0x10) (async, rerun: 64) ioctl$TUNSETVNETLE(r14, 0x400454dc, &(0x7f0000003a40)=0x1) (async, rerun: 64) r25 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003a80)={r19}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003e00)={r25, 0x0, 0xf4, 0x50, &(0x7f0000003ac0)="420bc3afd2621b5965ddc0121904f5b81b5312c64838b94954ab3a254b916ebdea42f24a93dbcbb6861dbec7baf29e901f109d9276831330dcc49efd68adfb5c9a4ebc2d10c30b9fc1e36da24efb9993fccb5b7f7569b3af46c1767f7b5587b6ff7d955a2902c82a15ab7707b15ee285050076cc8b202db7c955c093864e5858c7fdbdd99c867207d38da5008d78a37b63b62cd57e27fcd756195841855aafc6b185e297341ee19306fb0f327de7cddafafc59a1d7a28cb2707df27e04d74e7805421288d6203eed53a4fdc53a1aad043a0e0d50fad834d7a0cfb2f3ee9b4d698ecd4fbfbe75d6c9d0631c9e7d7b7c5580f1cfcf", &(0x7f0000003bc0)=""/80, 0x1fffe000, 0x0, 0x8f, 0xfa, &(0x7f0000003c40)="2fa7f83e53b23e23514589831bd0c5da68787936daa8ad83ae2cc6732c7606eee1a289ec8857c55534e3349ce8b32c526240df670c23f27f0d1043f4a420bec7143a8991244d9c5f885ac5b12cff9a091df3f489080a69f144fabd04d5db002778cf8277451522dd17956fb9d4b96a8108ae45b856b8636d21704854e84d1aadac354fcdf0e55bce1ece010f87c757", &(0x7f0000003d00)="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", 0x7, 0x0, 0x4}, 0x50) (async) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000003e80)=r10, 0x4) r26 = openat$tun(0xffffffffffffff9c, &(0x7f0000003ec0), 0x210100, 0x0) (async) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000004140)={0x18, 0xf, &(0x7f0000003f00)=@raw=[@map_idx_val={0x18, 0xa, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x3, 0x1, 0x0, r7}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x9}], &(0x7f0000003f80)='GPL\x00', 0x400, 0x10, &(0x7f0000003fc0)=""/16, 0x41100, 0x58, '\x00', r21, @fallback=0x6, r8, 0x8, &(0x7f0000004000)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000004040)={0x3, 0x8, 0x6, 0x940000}, 0x10, r24, r10, 0xa, 0x0, &(0x7f0000004080)=[{0x2, 0x4, 0xc, 0x1}, {0x2, 0x4, 0x8, 0x4}, {0x2, 0x4, 0xc, 0x9}, {0x5, 0x1, 0x9, 0x5}, {0x2, 0x4, 0x9}, {0x0, 0x3, 0x5, 0x3}, {0x1, 0x3, 0xb, 0xb}, {0x3, 0x2, 0xf, 0x1}, {0x5, 0x3, 0x7, 0x7}, {0x5, 0x5, 0x1, 0x8}], 0x10, 0x70000000}, 0x94) ioctl$TUNSETSTEERINGEBPF(r26, 0x800454e0, &(0x7f0000004200)=r27) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000004240)) (async) ioctl$TUNSETTXFILTER(r26, 0x400454d1, &(0x7f0000004280)={0x1, 0x8, [@multicast, @multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3d}, @link_local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @local, @multicast]}) 212.888462ms ago: executing program 5 (id=8954): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f00000004000000080000000c"], 0x50) (async) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0x1, 0x1100}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000013da0000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r1, r0}, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="180000002345f3870000000005000000850000002e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 212.483022ms ago: executing program 2 (id=8955): r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040), 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x1a, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, [@alu={0x4, 0x0, 0xa, 0xa, 0xb}, @map_fd={0x18, 0xf, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @ringbuf_query, @map_idx={0x18, 0x3, 0x5, 0x0, 0xd}, @ldst={0x1, 0x2, 0x3, 0x7, 0x2, 0x6, 0x7fffffffffffffff}]}, &(0x7f0000000180)='syzkaller\x00', 0xfff, 0xde, &(0x7f00000001c0)=""/222, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0xd, 0x5, 0x6}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000540)={r1, 0x0, 0xa4, 0x0, &(0x7f0000000400)="f5d329eebb3d96fb967a4bd0b5ed19d12c5f5792d405513ae216bf5cbec59d8a71cb85f904a006decf2d7fe02f062b34d7f56e11674a14e0619529c7a3fb7c5e78bc39bd9a00539c3588a09bbd6694bb601aee30767593e76e343ef3d013d7a7f8e95b700c531b8cdf39e42f11a242f3e9d430abea6ba1304a0faabf772660f51ee6d86530636d43d8ebc60fe3901799b2069fb90ce83c17d32a386502d3da81df65ee3c", 0x0, 0x9, 0x0, 0x5f, 0x0, &(0x7f00000004c0)="2930a5e3dadc21f12f7b36ebf1dd8c6b315312b47c73d5a19d7306550e46317e5671ff36e72828fefad5942b506b26391b20e9c07947922874feae182b862d5f613987aeec81063db5492f26f250038444d58a3e46df83ea869ac91f03790e", 0x0, 0x2, 0x0, 0x7}, 0x50) r2 = getpid() r3 = perf_event_open(&(0x7f0000000680)={0x0, 0x80, 0x2, 0xff, 0x5, 0x6, 0x0, 0x5, 0x8200, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x6}, 0x1c008, 0x272, 0x6, 0x8, 0x3d, 0x4, 0xd, 0x0, 0x80000000, 0x0, 0x168}, 0x0, 0xb, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x80, 0x8, 0xf7, 0x1, 0x0, 0x1, 0x1e02, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000005c0), 0xf}, 0x0, 0x3, 0x1, 0x0, 0xfffffffffffffff7, 0x1, 0x0, 0x0, 0x240, 0x0, 0xe}, r2, 0x10, r3, 0xb) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000740), 0x4804, 0x0) ioctl$TUNDETACHFILTER(r4, 0x401054d6, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x3, 0xd, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_idx={0x18, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x1, 0x9, 0x1, 0x9, 0x30, 0x4}]}, &(0x7f0000000840)='GPL\x00', 0x2c, 0x81, &(0x7f0000000880)=""/129, 0x40f00, 0x76, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x2, 0x6, 0xffffffff}, 0x10, 0x0, r1, 0x4, &(0x7f00000009c0)=[r6], &(0x7f0000000a00)=[{0x4, 0x2, 0x4, 0x6}, {0x0, 0x3, 0xc, 0x9}, {0x3, 0x4, 0x2, 0xb}, {0x4, 0x2, 0x10, 0xb}], 0x10, 0x7}, 0x94) ioctl$TUNSETSTEERINGEBPF(r5, 0x800454e0, &(0x7f0000000b00)=r7) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000b40), 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000c00)={0x1, 0x80, 0xff, 0x2, 0x5, 0x8, 0x0, 0x1, 0xb4aee842805564a1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xdde, 0x3, @perf_config_ext={0x9, 0x7fffffff}, 0x10000, 0x1, 0x8, 0x6, 0x67, 0xbd97, 0x6, 0x0, 0x4, 0x0, 0x6}, r2, 0xf, r3, 0x8) perf_event_open(&(0x7f0000000b80)={0x0, 0x80, 0xc, 0x0, 0x1, 0x4, 0x0, 0x9, 0x8228, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x200, 0x42, 0x4a4, 0x3, 0x101, 0x8001, 0x2, 0x0, 0x401, 0x0, 0x23}, r2, 0x0, r8, 0x5) perf_event_open(&(0x7f0000000c80)={0x1, 0x80, 0x9, 0xe, 0xd3, 0x7, 0x0, 0x100000001, 0x2c002, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7f, 0x4, @perf_config_ext={0x101, 0x8001}, 0x8000, 0x7, 0x4, 0x1, 0x985f, 0x7e, 0x500, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, r8, 0x3) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d00), 0x181, 0x0) ioctl$TUNSETOFFLOAD(r9, 0x400454d0, 0x1e) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000000d40)=0xf65) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000d80), 0x2, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000dc0)={'ip6erspan0\x00', 0x8000}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e40)=@generic={&(0x7f0000000e00)='./file0\x00', 0x0, 0x10}, 0x18) r12 = bpf$ITER_CREATE(0x21, &(0x7f0000000e80), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=@base={0x2, 0xfff, 0x7, 0x7, 0x2000, r11, 0x1, '\x00', 0x0, r12, 0x3, 0x2, 0x3}, 0x50) r13 = syz_open_procfs$namespace(r2, &(0x7f0000000f40)='ns/user\x00') close(r13) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000f80)={'macvlan1\x00', 0x2403}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001200)={0xffffffffffffffff, &(0x7f0000001040)="2c385d677c7b873594111a757c011b92e59b360db90136fcece75a8827ba53c949040a125caec3eedb629786e7ee68f45f208d1e6831064475a86562db88bc3adf23b7527d9937cce866e185c67283d9e4af6e554e0f1b5696bfdf18c8037e944c8807889635f64cfbd31e95fe1b952a55a915335e2d55a08708d78239c1191ddc09e16e4841ce6cf163a63af169e03ab145799758c4112707", &(0x7f0000001100)=""/211}, 0x20) 212.244722ms ago: executing program 2 (id=8956): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) close(r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r3, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r4, @ANYRESHEX, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="01000000010000000200"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x2, 0x3, 0x7, 0x33c72, r0, 0x2, '\x00', r2, r3, 0x3, 0x0, 0xefe7, 0xd, @void, @value, @value=r4}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r7, r6}, 0xc) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000100)) ioctl$TUNSETLINK(r8, 0x400454cd, 0x308) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) ioctl$TUNSETCARRIER(r8, 0x400454e2, &(0x7f0000000200)=0x1) ioctl$SIOCSIFHWADDR(r9, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r11, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random='\x00\a\x00'}) close(r5) 206.784423ms ago: executing program 5 (id=8957): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x3, &(0x7f00000016c0)=ANY=[@ANYBLOB="b4000000000000007911b000000000009500740000000000f565ec193b2fcfc5458f0f1f7167687ea44595d2f9169328f0bef361374aa058c47817f320c90937c10459d4ef9f7ed79b917e0600f1dd0b3580d41723c5cfdce0aeadb4ab6adffad0bc93a8ea5c22c0701bcfdfa959a9d86ce8fd6235df3341137846beec30d5a1"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x94) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x3, 0x0, 0x10, 0xfc, 0x0, 0x0, 0x200, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x3}, 0x0, 0xc8, 0x9, 0x7, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x8, 0x0, 0x200000000000}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002f000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8fffdffb702000000000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa3c"], 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x2, 0x7, 0x0, 0x40400, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x2, 0x7}, 0x50) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x41, 0x64b}, 0x104200, 0x0, 0x7, 0x0, 0xffff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x10}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x600000000000}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x0, 0xe2, 0x1, 0x18, 0x20, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={r3, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x15, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fc9, 0x0, 0x0, 0x0, 0xc72}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @map_val={0x18, 0xb, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0xc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000240)='GPL\x00', 0x3, 0xcd, &(0x7f0000000380)=""/205, 0x41100, 0x0, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[{0x2, 0x5, 0x8, 0x9}, {0x0, 0x5, 0xe, 0x2}, {0x4, 0x5, 0xf, 0x6}, {0x0, 0x5, 0xf, 0xa}, {0x4, 0x4, 0xf, 0xc}, {0x5, 0x4, 0xa, 0x1}], 0x10, 0x5}, 0x94) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)=r0}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0xc, 0x40, 0x3, 0x41}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r10, &(0x7f0000000140), 0x0}, 0x20) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000725e850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001480)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xf9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001540)={0x6, 0x8, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x8c}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f0000000180)='syzkaller\x00', 0x10001, 0x1000, &(0x7f0000000400)=""/4096, 0x40f00, 0x0, '\x00', r7, 0x25, r8, 0x8, &(0x7f0000000200)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x8, 0xf7f, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000340)=[r9, 0xffffffffffffffff, r10, r11, r12, r13], &(0x7f0000001500)=[{0x3, 0x2, 0xb, 0x2}], 0x10, 0x5}, 0x94) 135.169915ms ago: executing program 3 (id=8958): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000006c0)=@bpf_ext={0x1c, 0x16, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x12b6}}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xbc, &(0x7f0000000600)=""/188, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x9, 0x2d, 0xb}, 0x10, 0x2bc48, 0xffffffffffffffff, 0x2, &(0x7f0000000540)=[0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000580)=[{0x3, 0x1, 0x5}, {0x3, 0x3, 0x3, 0xb}], 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r2}, &(0x7f0000000000), &(0x7f0000000780)=r3}, 0x20) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) sendmsg$sock(r4, &(0x7f00000005c0)={&(0x7f0000000280)=@in6={0xa, 0x4e23, 0x8, @empty, 0x6}, 0x80, 0x0}, 0x804) 131.585195ms ago: executing program 5 (id=8959): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x5, 0xffffffffffffff7e, &(0x7f0000000540)=""/172, 0x0, 0x0, '\x00', 0x0, @fallback=0xc}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={r0, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa105000000000000000000f8ffffffb702000008000000b7030000000000008500000006000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 130.299956ms ago: executing program 1 (id=8960): write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0xff, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aa40db80d601c31b90531cbd507b99f5b36ac4ee1de85ab7ac538e7cd3e07d0ca01ce0f5916a7b55c82f091ea0b5407f844a5f5954ad76aaf71b61e0b3961fb74e4939e919f49e8c22e252c47f629164c4ba0d7f6b30a91c68e34f07e4f8cc6b820482e493d50c4bc23ed9874ffc658a4036afa211e1bbdf8813426715f1d6993b530", 0x83}], 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000071107a00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)='/proc/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000a00)='blkio.bfq.sectors_recursive\x00', 0xf0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 104.719326ms ago: executing program 5 (id=8961): openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000600)=0xd, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x19, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x80}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0xffffffffffff0000, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xe0, 0x3, 0x3, 0x0, 0x0, 0x4000000000, 0x10000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000000, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) close(r6) (async) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef) (async) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000180)=r4, 0x4) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r10, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0x103, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x9d, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0xd, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000007c0)=@bpf_tracing={0x1a, 0x19, &(0x7f0000000ac0)=@raw=[@alu={0x4, 0x0, 0x8, 0x0, 0x1, 0x8, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @jmp={0x5, 0x1, 0x7, 0xa, 0x5, 0x50}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f0000000300)='syzkaller\x00', 0x48ce605d, 0xe2, &(0x7f0000000340)=""/226, 0x41000, 0x14, '\x00', r11, 0x18, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x4, 0x7, 0x8, 0x7ff}, 0x10, 0x29e2e, r1, 0x0, 0x0, 0x0, 0x10, 0x841}, 0x94) (async) close(r2) 80.427158ms ago: executing program 5 (id=8962): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x8, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x6, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x2}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000070000000400000002"], 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r1}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r2, &(0x7f0000000240), &(0x7f0000000340)=""/86}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 2 (id=8963): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x7, 0x3, &(0x7f0000000000)=ANY=[@ANYRES64=0x0], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) syz_clone(0x10010000, &(0x7f00000000c0)="613dc189a325723696f7e01fe5e2bc520b2f8335411ca33c433b922d66c7adec1b461fecf6cb5cafee194e31561a6584a0b7a891903c3e84a094194085eb3e3f9e544b73dc2189f36ebbb954ac5b690b7e6871957899968c81cea5e091a280", 0x5f, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="499528248023b6b1c70dc4e1cd827ba39a87350e3424d607bbf7a5595b36d05be41a85f7a8c0d6fb6cb1e7e376bd8ae7c6c93058beb39aa9c5b9d49ee5acb0") r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x80, 0x23, 0x2, 0x5, 0x7, 0x0, 0x2, 0x2000, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000200), 0xd}, 0x2, 0x0, 0x200, 0x5, 0x2, 0x10, 0x2, 0x0, 0x1, 0x0, 0xfffffffffffffff7}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0xc8, 0x80001, 0x4, 0x5, 0x0, 0x200}, 0x0, 0x0, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061120400000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa}, 0x80) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@fallback=r4, 0x0, 0x1, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0}, 0x40) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={0xffffffffffffffff}, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x40}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r7, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={@ifindex, r4, 0x7, 0x2, r4, @void, @value=r6, @void, @void, r5}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000740)={0x1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000440)={@ifindex=r8, r3, 0x5, 0x18, r3, @void, @value=r0, @void, @void, r5}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x40, 0x0, 0x0, 0xfc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000b00)}, 0x84, 0x0, 0x0, 0x0, 0x1, 0xffffffff, 0x0, 0x0, 0xa, 0x0, 0x2}, 0x0, 0x6, 0xffffffffffffffff, 0xb) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x646e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff0001}, [@call={0x85, 0x0, 0x0, 0x7d}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.51' (ED25519) to the list of known hosts. [ 21.479232][ T24] audit: type=1400 audit(1774650602.920:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.483316][ T267] cgroup: Unknown subsys name 'net' [ 21.502666][ T24] audit: type=1400 audit(1774650602.920:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.531568][ T24] audit: type=1400 audit(1774650602.950:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.532049][ T267] cgroup: Unknown subsys name 'devices' [ 21.701614][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.707246][ T267] cgroup: Unknown subsys name 'rlimit' [ 21.848215][ T24] audit: type=1400 audit(1774650603.280:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.871814][ T24] audit: type=1400 audit(1774650603.280:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.896897][ T24] audit: type=1400 audit(1774650603.290:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.905348][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.930884][ T24] audit: type=1400 audit(1774650603.370:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.957054][ T24] audit: type=1400 audit(1774650603.370:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.983174][ T24] audit: type=1400 audit(1774650603.400:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.983653][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.009274][ T24] audit: type=1400 audit(1774650603.400:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.478279][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.485841][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.493545][ T275] device bridge_slave_0 entered promiscuous mode [ 22.501485][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.508679][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.516490][ T275] device bridge_slave_1 entered promiscuous mode [ 22.591023][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.598245][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.607430][ T276] device bridge_slave_0 entered promiscuous mode [ 22.617119][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.624359][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.631843][ T276] device bridge_slave_1 entered promiscuous mode [ 22.648234][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.655440][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.663054][ T282] device bridge_slave_0 entered promiscuous mode [ 22.672486][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.679673][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.687659][ T282] device bridge_slave_1 entered promiscuous mode [ 22.720934][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.728009][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.735658][ T277] device bridge_slave_0 entered promiscuous mode [ 22.745049][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.752146][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.759844][ T277] device bridge_slave_1 entered promiscuous mode [ 22.906051][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.913551][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.921251][ T281] device bridge_slave_0 entered promiscuous mode [ 22.928207][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.935773][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.943306][ T281] device bridge_slave_1 entered promiscuous mode [ 22.974559][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.981704][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.989072][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.996217][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.012457][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.019548][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.026809][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.033916][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.043073][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.050179][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.057833][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.065281][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.097422][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.104524][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.111837][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.119149][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.145696][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.153087][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.160503][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.167564][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.190721][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.198421][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.206175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.213973][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.221260][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.228462][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.235783][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.243012][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.250368][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.258054][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.265367][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.272769][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.280423][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.301829][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.309762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.317769][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.326677][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.333795][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.341556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.349786][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.356939][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.364438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.372636][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.379705][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.419611][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.427726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.436670][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.445600][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.454502][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.461627][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.469268][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.477679][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.485399][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.492784][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.501063][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.508117][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.515554][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.523607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.531980][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.539245][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.546842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.554942][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.563542][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.570631][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.578197][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.586860][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.594092][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.601727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.610019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.629145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.637900][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.646558][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.653791][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.661677][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.669901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.678145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.686464][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.694870][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.703254][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.711372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.719773][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.731504][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.739916][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.756027][ T282] device veth0_vlan entered promiscuous mode [ 23.763729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.772994][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.782203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.790431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.798695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.806288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.821461][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.829925][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.846209][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.854347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.862695][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.870426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.879891][ T277] device veth0_vlan entered promiscuous mode [ 23.887508][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.895721][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.904613][ T276] device veth0_vlan entered promiscuous mode [ 23.913868][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.921402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.928963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.937448][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.952673][ T281] device veth0_vlan entered promiscuous mode [ 23.963377][ T275] device veth0_vlan entered promiscuous mode [ 23.971436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.980042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.988332][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.996337][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.004842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.012933][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.021158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.028928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.037135][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.045058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.058064][ T276] device veth1_macvtap entered promiscuous mode [ 24.065996][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.074598][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.083690][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.091568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.100309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.110081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.119425][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.131065][ T282] device veth1_macvtap entered promiscuous mode [ 24.140117][ T281] device veth1_macvtap entered promiscuous mode [ 24.150896][ T277] device veth1_macvtap entered promiscuous mode [ 24.159919][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.167797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.176319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.185718][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.193519][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.202248][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.215238][ T275] device veth1_macvtap entered promiscuous mode [ 24.227644][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.235902][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.244643][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 24.252883][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.261915][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.270500][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.278732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.287178][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.295593][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.304156][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.312507][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.328362][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.337730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.346559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.355665][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.376763][ T277] request_module fs-gadgetfs succeeded, but still no fs? [ 24.384646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.394857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.403428][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.412252][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.421003][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.429464][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.445450][ T277] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 24.619063][ C1] hrtimer: interrupt took 26647 ns [ 24.850969][ T342] cgroup: syz.0.12 (342) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.872375][ T342] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.761765][ T438] device dummy0 entered promiscuous mode [ 26.214396][ T462] bridge0: port 3(veth1) entered blocking state [ 26.241296][ T462] bridge0: port 3(veth1) entered disabled state [ 26.255477][ T462] device veth1 entered promiscuous mode [ 26.266719][ T462] bridge0: port 3(veth1) entered blocking state [ 26.273058][ T462] bridge0: port 3(veth1) entered forwarding state [ 26.323740][ T466] device veth1 left promiscuous mode [ 26.329276][ T466] bridge0: port 3(veth1) entered disabled state [ 26.667470][ T492] device syzkaller0 entered promiscuous mode [ 26.680172][ T492] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 27.687030][ T580] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 27.771414][ T598] device syzkaller0 entered promiscuous mode [ 27.845176][ T613] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 28.246662][ T24] kauditd_printk_skb: 51 callbacks suppressed [ 28.246675][ T24] audit: type=1400 audit(1774650609.680:125): avc: denied { create } for pid=637 comm="syz.2.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 28.301563][ T24] audit: type=1400 audit(1774650609.730:126): avc: denied { create } for pid=637 comm="syz.2.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 28.583087][ T657] ------------[ cut here ]------------ [ 28.589286][ T657] trace type BPF program uses run-time allocation [ 28.596194][ T657] WARNING: CPU: 1 PID: 657 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 28.607136][ T657] Modules linked in: [ 28.611198][ T657] CPU: 1 PID: 657 Comm: syz.4.99 Not tainted syzkaller #0 [ 28.618856][ T657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 28.629538][ T657] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 28.636637][ T657] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 80 cf 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 28.658775][ T657] RSP: 0018:ffffc90001327448 EFLAGS: 00010246 [ 28.666251][ T657] RAX: bebe7755886bd900 RBX: 0000000000000001 RCX: 0000000000080000 [ 28.675622][ T657] RDX: ffffc900044f6000 RSI: 0000000000001dd3 RDI: 0000000000001dd4 [ 28.683987][ T657] RBP: ffffc90001327490 R08: ffff8881f7127453 R09: 1ffff1103ee24e8a [ 28.694571][ T657] R10: dffffc0000000000 R11: ffffed103ee24e8b R12: ffff888128ee4000 [ 28.702946][ T657] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888119a72800 [ 28.711153][ T657] FS: 00007fbb896186c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 28.720712][ T657] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.727396][ T657] CR2: 00007fbb8ae38dac CR3: 0000000116240000 CR4: 00000000003506b0 [ 28.735798][ T657] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.744230][ T657] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 28.752756][ T657] Call Trace: [ 28.756150][ T657] ? __fdget+0x1a1/0x230 [ 28.773432][ T657] resolve_pseudo_ldimm64+0x55e/0x1060 [ 28.798756][ T657] ? bpf_check+0xdb10/0xdb10 [ 28.803787][ T657] ? kvmalloc_node+0x88/0x130 [ 28.808620][ T657] bpf_check+0x9058/0xdb10 [ 28.813382][ T657] ? bpf_get_btf_vmlinux+0x60/0x60 [ 28.818745][ T657] ? is_bpf_text_address+0x177/0x190 [ 28.824880][ T657] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.830584][ T657] ? __kernel_text_address+0xa0/0x100 [ 28.836144][ T657] ? unwind_get_return_address+0x4d/0x90 [ 28.842125][ T657] ? stack_trace_save+0xf0/0xf0 [ 28.847046][ T657] ? arch_stack_walk+0xee/0x140 [ 28.859144][ T657] ? stack_trace_save+0xa6/0xf0 [ 28.869165][ T657] ? stack_trace_snprint+0xf0/0xf0 [ 28.874945][ T657] ? __kasan_slab_alloc+0x69/0xf0 [ 28.880335][ T657] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.886032][ T657] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.896156][ T657] ? __kasan_kmalloc+0xec/0x110 [ 28.901869][ T657] ? __kasan_kmalloc+0xda/0x110 [ 28.934023][ T657] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 28.957780][ T657] ? selinux_bpf_prog_alloc+0x51/0x140 [ 28.989157][ T657] ? security_bpf_prog_alloc+0x62/0x90 [ 29.006331][ T657] ? bpf_prog_load+0x9d8/0x14a0 [ 29.038167][ T657] ? __se_sys_bpf+0x49a/0x740 [ 29.052334][ T657] ? __x64_sys_bpf+0x7b/0x90 [ 29.071133][ T657] ? do_syscall_64+0x31/0x40 [ 29.097599][ T657] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.119209][ T657] ? memset+0x35/0x40 [ 29.123923][ T657] ? bpf_obj_name_cpy+0x193/0x1e0 [ 29.133400][ T657] bpf_prog_load+0xfca/0x14a0 [ 29.141606][ T657] ? map_freeze+0x320/0x320 [ 29.150959][ T657] ? selinux_bpf+0xc7/0xf0 [ 29.155983][ T657] ? security_bpf+0x82/0xa0 [ 29.162791][ T657] __se_sys_bpf+0x49a/0x740 [ 29.167369][ T657] ? __x64_sys_bpf+0x90/0x90 [ 29.172479][ T657] ? __kasan_check_read+0x11/0x20 [ 29.177661][ T657] __x64_sys_bpf+0x7b/0x90 [ 29.183060][ T657] do_syscall_64+0x31/0x40 [ 29.187733][ T657] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 29.195069][ T657] RIP: 0033:0x7fbb8abbd799 [ 29.199891][ T657] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 29.230175][ T657] RSP: 002b:00007fbb89618028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 29.238690][ T657] RAX: ffffffffffffffda RBX: 00007fbb8ae36fa0 RCX: 00007fbb8abbd799 [ 29.269846][ T657] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 29.290894][ T657] RBP: 00007fbb8ac53c99 R08: 0000000000000000 R09: 0000000000000000 [ 29.345731][ T657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 29.357028][ T657] R13: 00007fbb8ae37038 R14: 00007fbb8ae36fa0 R15: 00007ffdce08e778 [ 29.365254][ T657] ---[ end trace 5d02818ae05d38be ]--- [ 29.380394][ T24] audit: type=1400 audit(1774650610.810:127): avc: denied { cpu } for pid=687 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.499213][ T712] device syzkaller0 entered promiscuous mode [ 29.625290][ T730] device syzkaller0 entered promiscuous mode [ 29.763257][ T739] device veth0_vlan left promiscuous mode [ 29.804899][ T739] device veth0_vlan entered promiscuous mode [ 30.105007][ T24] audit: type=1400 audit(1774650611.540:128): avc: denied { create } for pid=766 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.180456][ T769] device syzkaller0 entered promiscuous mode [ 30.228694][ T774] Ñ26±ÿ: renamed from team_slave_1 [ 30.548359][ T24] audit: type=1400 audit(1774650611.980:129): avc: denied { create } for pid=780 comm="syz.2.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 30.607278][ T781] device wg2 entered promiscuous mode [ 30.849335][ T802] device syzkaller0 entered promiscuous mode [ 31.030552][ T24] audit: type=1400 audit(1774650612.470:130): avc: denied { create } for pid=827 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 31.426700][ T844] device syzkaller0 entered promiscuous mode [ 31.979525][ T904] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.986983][ T904] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.050166][ T923] device pim6reg1 entered promiscuous mode [ 32.650713][ T965] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 32.658888][ T965] device syzkaller0 entered promiscuous mode [ 33.350462][ T986] device syzkaller0 entered promiscuous mode [ 34.754571][ T24] audit: type=1400 audit(1774650616.190:131): avc: denied { create } for pid=1062 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 34.764761][ T1060] device syzkaller0 entered promiscuous mode [ 35.054050][ T1083] device syzkaller0 entered promiscuous mode [ 35.074550][ T1085] device syzkaller0 entered promiscuous mode [ 36.529432][ T1168] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 36.933569][ T1188] Â: renamed from pim6reg1 [ 36.994996][ T24] audit: type=1400 audit(1774650618.430:132): avc: denied { create } for pid=1193 comm="syz.1.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 37.138780][ T1210] device bridge_slave_1 left promiscuous mode [ 37.154925][ T1210] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.199447][ T1210] device bridge_slave_0 left promiscuous mode [ 37.222076][ T1210] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.290091][ T24] audit: type=1400 audit(1774650618.720:133): avc: denied { create } for pid=1207 comm="syz.3.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 38.423533][ T24] audit: type=1400 audit(1774650619.860:134): avc: denied { create } for pid=1273 comm="syz.3.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 38.556184][ T1286] device syzkaller0 entered promiscuous mode [ 38.634090][ T528] syzkaller0: tun_net_xmit 48 [ 39.357095][ T1334] device syzkaller0 entered promiscuous mode [ 40.254081][ T1389] tap0: tun_chr_ioctl cmd 1074025677 [ 40.267011][ T1389] tap0: linktype set to 769 [ 40.616304][ T24] audit: type=1400 audit(1774650622.050:135): avc: denied { create } for pid=1396 comm="syz.4.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 42.094223][ T1441] device syzkaller0 entered promiscuous mode [ 44.033627][ T1537] device sit0 entered promiscuous mode [ 44.573513][ T24] audit: type=1400 audit(1774650626.010:136): avc: denied { create } for pid=1578 comm="syz.2.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 44.628880][ T1586] device syzkaller0 entered promiscuous mode [ 44.820519][ T1593] device syzkaller0 entered promiscuous mode [ 46.458793][ T24] audit: type=1400 audit(1774650627.890:137): avc: denied { create } for pid=1705 comm="syz.4.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 46.707256][ T1727] device syzkaller0 entered promiscuous mode [ 46.936566][ T1753] device vlan0 entered promiscuous mode [ 47.001075][ T1763] device syzkaller0 entered promiscuous mode [ 47.256511][ T24] audit: type=1400 audit(1774650628.690:138): avc: denied { create } for pid=1802 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 47.339123][ T1801] syzkaller1: tun_chr_ioctl cmd 21731 [ 47.347484][ T1801] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 48.302088][ T1851] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 48.369749][ T1851] device syzkaller0 entered promiscuous mode [ 48.478052][ T1851] device wg2 entered promiscuous mode [ 48.705360][ T1869] device syzkaller0 entered promiscuous mode [ 49.102861][ T1895] device syzkaller0 entered promiscuous mode [ 49.499000][ T1919] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 49.818404][ T1944] device bridge0 entered promiscuous mode [ 50.518886][ T1981] device syzkaller0 entered promiscuous mode [ 51.026058][ T2013] syz.2.484 uses obsolete (PF_INET,SOCK_PACKET) [ 51.115287][ T2015] device syzkaller0 entered promiscuous mode [ 51.223987][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.235541][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.252955][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.154437][ T2101] device wg2 entered promiscuous mode [ 52.498291][ T2126] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 53.447340][ T2149] device syzkaller0 entered promiscuous mode [ 53.948056][ T24] audit: type=1400 audit(1774650635.380:139): avc: denied { create } for pid=2189 comm="syz.3.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 54.232289][ T2203] device syzkaller0 entered promiscuous mode [ 55.706069][ T24] audit: type=1400 audit(1774650637.140:140): avc: denied { create } for pid=2277 comm="syz.3.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 56.791328][ T2359] tap0: tun_chr_ioctl cmd 1074025677 [ 56.805312][ T2359] tap0: linktype set to 805 [ 59.511231][ T24] audit: type=1400 audit(1774650640.950:141): avc: denied { create } for pid=2556 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 60.244148][ T2603] sit0: mtu less than device minimum [ 60.582648][ T2646] device syzkaller0 entered promiscuous mode [ 60.651053][ T2654] device syzkaller0 entered promiscuous mode [ 60.897699][ T2676] device pim6reg1 entered promiscuous mode [ 60.919882][ T2678] cgroup: fork rejected by pids controller in /syz4 [ 61.657587][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.665018][ T2718] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.672789][ T2718] device bridge_slave_0 entered promiscuous mode [ 61.679935][ T2718] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.687002][ T2718] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.696965][ T2718] device bridge_slave_1 entered promiscuous mode [ 61.925571][ T2741] device syzkaller0 entered promiscuous mode [ 61.955859][ T24] audit: type=1400 audit(1774650643.390:142): avc: denied { create } for pid=2718 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.003830][ T2718] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.010938][ T2718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.018342][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.025428][ T2718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.060673][ T24] audit: type=1400 audit(1774650643.390:143): avc: denied { write } for pid=2718 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.152300][ T24] audit: type=1400 audit(1774650643.390:144): avc: denied { read } for pid=2718 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 62.252906][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.262586][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.340047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.348001][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.356077][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.365066][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.373881][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.381314][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.391018][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.399865][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.408085][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.415220][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.443956][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.455422][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.540495][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 62.600546][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.701552][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 62.710487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 62.723290][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 62.736915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.749859][ T2718] device veth0_vlan entered promiscuous mode [ 62.760294][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 62.771377][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.793824][ T2718] device veth1_macvtap entered promiscuous mode [ 62.806414][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 62.817140][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 62.831283][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 62.863854][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 62.874527][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 62.890556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 62.905498][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 63.057840][ T24] audit: type=1400 audit(1774650644.490:145): avc: denied { create } for pid=2779 comm="syz.4.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 63.543404][ T2801] device syzkaller0 entered promiscuous mode [ 63.560201][ T24] audit: type=1400 audit(1774650644.990:146): avc: denied { create } for pid=2808 comm="syz.4.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 64.010083][ T2828] device syzkaller0 entered promiscuous mode [ 64.686552][ T2871] lo: mtu less than device minimum [ 64.701276][ T49] device bridge_slave_1 left promiscuous mode [ 64.709767][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.751851][ T49] device bridge_slave_0 left promiscuous mode [ 64.762356][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.770619][ T49] device veth1_macvtap left promiscuous mode [ 64.776779][ T49] device veth0_vlan left promiscuous mode [ 64.962729][ T2873] lo: mtu less than device minimum [ 66.099369][ T2931] device syzkaller0 entered promiscuous mode [ 66.528953][ T24] audit: type=1400 audit(1774650647.960:147): avc: denied { setattr } for pid=2940 comm="syz.2.747" path="pipe:[13867]" dev="pipefs" ino=13867 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 66.532731][ T2948] tap0: tun_chr_ioctl cmd 1074025677 [ 66.588842][ T2948] tap0: linktype set to 805 [ 67.652615][ T3012] device bridge0 entered promiscuous mode [ 69.660337][ T3127] device lo entered promiscuous mode [ 69.768565][ T3129] device syzkaller0 entered promiscuous mode [ 70.223348][ T3152] device syzkaller0 entered promiscuous mode [ 70.388694][ T3176] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.396021][ T3176] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.403408][ T3176] device bridge0 left promiscuous mode [ 70.577797][ T24] audit: type=1400 audit(1774650652.010:148): avc: denied { create } for pid=3188 comm="syz.0.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 70.897851][ T3220] device syzkaller0 entered promiscuous mode [ 73.147762][ T3343] device veth1_macvtap left promiscuous mode [ 73.372587][ T3363] device syzkaller0 entered promiscuous mode [ 74.175370][ T3405] device syzkaller0 entered promiscuous mode [ 74.635218][ T24] audit: type=1400 audit(1774650656.070:149): avc: denied { create } for pid=3430 comm="syz.1.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 74.783022][ T24] audit: type=1400 audit(1774650656.220:150): avc: denied { create } for pid=3445 comm="syz.2.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 75.114221][ T3460] device syzkaller0 entered promiscuous mode [ 75.482415][ T3467] device wg2 entered promiscuous mode [ 76.823568][ T3523] device wg2 left promiscuous mode [ 77.038682][ T3531] device wg2 entered promiscuous mode [ 77.509446][ T3556] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.516679][ T3556] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.601005][ T3563] IPv6: pim6reg1: Disabled Multicast RS [ 77.903609][ T3601] device syzkaller0 entered promiscuous mode [ 77.932622][ T3606] device wg2 left promiscuous mode [ 78.045635][ T3607] batadv0: tun_chr_ioctl cmd 2148553947 [ 78.054069][ T3614] batadv0: tun_chr_ioctl cmd 2148553947 [ 78.121706][ T24] audit: type=1400 audit(1774650659.560:151): avc: denied { create } for pid=3622 comm="syz.0.938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 78.369935][ T3625] device syzkaller0 entered promiscuous mode [ 78.455818][ T3637] device sit0 entered promiscuous mode [ 78.641079][ T3644] device lo entered promiscuous mode [ 78.822615][ T3660] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 78.844344][ T3660] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 78.866600][ T3660] syzkaller0: linktype set to 773 [ 78.896762][ T3660] syzkaller0: tun_chr_ioctl cmd 1074025694 [ 78.989344][ T3670] syz.3.952 (3670) used obsolete PPPIOCDETACH ioctl [ 79.366562][ T3680] device syzkaller0 entered promiscuous mode [ 81.695773][ T3801] device wg2 left promiscuous mode [ 81.725588][ T3804] device wg2 entered promiscuous mode [ 81.837747][ T24] audit: type=1400 audit(1774650663.270:152): avc: denied { create } for pid=3805 comm="syz.0.991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 82.529596][ T3848] device syzkaller0 entered promiscuous mode [ 82.731361][ T3863] device syzkaller0 entered promiscuous mode [ 83.082569][ T3900] device syzkaller0 entered promiscuous mode [ 83.838014][ T3930] cgroup: fork rejected by pids controller in /syz3 [ 83.911833][ T3944] device syzkaller0 entered promiscuous mode [ 84.208559][ T3969] ±ÿ: renamed from team_slave_1 [ 84.811286][ T3991] device syzkaller0 entered promiscuous mode [ 84.940647][ T3985] bridge0: port 1(bridge_slave_0) entered blocking state [ 84.958279][ T3985] bridge0: port 1(bridge_slave_0) entered disabled state [ 84.966208][ T3985] device bridge_slave_0 entered promiscuous mode [ 84.998744][ T3999] device syzkaller0 entered promiscuous mode [ 85.016384][ T3985] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.023856][ T3985] bridge0: port 2(bridge_slave_1) entered disabled state [ 85.031877][ T3985] device bridge_slave_1 entered promiscuous mode [ 85.039379][ T4000] device syzkaller0 left promiscuous mode [ 85.123668][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 85.131739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 85.161556][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 85.191490][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 85.217127][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 85.224505][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 85.299457][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 85.341359][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 85.363911][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 85.371178][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 85.450748][ T4010] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 85.457667][ T4010] pim6reg0: linktype set to 768 [ 85.476491][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 85.490976][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 85.506706][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 85.531554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 85.553316][ T3985] device veth0_vlan entered promiscuous mode [ 85.565007][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.580094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.594610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.625920][ T3985] device veth1_macvtap entered promiscuous mode [ 85.648437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 85.687416][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 85.708591][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 86.770593][ T4060] device syzkaller0 entered promiscuous mode [ 87.063967][ T4091] device syzkaller0 entered promiscuous mode [ 87.268052][ T4088] device syzkaller0 entered promiscuous mode [ 87.294789][ T49] device bridge_slave_1 left promiscuous mode [ 87.301448][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 87.309664][ T49] device bridge_slave_0 left promiscuous mode [ 87.316168][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.328884][ T49] device veth1_macvtap left promiscuous mode [ 87.335233][ T49] device veth0_vlan left promiscuous mode [ 88.007225][ T4152] device syzkaller0 entered promiscuous mode [ 88.241562][ T4164] device syzkaller0 entered promiscuous mode [ 88.272310][ T4167] device syzkaller0 entered promiscuous mode [ 89.282096][ T24] audit: type=1400 audit(1774650670.720:153): avc: denied { create } for pid=4206 comm="syz.3.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 89.456108][ T4215] device syzkaller0 entered promiscuous mode [ 89.615372][ T4231] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 89.621314][ T4231] pim6reg0: linktype set to 768 [ 90.290328][ T4268] device wg2 left promiscuous mode [ 90.396149][ T4278] device syzkaller0 entered promiscuous mode [ 92.490573][ T4445] device aaaaaaaaaaaaaaa entered promiscuous mode [ 93.090555][ T4498] tap0: tun_chr_ioctl cmd 1074025680 [ 93.213144][ T4505] device syzkaller0 entered promiscuous mode [ 94.399468][ T4539] device wg2 entered promiscuous mode [ 94.986603][ T4596] device syzkaller0 entered promiscuous mode [ 95.440288][ T4618] device wg2 left promiscuous mode [ 95.904206][ T24] audit: type=1400 audit(1774650677.340:154): avc: denied { create } for pid=4639 comm="syz.2.1235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 96.000821][ T4656] device dummy0 entered promiscuous mode [ 96.049646][ T4656] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 96.216425][ T4667] device syzkaller0 entered promiscuous mode [ 96.225900][ T886] syzkaller0: tun_net_xmit 48 [ 96.457856][ T4680] device sit0 entered promiscuous mode [ 96.862482][ T4697] cgroup: fork rejected by pids controller in /syz0 [ 97.291469][ T4785] device syzkaller0 entered promiscuous mode [ 97.370132][ T24] audit: type=1400 audit(1774650678.810:155): avc: denied { create } for pid=4794 comm="syz.0.1269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.795387][ T24] audit: type=1400 audit(1774650679.230:156): avc: denied { setattr } for pid=4848 comm="syz.2.1284" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 98.061834][ T4858] device wg2 entered promiscuous mode [ 98.251368][ T4877] device syzkaller0 entered promiscuous mode [ 98.358229][ T4885] syzkaller0: create flow: hash 123654622 index 0 [ 98.646478][ T4879] device syzkaller0 entered promiscuous mode [ 98.770392][ T4900] syzkaller0 (unregistered): delete flow: hash 123654622 index 0 [ 101.614343][ T24] audit: type=1400 audit(1774650683.050:157): avc: denied { create } for pid=5064 comm="syz.0.1348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 103.027968][ T5169] device sit0 left promiscuous mode [ 103.120707][ T5173] device sit0 entered promiscuous mode [ 103.699553][ T5204] device veth1_macvtap left promiscuous mode [ 103.735545][ T5204] device veth1_macvtap entered promiscuous mode [ 103.763342][ T5204] device macsec0 entered promiscuous mode [ 103.906377][ T24] audit: type=1400 audit(1774650685.340:158): avc: denied { read } for pid=5208 comm="syz.0.1382" dev="nsfs" ino=4026532463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 103.992334][ T24] audit: type=1400 audit(1774650685.370:159): avc: denied { open } for pid=5208 comm="syz.0.1382" path="net:[4026532463]" dev="nsfs" ino=4026532463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 104.412859][ T24] audit: type=1400 audit(1774650685.850:160): avc: denied { create } for pid=5224 comm="syz.0.1386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 104.516145][ T5231] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 104.539949][ T24] audit: type=1400 audit(1774650685.980:161): avc: denied { ioctl } for pid=5225 comm="syz.2.1387" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 104.668266][ T5244] syz.1.1392[5244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.668344][ T5244] syz.1.1392[5244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.057502][ T5257] device syzkaller0 entered promiscuous mode [ 105.598542][ T5265] device syzkaller0 entered promiscuous mode [ 106.821683][ T5336] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.828938][ T5336] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.963282][ T5342] device pim6reg1 entered promiscuous mode [ 107.503844][ T5365] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 108.466251][ T5409] device lo entered promiscuous mode [ 109.163007][ T5425] device syzkaller0 entered promiscuous mode [ 110.346657][ T5481] device sit0 left promiscuous mode [ 110.682324][ T5498] device veth1_macvtap left promiscuous mode [ 110.708461][ T5504] device veth1_macvtap entered promiscuous mode [ 110.727796][ T5504] device macsec0 entered promiscuous mode [ 111.033191][ T5514] device syzkaller0 entered promiscuous mode [ 113.926560][ T5610] device veth0_vlan left promiscuous mode [ 113.949131][ T5610] device veth0_vlan entered promiscuous mode [ 114.064276][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.074013][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.090217][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.496444][ T5657] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.503808][ T5657] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.850133][ T24] audit: type=1400 audit(1774650696.290:162): avc: denied { create } for pid=5684 comm="syz.0.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 116.048198][ T5753] device syzkaller0 entered promiscuous mode [ 116.784475][ T5820] device syzkaller0 entered promiscuous mode [ 117.230337][ T5843] device syzkaller0 entered promiscuous mode [ 117.773326][ T24] audit: type=1400 audit(1774650699.210:163): avc: denied { create } for pid=5877 comm="syz.1.1569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 118.606615][ T5896] device syzkaller0 entered promiscuous mode [ 119.089616][ T5955] device syzkaller0 entered promiscuous mode [ 119.166048][ T24] audit: type=1400 audit(1774650700.600:164): avc: denied { attach_queue } for pid=5968 comm="syz.1.1595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 120.145244][ T6038] device syzkaller0 entered promiscuous mode [ 120.179266][ T6039] device veth0_vlan left promiscuous mode [ 120.204340][ T6039] device veth0_vlan entered promiscuous mode [ 121.688610][ T6074] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 121.742699][ T6074] device syzkaller0 entered promiscuous mode [ 123.152185][ T6178] device syzkaller0 entered promiscuous mode [ 123.657099][ T6225] device syzkaller0 entered promiscuous mode [ 123.803509][ T6236] device syzkaller0 entered promiscuous mode [ 125.042436][ T6305] nr0: port 1(macsec0) entered blocking state [ 125.052502][ T6305] nr0: port 1(macsec0) entered disabled state [ 126.120799][ T6385] device syzkaller0 entered promiscuous mode [ 126.504393][ T6422] device syzkaller0 entered promiscuous mode [ 126.638605][ T1665] syzkaller0: tun_net_xmit 48 [ 127.280691][ T6458] device syzkaller0 entered promiscuous mode [ 129.252127][ T6574] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 129.312486][ T6572] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 129.338255][ T6572] syzkaller0: linktype set to 773 [ 129.897304][ T6599] device syzkaller0 entered promiscuous mode [ 129.917701][ T6599] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 130.161425][ T6608] device syzkaller0 entered promiscuous mode [ 131.856637][ T6702] device syzkaller0 entered promiscuous mode [ 133.067333][ T6790] device syzkaller0 entered promiscuous mode [ 133.158345][ T6801] syzkaller1: tun_chr_ioctl cmd 21731 [ 133.171007][ T6801] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 134.354972][ T6853] device wg2 left promiscuous mode [ 134.374053][ T6854] device wg2 entered promiscuous mode [ 134.569240][ T24] audit: type=1400 audit(1774650716.010:165): avc: denied { create } for pid=6869 comm="syz.0.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 134.879542][ T6898] device sit0 left promiscuous mode [ 135.555029][ T6933] device syzkaller0 entered promiscuous mode [ 135.785089][ T6940] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.792304][ T6940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.799666][ T6940] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.806763][ T6940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.815966][ T6940] device bridge0 entered promiscuous mode [ 136.739195][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.087864][ T7011] device syzkaller0 entered promiscuous mode [ 137.169296][ T7022] device syzkaller0 entered promiscuous mode [ 137.178076][ T7011] device syzkaller0 left promiscuous mode [ 137.758923][ T7066] device syzkaller0 entered promiscuous mode [ 139.500259][ T7136] device syzkaller0 entered promiscuous mode [ 140.575683][ T7230] device syzkaller0 entered promiscuous mode [ 141.626295][ T7295] device syzkaller0 entered promiscuous mode [ 141.920023][ T7307] device bridge_slave_1 left promiscuous mode [ 141.938775][ T7307] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.959710][ T7307] device bridge_slave_0 left promiscuous mode [ 141.965919][ T7307] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.614933][ T7342] IPv6: pim6reg1: Disabled Multicast RS [ 143.319268][ T7373] device wg2 entered promiscuous mode [ 143.328318][ T24] audit: type=1400 audit(1774650724.760:166): avc: denied { create } for pid=7364 comm="syz.1.2006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 143.828494][ T7391] device wg2 left promiscuous mode [ 143.912586][ T7398] device wg2 entered promiscuous mode [ 144.075075][ T7397] device syzkaller0 entered promiscuous mode [ 145.266273][ T7461] bridge0: port 3(veth0_vlan) entered blocking state [ 145.291831][ T7461] bridge0: port 3(veth0_vlan) entered disabled state [ 145.357307][ T7461] bridge0: port 3(veth0_vlan) entered blocking state [ 145.365011][ T7461] bridge0: port 3(veth0_vlan) entered forwarding state [ 147.135197][ T7529] device syzkaller0 entered promiscuous mode [ 147.980462][ T7586] device syzkaller0 entered promiscuous mode [ 148.251750][ T7603] device syzkaller0 entered promiscuous mode [ 148.456840][ T7618] bridge0: port 3(veth0_vlan) entered disabled state [ 149.032950][ T7664] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.041961][ T7664] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.060689][ T7664] device bridge0 left promiscuous mode [ 150.841330][ T7797] device syzkaller0 entered promiscuous mode [ 151.642673][ T7844] device macsec0 entered promiscuous mode [ 152.978374][ T7942] device veth0_vlan left promiscuous mode [ 153.042368][ T7942] device veth0_vlan entered promiscuous mode [ 153.346782][ T7952] device syzkaller0 entered promiscuous mode [ 153.912071][ T8015] device wg2 entered promiscuous mode [ 153.929835][ T8013] device syzkaller0 entered promiscuous mode [ 153.949853][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 154.288456][ T8032] device team_slave_1 entered promiscuous mode [ 154.361273][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 154.409693][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.562648][ T8076] device syzkaller0 entered promiscuous mode [ 155.169943][ T8113] tap0: tun_chr_ioctl cmd 1074025692 [ 156.494507][ T8165] tap0: tun_chr_ioctl cmd 35108 [ 157.358355][ T8220] device syzkaller0 entered promiscuous mode [ 158.702395][ T8285] device syzkaller0 entered promiscuous mode [ 158.994242][ T8306] device syzkaller0 entered promiscuous mode [ 159.116928][ T8309] device syzkaller0 entered promiscuous mode [ 159.772073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 162.463236][ T8486] device syzkaller0 entered promiscuous mode [ 162.839908][ T8498] device syzkaller0 entered promiscuous mode [ 163.292966][ T8517] device syzkaller0 entered promiscuous mode [ 164.566520][ T8561] device syzkaller0 entered promiscuous mode [ 164.732264][ T8568] device syzkaller0 entered promiscuous mode [ 164.766126][ T8563] device wg2 left promiscuous mode [ 164.840268][ T8564] device wg2 entered promiscuous mode [ 164.917562][ T8570] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 164.938031][ T8570] device syzkaller0 entered promiscuous mode [ 165.121878][ T8584] geneve1: tun_chr_ioctl cmd 1074025672 [ 165.129277][ T8584] geneve1: ignored: set checksum enabled [ 165.373680][ T8597] : renamed from bond_slave_0 [ 166.220851][ T8632] device syzkaller0 entered promiscuous mode [ 166.313557][ T8652] device syzkaller0 entered promiscuous mode [ 166.324937][ T8651] -1: renamed from syzkaller0 [ 167.140230][ T8718] device syzkaller0 entered promiscuous mode [ 167.626808][ T8754] device veth1_macvtap left promiscuous mode [ 167.647097][ T8754] ÿÿÿÿÿÿ: renamed from vlan1 [ 169.618588][ T8827] device syzkaller0 entered promiscuous mode [ 171.111996][ T8888] device syzkaller0 entered promiscuous mode [ 171.198675][ T24] audit: type=1400 audit(1774650752.630:167): avc: denied { create } for pid=8893 comm="syz.1.2448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 172.283125][ T24] audit: type=1400 audit(1774650753.720:168): avc: denied { create } for pid=8960 comm="syz.3.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 172.647369][ T8990] syz.1.2478[8990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.647432][ T8990] syz.1.2478[8990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.810933][ T9003] veth0_macvtap: mtu less than device minimum [ 174.179685][ T9074] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 175.025638][ T9110] device syzkaller0 entered promiscuous mode [ 177.575484][ T9172] device syzkaller0 entered promiscuous mode [ 177.608871][ T9170] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 177.621442][ T9170] pim6reg0: linktype set to 768 [ 178.345231][ T9188] device syzkaller0 entered promiscuous mode [ 179.244012][ T9220] device syzkaller0 entered promiscuous mode [ 179.256835][ T9220] syzkaller0: create flow: hash 2609191279 index 2 [ 179.269290][ T925] syzkaller0: tun_net_xmit 48 [ 179.310781][ T9220] syzkaller0: delete flow: hash 2609191279 index 2 [ 179.679690][ T9234] device wg2 left promiscuous mode [ 180.688798][ T9308] device syzkaller0 entered promiscuous mode [ 181.347544][ T9364] device syzkaller0 entered promiscuous mode [ 181.464715][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.476202][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.484131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 181.566212][ T9378] device syzkaller0 entered promiscuous mode [ 183.330823][ T9479] device syzkaller0 entered promiscuous mode [ 183.366159][ T9483] syzkaller1: tun_chr_ioctl cmd 21731 [ 183.375170][ T9483] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 183.383797][ T9483] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 183.863568][ T9531] device syzkaller0 entered promiscuous mode [ 183.921659][ T9539] tap0: tun_chr_ioctl cmd 1074025675 [ 183.927195][ T9539] tap0: persist enabled [ 184.051183][ T9531] tap0: tun_chr_ioctl cmd 1074025675 [ 184.066405][ T9531] tap0: persist enabled [ 185.834353][ T9624] device pim6reg1 entered promiscuous mode [ 186.334520][ T9650] device syzkaller0 entered promiscuous mode [ 187.828472][ T9772] device syzkaller0 entered promiscuous mode [ 188.079756][ T24] audit: type=1400 audit(1774650769.520:169): avc: denied { mounton } for pid=9779 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 188.249338][ T9779] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.256756][ T9779] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.266064][ T9779] device bridge_slave_0 entered promiscuous mode [ 188.273589][ T9779] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.280862][ T9779] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.290473][ T9779] device bridge_slave_1 entered promiscuous mode [ 188.392052][ T9779] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.399478][ T9779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.406856][ T9779] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.414067][ T9779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.517869][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.527317][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.563318][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.638617][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.657420][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.664535][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.718157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.769759][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.777054][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.860115][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.868929][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.930801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.947554][ T9779] device veth0_vlan entered promiscuous mode [ 188.957627][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 189.004980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.036845][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 189.048284][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 189.060124][ T9779] device veth1_macvtap entered promiscuous mode [ 189.101767][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 189.117304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 189.151093][ T24] audit: type=1400 audit(1774650770.590:170): avc: denied { unmount } for pid=9779 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 189.465367][ T296] device bridge_slave_1 left promiscuous mode [ 189.480017][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.561951][ T296] device bridge_slave_0 left promiscuous mode [ 189.636786][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.210096][ T9887] device wg2 left promiscuous mode [ 190.284224][ T9898] device syzkaller0 entered promiscuous mode [ 190.296376][ T9887] device wg2 entered promiscuous mode [ 190.472006][ T9914] device syzkaller0 entered promiscuous mode [ 191.851558][T10015] device wg2 entered promiscuous mode [ 192.400353][T10036] device syzkaller0 entered promiscuous mode [ 192.471122][T10036] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.832697][T10177] device macsec0 left promiscuous mode [ 194.938578][T10177] device pim6reg1 left promiscuous mode [ 197.182215][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.470315][T10244] device syzkaller0 entered promiscuous mode [ 198.848112][T10283] device syzkaller0 entered promiscuous mode [ 198.963687][T10290] device syzkaller0 entered promiscuous mode [ 199.042288][T10287] device syzkaller0 left promiscuous mode [ 199.094707][ T24] audit: type=1400 audit(1774650780.530:171): avc: denied { append } for pid=10294 comm="syz.3.2876" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 199.790222][T10352] device wg2 entered promiscuous mode [ 201.167739][T10401] device syzkaller0 entered promiscuous mode [ 201.326010][T10411] device syzkaller0 entered promiscuous mode [ 201.376141][T10414] device syzkaller0 entered promiscuous mode [ 201.444242][T10415] device syzkaller0 entered promiscuous mode [ 201.679630][T10406] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.687123][T10406] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.695431][T10406] device bridge_slave_0 entered promiscuous mode [ 201.704593][T10406] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.713078][T10406] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.721271][T10406] device bridge_slave_1 entered promiscuous mode [ 202.356650][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.368609][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.444007][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.479529][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.540765][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.548379][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.589103][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.619452][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.628353][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.636928][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.646215][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.740849][T10482] device macsec0 left promiscuous mode [ 202.798738][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.807904][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.894043][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.904308][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.000527][T10406] device veth0_vlan entered promiscuous mode [ 203.013745][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 203.043530][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.128869][ T296] device bridge_slave_1 left promiscuous mode [ 203.139125][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.147854][ T296] device bridge_slave_0 left promiscuous mode [ 203.162534][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.405844][T10406] device veth1_macvtap entered promiscuous mode [ 203.413222][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.421734][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.430330][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.440791][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.449798][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.534023][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.590274][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.659594][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 203.720218][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.623430][T10572] device syzkaller0 entered promiscuous mode [ 205.752260][T10653] device syzkaller0 entered promiscuous mode [ 206.542283][T10688] device syzkaller0 entered promiscuous mode [ 206.881545][T10706] device xfrm0 entered promiscuous mode [ 206.888407][T10704] device syzkaller0 entered promiscuous mode [ 207.017356][T10715] device syzkaller0 entered promiscuous mode [ 208.042749][ T24] audit: type=1400 audit(1774650789.480:172): avc: denied { associate } for pid=10759 comm="syz.1.3012" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 210.016556][T10859] device syzkaller0 entered promiscuous mode [ 210.851011][T10925] device vlan0 entered promiscuous mode [ 211.129518][T10932] device syzkaller0 entered promiscuous mode [ 212.063868][T11014] syzkaller0: create flow: hash 649515447 index 0 [ 212.097629][T11010] device syzkaller0 entered promiscuous mode [ 212.139942][ T4395] syzkaller0: tun_net_xmit 48 [ 212.239951][T11027] device syzkaller0 entered promiscuous mode [ 212.249767][T11010] syzkaller0 (unregistered): delete flow: hash 649515447 index 0 [ 213.178430][T11080] device syzkaller0 entered promiscuous mode [ 213.342114][T11093] device syzkaller0 entered promiscuous mode [ 213.402404][T11092] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 213.437726][T11092] syzkaller0: tun_net_xmit 1280 [ 213.466870][T11092] syzkaller0: create flow: hash 2346443791 index 3 [ 213.526568][T11091] syzkaller0: delete flow: hash 2346443791 index 3 [ 213.649086][T11117] device syzkaller0 entered promiscuous mode [ 213.881666][T11128] device syzkaller0 entered promiscuous mode [ 213.995745][T11118] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.034086][T11118] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.059944][T11118] device bridge_slave_0 entered promiscuous mode [ 214.090507][T11118] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.097674][T11118] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.146573][T11118] device bridge_slave_1 entered promiscuous mode [ 214.358635][T11118] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.366648][T11118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 214.375426][T11118] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.382510][T11118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 214.432273][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.458284][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.771461][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.840703][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.897758][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.942333][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.014591][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.022850][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.205067][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.238633][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.331431][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.338699][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.387203][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.409543][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.445866][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.464557][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.565438][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.590123][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.618337][T11118] device veth0_vlan entered promiscuous mode [ 215.681347][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.698710][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.742374][T11118] device veth1_macvtap entered promiscuous mode [ 215.789205][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.800720][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.824317][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.844625][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.879454][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.951363][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.964871][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.017467][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.031844][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.074749][T11215] device syzkaller0 entered promiscuous mode [ 218.042743][T11277] device syzkaller0 entered promiscuous mode [ 218.664896][T11297] device wg2 left promiscuous mode [ 219.370146][T11336] device syzkaller0 entered promiscuous mode [ 219.669985][T11354] device lo entered promiscuous mode [ 219.708162][T11354] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 220.595177][T11366] device syzkaller0 entered promiscuous mode [ 220.860759][T11378] device syzkaller0 entered promiscuous mode [ 220.881143][T11378] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 221.135236][T11415] device syzkaller0 entered promiscuous mode [ 221.236308][T11421] device wg2 entered promiscuous mode [ 221.362426][T11437] device syzkaller0 entered promiscuous mode [ 221.544265][T11448] device syzkaller0 entered promiscuous mode [ 223.745963][T11596] device syzkaller0 entered promiscuous mode [ 226.373955][T11711] €Â0aaaaaaaaa: renamed from pim6reg1 [ 226.652444][T11720] device syzkaller0 entered promiscuous mode [ 226.865580][T11727] device syzkaller0 entered promiscuous mode [ 228.378155][T11811] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 228.405706][T11811] device syzkaller0 entered promiscuous mode [ 228.531054][T11822] bridge0: port 4(veth0_to_bridge) entered blocking state [ 228.548309][T11822] bridge0: port 4(veth0_to_bridge) entered disabled state [ 228.559666][T11822] device veth0_to_bridge entered promiscuous mode [ 229.059422][T11870] device syzkaller0 entered promiscuous mode [ 229.675482][T11905] nr0: port 1(macsec0) entered blocking state [ 229.709265][T11905] nr0: port 1(macsec0) entered disabled state [ 229.724433][T11905] device macsec0 entered promiscuous mode [ 230.679494][T11963] tap0: tun_chr_ioctl cmd 1074025675 [ 230.696104][T11963] tap0: persist disabled [ 230.702619][T11963] tap0: tun_chr_ioctl cmd 1074025675 [ 230.708934][T11963] tap0: persist disabled [ 231.726474][T11998] device syzkaller0 entered promiscuous mode [ 232.068390][T12024] device syzkaller0 entered promiscuous mode [ 234.560751][T12078] device syzkaller0 entered promiscuous mode [ 234.583219][T12086] device syzkaller0 entered promiscuous mode [ 234.908446][T12109] device GPL entered promiscuous mode [ 235.078607][T12128] device vlan0 entered promiscuous mode [ 235.132349][T12128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.787687][T12303] device syzkaller0 entered promiscuous mode [ 242.844350][T12526] bridge0: port 3(veth0_vlan) entered blocking state [ 242.879142][T12526] bridge0: port 3(veth0_vlan) entered disabled state [ 242.887225][T12526] bridge0: port 3(veth0_vlan) entered blocking state [ 242.894297][T12526] bridge0: port 3(veth0_vlan) entered forwarding state [ 244.111505][ T24] audit: type=1400 audit(1774650825.550:173): avc: denied { create } for pid=12572 comm="syz.3.3545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 245.160906][T12588] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.168326][T12588] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.189459][T12588] device bridge_slave_0 entered promiscuous mode [ 245.196719][T12588] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.209014][T12588] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.216554][T12588] device bridge_slave_1 entered promiscuous mode [ 245.415619][T12588] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.422854][T12588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.430219][T12588] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.437279][T12588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.633805][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.649440][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.658756][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.692707][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.705859][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.713214][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.727913][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.740999][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.748149][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.761122][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.771544][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.810234][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.824902][T12588] device veth0_vlan entered promiscuous mode [ 245.833405][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 245.842582][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.889191][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.922276][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.974389][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 245.999702][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.075141][T12588] device veth1_macvtap entered promiscuous mode [ 246.555964][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.599631][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 246.610121][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.630461][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 246.656946][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.821869][ T9] device veth0_to_bridge left promiscuous mode [ 246.859838][ T9] bridge0: port 4(veth0_to_bridge) entered disabled state [ 246.909416][ T9] bridge0: port 3(veth0_vlan) entered disabled state [ 246.918294][ T9] device bridge_slave_1 left promiscuous mode [ 246.931148][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.000368][ T9] device bridge_slave_0 left promiscuous mode [ 247.006565][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.040262][ T9] device veth0_vlan left promiscuous mode [ 248.242325][T12682] device syzkaller0 entered promiscuous mode [ 248.273548][T12711] pim6reg0: tun_chr_ioctl cmd 1074025673 [ 248.611649][T12738] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.619704][T12738] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.229134][T12764] nr0: port 1(macsec0) entered blocking state [ 249.243267][T12764] nr0: port 1(macsec0) entered disabled state [ 249.255318][T12764] device macsec0 entered promiscuous mode [ 249.342130][T12770] device wg2 entered promiscuous mode [ 249.495154][T12784] device syzkaller0 entered promiscuous mode [ 250.108873][T12810] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 251.604251][T12889] device syzkaller0 entered promiscuous mode [ 251.841460][T12901] device syzkaller0 entered promiscuous mode [ 252.896047][T12951] device syzkaller0 entered promiscuous mode [ 253.009725][T12952] device veth0_vlan left promiscuous mode [ 253.050606][T12952] device veth0_vlan entered promiscuous mode [ 253.116523][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.125450][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.133682][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.785066][T13007] device syzkaller0 entered promiscuous mode [ 256.820528][T13153] : port 1(ip6gretap0) entered blocking state [ 256.826951][T13153] : port 1(ip6gretap0) entered disabled state [ 256.845944][T13153] device ip6gretap0 entered promiscuous mode [ 257.251631][T13156] device ip6gretap0 left promiscuous mode [ 257.257752][T13156] : port 1(ip6gretap0) entered disabled state [ 257.514259][T13193] device syzkaller0 entered promiscuous mode [ 257.531194][T13190] device veth1_macvtap left promiscuous mode [ 257.552357][T13190] device veth1_macvtap entered promiscuous mode [ 257.563380][T13190] device macsec0 entered promiscuous mode [ 259.782162][T13303] device dummy0 entered promiscuous mode [ 260.665702][T13353] tap0: tun_chr_ioctl cmd 1074025680 [ 260.752912][T13353] device syzkaller0 entered promiscuous mode [ 262.274538][T13400] device syzkaller0 entered promiscuous mode [ 263.172936][T13437] device sit0 entered promiscuous mode [ 265.349234][T13615] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.377873][T13615] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.399505][T13615] device bridge_slave_0 entered promiscuous mode [ 265.407124][T13615] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.428971][T13615] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.436579][T13615] device bridge_slave_1 entered promiscuous mode [ 265.614265][T13615] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.621773][T13615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.629193][T13615] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.636259][T13615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.726086][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.736177][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.743704][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.760471][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.768879][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.775994][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.785349][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.795077][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.802616][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.882060][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.895019][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.935242][T13615] device veth0_vlan entered promiscuous mode [ 265.997307][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.006069][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.015229][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.022954][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.138022][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 266.147452][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 266.171312][T13615] device veth1_macvtap entered promiscuous mode [ 266.196326][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 266.209599][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.218720][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.232674][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.241670][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.296669][T13674] tap0: tun_chr_ioctl cmd 1074025675 [ 266.306767][T13674] tap0: persist enabled [ 266.340084][T13674] tap0: tun_chr_ioctl cmd 1074025675 [ 266.345428][T13674] tap0: persist disabled [ 266.718692][T13701] device syzkaller0 entered promiscuous mode [ 267.025688][ T9] device macsec0 left promiscuous mode [ 267.039573][ T9] nr0: port 1(macsec0) entered disabled state [ 267.116977][ T9] device bridge_slave_1 left promiscuous mode [ 267.158197][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.210420][ T9] device bridge_slave_0 left promiscuous mode [ 267.257735][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.349072][ T9] device veth1_macvtap left promiscuous mode [ 267.361868][ T9] device veth0_vlan left promiscuous mode [ 267.872256][T13759] ªªªªªª™™: renamed from vlan0 [ 267.926676][T13760] device syzkaller0 entered promiscuous mode [ 268.271311][T13814] tap0: tun_chr_ioctl cmd 1074025675 [ 268.276658][T13814] tap0: persist disabled [ 268.281428][T13814] tap0: tun_chr_ioctl cmd 1074025675 [ 268.286776][T13814] tap0: persist disabled [ 268.382630][T13818] device syzkaller0 entered promiscuous mode [ 269.042720][T13878] device syzkaller0 entered promiscuous mode [ 269.341234][T13898] device syzkaller0 entered promiscuous mode [ 270.221703][T13937] device syzkaller0 entered promiscuous mode [ 270.782420][T13997] device syzkaller0 entered promiscuous mode [ 270.998284][T14000] dummy0: mtu less than device minimum [ 272.140879][T14053] device syzkaller0 entered promiscuous mode [ 273.593979][T14117] device syzkaller0 entered promiscuous mode [ 273.944430][T14149] device wg2 left promiscuous mode [ 275.189163][T14214] device syzkaller0 entered promiscuous mode [ 276.664704][T14294] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.672216][T14294] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.679939][T14294] device bridge_slave_0 entered promiscuous mode [ 276.693890][T14294] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.701406][T14294] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.722138][T14294] device bridge_slave_1 entered promiscuous mode [ 276.918034][T14294] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.925294][T14294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.932930][T14294] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.940052][T14294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.180745][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.204827][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.288997][T14326] @0Ù: renamed from bond_slave_1 [ 277.403560][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.433288][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.450734][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.464443][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.483170][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.490848][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.518928][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.531638][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.540646][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.548189][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.569266][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 277.577858][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 277.587309][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 277.596101][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 277.622714][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 277.631971][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 277.646250][T14294] device veth0_vlan entered promiscuous mode [ 277.668041][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 277.677532][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 277.707924][T14294] device veth1_macvtap entered promiscuous mode [ 277.725715][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.736071][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.751041][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.769514][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.778205][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.827538][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.837207][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.881592][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.905247][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 278.672615][T14380] device syzkaller0 entered promiscuous mode [ 278.897382][T14413] @ÿ: renamed from bond_slave_0 [ 279.105555][T14441] : renamed from bond_slave_0 [ 279.257287][T14456] device wg2 entered promiscuous mode [ 279.805959][ T9] nr0: port 1(macsec0) entered disabled state [ 279.832679][ T9] device veth0_vlan left promiscuous mode [ 280.406076][T14523] IPv6: pim6reg1: Disabled Multicast RS [ 281.582668][T14597] device syzkaller0 entered promiscuous mode [ 282.209146][T14637] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 282.215064][T14637] pim6reg0: linktype set to 768 [ 282.565803][T14673] device syzkaller0 entered promiscuous mode [ 282.711064][T14694] macsec0: mtu less than device minimum [ 284.242788][T14752] device syzkaller0 entered promiscuous mode [ 284.679770][T14789] device syzkaller0 entered promiscuous mode [ 285.584385][ T24] audit: type=1400 audit(1774650867.020:174): avc: denied { create } for pid=14842 comm="syz.0.4161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 285.779893][T14860] device syzkaller0 entered promiscuous mode [ 286.125333][T14881] device veth0_vlan left promiscuous mode [ 286.161047][T14881] device veth0_vlan entered promiscuous mode [ 287.401389][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.420259][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.437487][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.463750][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.519123][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.556741][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.566239][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.578212][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.587677][T14963] sock: sock_set_timeout: `syz.0.4199' (pid 14963) tries to set negative timeout [ 287.850624][T14992] device pim6reg1 entered promiscuous mode [ 288.540958][T15022] @ÿ: renamed from bond_slave_0 [ 288.923835][ T927] syzkaller0: tun_net_xmit 76 [ 288.928720][ T927] syzkaller0: tun_net_xmit 48 [ 289.852392][T15110] net_ratelimit: 24 callbacks suppressed [ 289.852427][T15110] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 290.214571][T15150] device syzkaller0 entered promiscuous mode [ 290.533119][T15152] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 290.579426][T15152] device syzkaller0 entered promiscuous mode [ 290.700441][T15155] tap0: tun_chr_ioctl cmd 35111 [ 290.717220][T15161] tap0: tun_chr_ioctl cmd 1074812118 [ 290.923350][T15172] device sit0 entered promiscuous mode [ 292.620665][T15233] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.768743][T15295] device syzkaller0 entered promiscuous mode [ 294.379918][T15329] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 295.165939][T15379] device syzkaller0 entered promiscuous mode [ 295.750192][T15399] device syzkaller0 entered promiscuous mode [ 296.384742][T15434] device syzkaller0 entered promiscuous mode [ 298.959362][T15567] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 299.043419][T15567] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 299.577548][T15596] tun0: tun_chr_ioctl cmd 2147767506 [ 299.823236][T15598] device syzkaller0 entered promiscuous mode [ 300.325993][T15631] device syzkaller0 entered promiscuous mode [ 300.780871][T15658] : port 1(syz_tun) entered blocking state [ 300.819332][T15658] : port 1(syz_tun) entered disabled state [ 300.826026][T15658] device syz_tun entered promiscuous mode [ 302.547190][T15745] device syzkaller0 entered promiscuous mode [ 303.765808][T15789] device syzkaller0 entered promiscuous mode [ 304.080532][T15811] device syzkaller0 entered promiscuous mode [ 306.118269][T15925] device pim6reg1 entered promiscuous mode [ 307.490945][T15962] device syzkaller0 entered promiscuous mode [ 307.539705][T15965] tap0: tun_chr_ioctl cmd 2147767520 [ 307.588496][T15965] tap0: tun_chr_ioctl cmd 1074812117 [ 307.937244][T15997] tap0: tun_chr_ioctl cmd 35111 [ 307.944233][T15997] tap0: tun_chr_ioctl cmd 1074812118 [ 308.062217][T16012] device bridge0 entered promiscuous mode [ 308.068220][T16012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 308.358355][T16024] device macsec0 entered promiscuous mode [ 308.536103][T16026] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.543489][T16026] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.953815][T16108] device syzkaller0 entered promiscuous mode [ 310.107251][T16115] device syzkaller0 entered promiscuous mode [ 311.093719][T16157] device sit0 left promiscuous mode [ 311.201760][T16163] device sit0 entered promiscuous mode [ 312.392479][T16252] device sit0 left promiscuous mode [ 312.432019][T16252] device sit0 entered promiscuous mode [ 313.233403][T16293] syz.2.4592[16293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.233464][T16293] syz.2.4592[16293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.289373][T16290] device veth1_macvtap left promiscuous mode [ 313.476059][T16290] device veth1_macvtap entered promiscuous mode [ 313.530710][T16290] device macsec0 entered promiscuous mode [ 314.164883][T16336] device syzkaller0 entered promiscuous mode [ 314.670022][T16392] Ÿë: port 1(veth0_to_team) entered blocking state [ 314.684554][T16392] Ÿë: port 1(veth0_to_team) entered disabled state [ 314.816785][T16392] device veth0_to_team entered promiscuous mode [ 315.175100][T16418] device syzkaller0 entered promiscuous mode [ 315.454887][T16436] tap0: tun_chr_ioctl cmd 1074025677 [ 315.464287][T16436] tap0: linktype set to 778 [ 316.180251][T16464] device syzkaller0 entered promiscuous mode [ 317.215362][T16520] device syzkaller0 entered promiscuous mode [ 317.804811][T16558] tun0: tun_chr_ioctl cmd 1074025678 [ 317.810864][T16558] tun0: group set to 1 [ 319.021983][T16627] tap0: tun_chr_ioctl cmd 1074025692 [ 323.114553][T16797] tap0: tun_chr_ioctl cmd 1074025680 [ 323.403411][T16828] device syzkaller0 entered promiscuous mode [ 324.972080][T16910] device team_slave_1 entered promiscuous mode [ 324.997814][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.046678][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.480978][T16931] device syzkaller0 entered promiscuous mode [ 325.543460][T16931] device syzkaller0 left promiscuous mode [ 327.334214][T17052] device syzkaller0 entered promiscuous mode [ 328.808104][T17121] device syzkaller0 entered promiscuous mode [ 328.964722][T17134] bridge0: port 3(gretap0) entered blocking state [ 328.971372][T17134] bridge0: port 3(gretap0) entered disabled state [ 328.978361][T17134] device gretap0 entered promiscuous mode [ 328.984617][T17134] bridge0: port 3(gretap0) entered blocking state [ 328.991132][T17134] bridge0: port 3(gretap0) entered forwarding state [ 330.028732][T17209] device syzkaller0 entered promiscuous mode [ 331.933661][T17325] device syzkaller0 entered promiscuous mode [ 332.564872][T17375] tun0: tun_chr_ioctl cmd 1074025676 [ 332.574848][T17375] tun0: owner set to 0 [ 332.626150][T17376] device wg2 left promiscuous mode [ 332.861258][T17376] device wg2 entered promiscuous mode [ 333.081601][T17398] device syzkaller0 left promiscuous mode [ 333.254859][T17403] device syzkaller0 entered promiscuous mode [ 335.944907][T17515] syz.2.4955[17515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.944975][T17515] syz.2.4955[17515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.484283][T17543] device syzkaller0 entered promiscuous mode [ 336.811781][T17575] device syzkaller0 entered promiscuous mode [ 337.746281][T17620] device team_slave_1 entered promiscuous mode [ 337.774499][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.816164][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 339.514519][T17691] Ÿë: port 1(vlan1) entered blocking state [ 339.520750][T17691] Ÿë: port 1(vlan1) entered disabled state [ 339.527249][T17691] device vlan1 entered promiscuous mode [ 339.968380][T17720] device syzkaller0 entered promiscuous mode [ 341.022727][T17755] bridge0: port 3(veth0_vlan) entered disabled state [ 341.031471][T17755] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.040087][T17755] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.220641][T17760] bridge0: port 3(veth0_vlan) entered disabled state [ 341.256146][T17760] device bridge_slave_1 left promiscuous mode [ 341.269399][T17760] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.291612][T17760] device bridge_slave_0 left promiscuous mode [ 341.298049][T17760] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.641000][T17833] device sit0 left promiscuous mode [ 344.682749][T17859] device wg2 entered promiscuous mode [ 344.850270][T17831] device sit0 entered promiscuous mode [ 344.974896][T17882] device syzkaller0 entered promiscuous mode [ 346.194122][T17963] device veth1_macvtap left promiscuous mode [ 346.202865][T17963] device macsec0 left promiscuous mode [ 346.258413][T17964] device veth1_macvtap entered promiscuous mode [ 346.290727][T17964] device macsec0 entered promiscuous mode [ 348.623585][T18084] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 348.632822][T18084] syzkaller0: linktype set to 0 [ 348.806976][T18086] ÿÿÿÿÿÿ: renamed from vlan1 [ 349.480031][T18132] device syzkaller0 entered promiscuous mode [ 349.680844][T18142] device veth1_macvtap left promiscuous mode [ 349.748429][T18142] device macsec0 left promiscuous mode [ 350.978019][T18221] device syzkaller0 entered promiscuous mode [ 351.118199][T18239] device veth1_macvtap left promiscuous mode [ 351.292828][T18253] device veth0_vlan left promiscuous mode [ 351.316078][T18253] device veth0_vlan entered promiscuous mode [ 352.801419][T18336] device wg2 entered promiscuous mode [ 353.179601][T18381] tap0: tun_chr_ioctl cmd 1074025677 [ 353.185081][T18381] tap0: linktype set to 270 [ 353.341435][T18391] device syzkaller0 entered promiscuous mode [ 353.571417][T18429] device syzkaller0 entered promiscuous mode [ 354.931515][T18486] device syzkaller0 entered promiscuous mode [ 355.642242][T18525] device syzkaller0 entered promiscuous mode [ 355.906827][T18545] -: renamed from syzkaller0 [ 356.460417][T18564] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 356.510017][T18564] device syzkaller0 entered promiscuous mode [ 356.733142][T18586] device syzkaller0 entered promiscuous mode [ 356.951467][T18617] tap0: tun_chr_ioctl cmd 1074025680 [ 356.988025][T18617] tap0: tun_chr_ioctl cmd 35108 [ 357.638642][T18626] device sit0 entered promiscuous mode [ 358.210028][T18665] 6±ÿ: renamed from team_slave_1 [ 358.846808][T18706] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.868155][T18706] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.891859][T18706] device bridge_slave_0 entered promiscuous mode [ 358.940201][T18706] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.958953][T18706] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.977962][T18706] device bridge_slave_1 entered promiscuous mode [ 359.005534][T18724] device syzkaller0 entered promiscuous mode [ 359.371711][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 359.379897][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 359.392565][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.411254][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.429187][ T4458] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.436285][ T4458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.449125][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.495851][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.520528][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.539180][ T4458] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.546269][ T4458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.570376][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.630880][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.645079][ T343] bridge0: port 3(gretap0) entered disabled state [ 359.660853][ T343] device gretap0 left promiscuous mode [ 359.666379][ T343] bridge0: port 3(gretap0) entered disabled state [ 359.799215][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.807966][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.819202][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.832219][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.864632][T18706] device veth0_vlan entered promiscuous mode [ 359.887962][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.902250][T18706] device veth1_macvtap entered promiscuous mode [ 359.935042][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.947776][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.983603][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 360.020548][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 360.071361][ T343] device bridge_slave_1 left promiscuous mode [ 360.096994][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.113887][ T343] device bridge_slave_0 left promiscuous mode [ 360.124595][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.158115][ T343] device veth0_vlan left promiscuous mode [ 361.762549][T18798] device syzkaller0 entered promiscuous mode [ 362.573863][T18861] device syzkaller0 entered promiscuous mode [ 363.273089][T18882] device wg2 entered promiscuous mode [ 365.405143][T19006] tap0: tun_chr_ioctl cmd 1074025681 [ 365.568992][T19019] device vlan0 left promiscuous mode [ 368.569828][T19145] geneve0: tun_chr_ioctl cmd 1074025677 [ 368.579051][T19145] geneve0: linktype set to 1 [ 369.304568][T19185] device syzkaller0 entered promiscuous mode [ 369.598109][T19197] device syzkaller0 entered promiscuous mode [ 370.909861][T19243] device sit0 entered promiscuous mode [ 371.331772][T19276] device syzkaller0 entered promiscuous mode [ 371.777531][T19287] device syzkaller0 entered promiscuous mode [ 371.804912][ T3150] syzkaller0: tun_net_xmit 48 [ 371.812265][T19287] syzkaller0: create flow: hash 474281199 index 0 [ 371.966718][T19287] syzkaller0 (unregistered): delete flow: hash 474281199 index 0 [ 372.138681][T19294] tap0: tun_chr_ioctl cmd 1074025681 [ 372.155032][T19294] tap0: tun_chr_ioctl cmd 35108 [ 372.692087][T19318] device syzkaller0 entered promiscuous mode [ 372.916539][T19333] device syzkaller0 entered promiscuous mode [ 373.124338][T19335] device sit0 left promiscuous mode [ 373.324589][T19338] device sit0 entered promiscuous mode [ 373.627717][T19363] tap0: tun_chr_ioctl cmd 1074025675 [ 373.642175][T19363] tap0: persist enabled [ 373.715345][T19363] tap0: tun_chr_ioctl cmd 1074025675 [ 373.724252][T19363] tap0: persist enabled [ 376.446645][T19488] device syzkaller0 entered promiscuous mode [ 377.603606][T19555] device syzkaller0 entered promiscuous mode [ 377.832924][T19561] device syzkaller0 entered promiscuous mode [ 377.892307][T19561] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 377.919012][ C0] syzkaller0: tun_net_xmit 76 [ 378.129987][T19572] device wg2 left promiscuous mode [ 378.140641][T19572] device wg2 entered promiscuous mode [ 378.873157][T19662] device dummy0 entered promiscuous mode [ 379.065467][T19675] device syzkaller0 entered promiscuous mode [ 379.215473][T19690] device vlan0 entered promiscuous mode [ 380.729317][T19772] device veth1_macvtap left promiscuous mode [ 380.816477][T19773] device syzkaller0 entered promiscuous mode [ 381.046103][T19772] device veth1_macvtap entered promiscuous mode [ 381.057911][T19772] device macsec0 entered promiscuous mode [ 381.076650][ T3161] syzkaller0: tun_net_xmit 48 [ 381.082527][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 381.307555][T19784] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.335984][T19784] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.353042][T19784] device bridge_slave_0 entered promiscuous mode [ 381.377856][T19784] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.397903][T19784] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.419492][T19784] device bridge_slave_1 entered promiscuous mode [ 381.624976][T19784] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.632339][T19784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.639664][T19784] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.646758][T19784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.676761][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.686826][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.697253][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.749115][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.764587][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.771875][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.821252][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.844060][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.851344][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.906005][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 381.933731][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.982003][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 382.023025][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 382.070563][T19784] device veth0_vlan entered promiscuous mode [ 382.079778][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 382.094948][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.123430][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.139743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.159424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 382.169823][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 382.190553][T19784] device veth1_macvtap entered promiscuous mode [ 382.253260][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 382.261583][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 382.289331][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 382.385187][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 382.394953][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 383.000409][ T343] device veth0_to_team left promiscuous mode [ 383.006691][ T343] Ÿë: port 1(veth0_to_team) entered disabled state [ 383.049365][ T343] device bridge_slave_1 left promiscuous mode [ 383.077008][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.114495][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.147463][ T343] device veth1_macvtap left promiscuous mode [ 384.527880][T19954] device syzkaller0 entered promiscuous mode [ 384.996150][T19964] device syzkaller0 entered promiscuous mode [ 385.495808][T20003] device syzkaller0 entered promiscuous mode [ 386.777868][T20053] device syzkaller0 entered promiscuous mode [ 387.259281][T20094] device syzkaller0 entered promiscuous mode [ 387.442295][T20102] device syzkaller0 entered promiscuous mode [ 387.515822][T20103] syz.0.5697[20103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.517520][T20103] syz.0.5697[20103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.639172][T20102] device pim6reg1 entered promiscuous mode [ 388.647172][T20165] syz.0.5714[20165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.651723][T20165] syz.0.5714[20165] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.822543][T20183] tap1: tun_chr_ioctl cmd 1074025692 [ 391.742168][T20349] device syzkaller0 entered promiscuous mode [ 392.331820][T20392] device syzkaller0 entered promiscuous mode [ 393.530385][T20438] device syzkaller0 entered promiscuous mode [ 394.206086][T20486] device wg2 entered promiscuous mode [ 394.622882][T20509] device syzkaller0 entered promiscuous mode [ 394.957492][T20522] device veth1_macvtap left promiscuous mode [ 395.007209][T20522] device veth1_macvtap entered promiscuous mode [ 395.025485][T20522] device macsec0 entered promiscuous mode [ 397.312608][T20675] device syzkaller0 entered promiscuous mode [ 397.391750][T20662] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.398848][T20662] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.426849][T20662] device bridge_slave_0 entered promiscuous mode [ 397.744008][T20662] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.761055][T20662] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.792713][T20662] device bridge_slave_1 entered promiscuous mode [ 398.259811][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 398.270758][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 398.309737][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 398.326994][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 398.339417][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.346530][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 398.359040][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 398.367914][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 398.376428][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.383643][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 398.411849][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 398.419926][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 398.428159][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.445929][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 398.474892][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.485145][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.495068][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.506369][T20662] device veth0_vlan entered promiscuous mode [ 398.532170][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 398.551014][T20662] device veth1_macvtap entered promiscuous mode [ 398.572123][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 398.692138][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 398.938346][ T9] device bridge_slave_1 left promiscuous mode [ 398.945282][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.959960][ T9] device bridge_slave_0 left promiscuous mode [ 398.966258][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.866166][ T24] audit: type=1400 audit(1774650981.300:175): avc: denied { create } for pid=20766 comm="syz.0.5888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 400.143336][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.155556][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.164205][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.200751][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.213059][T20788] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 400.229263][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.249297][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.257554][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.274140][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.281242][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.297806][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.304897][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.313023][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.322369][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.333685][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.347637][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.355848][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.363743][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.372565][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.382689][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.392076][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.403500][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.411707][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.420886][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.442430][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.452661][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.458526][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.552649][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.582577][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.588545][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.632789][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.663723][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.687206][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.700292][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.720694][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.728861][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.750243][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.766249][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.789953][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.806095][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.825183][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.836595][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.852725][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.887094][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.895086][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.913150][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.928579][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 400.975294][T20783] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 402.052152][T20869] device syzkaller0 entered promiscuous mode [ 402.745740][T20902] device syzkaller0 entered promiscuous mode [ 403.200505][T20915] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.212531][T20915] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.225775][T20915] device bridge_slave_0 entered promiscuous mode [ 403.233095][T20915] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.240383][T20915] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.248011][T20915] device bridge_slave_1 entered promiscuous mode [ 403.344010][T20941] device syzkaller0 entered promiscuous mode [ 403.429206][T20915] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.436433][T20915] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.443761][T20915] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.450911][T20915] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.526343][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.580024][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.589756][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 403.607433][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.650415][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.702647][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.709754][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.822584][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 403.876222][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.883383][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.983956][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 404.059249][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 404.077248][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 404.113724][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.126953][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.139284][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.176004][T20915] device veth0_vlan entered promiscuous mode [ 404.245799][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 404.295964][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 404.340872][T20915] device veth1_macvtap entered promiscuous mode [ 404.362050][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 404.385558][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 404.426184][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 404.459153][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 404.507564][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.073455][T21076] nr0: port 1(macsec0) entered blocking state [ 406.093177][T21076] nr0: port 1(macsec0) entered disabled state [ 406.405164][T21101] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 406.435921][T21101] device syzkaller0 entered promiscuous mode [ 406.752485][T21114] device wg2 left promiscuous mode [ 407.405343][T21145] device syzkaller0 entered promiscuous mode [ 407.892013][T21199] device syzkaller0 entered promiscuous mode [ 410.121456][T21284] device syzkaller0 entered promiscuous mode [ 412.059346][T21341] device syzkaller0 entered promiscuous mode [ 412.184347][T21372] device sit0 left promiscuous mode [ 412.306613][T21373] device sit0 entered promiscuous mode [ 412.333284][T21376] syz.1.6070[21376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.333340][T21376] syz.1.6070[21376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.423689][T21385] sock: sock_set_timeout: `syz.0.6069' (pid 21385) tries to set negative timeout [ 412.510171][T21379] device lo entered promiscuous mode [ 413.581986][T21462] ªªªªª»: renamed from syzkaller0 [ 416.174085][T21566] device syzkaller0 entered promiscuous mode [ 416.187573][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 416.413358][T21572] device syzkaller0 entered promiscuous mode [ 416.908115][T21621] device syzkaller0 entered promiscuous mode [ 417.745996][T21647] device syzkaller0 entered promiscuous mode [ 419.202338][T21718] cgroup: fork rejected by pids controller in /syz2 [ 420.073521][T21780] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.081218][T21780] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.088816][T21780] device bridge_slave_0 entered promiscuous mode [ 420.103440][T21780] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.110700][T21780] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.118232][T21780] device bridge_slave_1 entered promiscuous mode [ 420.314987][T21780] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.322104][T21780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.329425][T21780] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.336596][T21780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.537249][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 420.550166][T21135] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.569206][T21135] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.676452][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 420.688776][T20952] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.696047][T20952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.703664][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 420.712175][T20952] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.719379][T20952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.727177][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 420.735698][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 420.846822][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 420.857606][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.869817][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 420.929382][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.943226][T21780] device veth0_vlan entered promiscuous mode [ 421.031879][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 421.041301][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 421.059692][T21780] device veth1_macvtap entered promiscuous mode [ 421.097528][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 421.109576][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 421.117962][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 421.136942][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 421.149404][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 421.392313][T21836] device syzkaller0 entered promiscuous mode [ 421.469861][ T9] device bridge_slave_1 left promiscuous mode [ 421.476150][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.519806][ T9] device bridge_slave_0 left promiscuous mode [ 421.525992][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.544327][ T9] device veth1_macvtap left promiscuous mode [ 421.550604][ T9] device veth0_vlan left promiscuous mode [ 421.885066][T21842] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.892531][T21842] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.621590][T21864] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 422.665603][T21864] device syzkaller0 entered promiscuous mode [ 422.777960][T21872] device syzkaller0 entered promiscuous mode [ 423.023881][T21885] device pim6reg1 entered promiscuous mode [ 423.258340][T21887] geneve0: tun_chr_ioctl cmd 1074025677 [ 423.267064][T21887] geneve0: linktype set to 1 [ 424.624039][T21947] +: renamed from team_slave_1 [ 425.497149][T21981] device syzkaller0 entered promiscuous mode [ 425.551056][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.567418][T21983] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.608656][T21982] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 425.655621][T21982] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 426.938849][T22026] device wg2 entered promiscuous mode [ 427.049772][ T24] audit: type=1400 audit(1774651008.490:176): avc: denied { create } for pid=22034 comm="syz.3.6267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 427.145596][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 427.170477][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 427.191261][T22047] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 427.207632][T22046] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 427.253032][T22046] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 427.279895][T22046] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 427.629128][T22071] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.636447][T22071] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.680696][T22073] device bridge_slave_1 left promiscuous mode [ 427.697205][T22073] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.717555][T22073] device bridge_slave_0 left promiscuous mode [ 427.739149][T22073] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.175619][T22181] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.182916][T22181] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.760241][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 429.809990][T22211] device syzkaller0 left promiscuous mode [ 429.816116][T22211] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 429.899877][T22211] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 430.213745][T22234] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 430.249025][T22234] device syzkaller0 entered promiscuous mode [ 430.269139][T22234] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 430.277706][T22234] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 430.306101][T22233] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 430.322004][T22233] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 430.745240][T22281] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 431.361388][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 431.382694][T22297] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 435.941729][T22529] device veth0_to_bond entered promiscuous mode [ 436.084592][T22535] device syzkaller0 left promiscuous mode [ 436.198690][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 436.241395][T22547] device syzkaller0 entered promiscuous mode [ 436.247504][T22547] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 436.308771][T22547] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 436.449002][T22554] tap1: tun_chr_ioctl cmd 1074025673 [ 436.500116][T22552] tap1: tun_chr_ioctl cmd 35111 [ 436.530217][T22554] tap1: tun_chr_ioctl cmd 1074812118 [ 436.632300][T22567] device syzkaller0 entered promiscuous mode [ 437.399307][T22609] device aaaaaaaaaaaaaaa entered promiscuous mode [ 437.688573][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 437.947765][T22630] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 438.043887][T22619] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 438.065667][T22618] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 438.121043][T22618] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 438.236524][T22618] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 438.818571][T22684] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 438.860903][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 439.065633][T22684] batadv0: tun_chr_ioctl cmd 1074025692 [ 439.107902][T22697] device syzkaller0 entered promiscuous mode [ 439.189834][T22683] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 439.325624][T22716] device syzkaller0 left promiscuous mode [ 439.336962][T22716] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 439.810119][T22742] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 439.925498][T22742] pim6reg0: linktype set to 768 [ 440.189988][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 440.207217][T22753] device syzkaller0 entered promiscuous mode [ 440.215300][T22753] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 440.246439][T22753] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 440.261221][T22750] device syzkaller0 entered promiscuous mode [ 440.653753][T22781] device syzkaller0 entered promiscuous mode [ 440.720582][T22781] device syzkaller0 left promiscuous mode [ 443.286832][T22890] tap1: tun_chr_ioctl cmd 1074025677 [ 443.370371][T22890] tap1: linktype set to 778 [ 444.220184][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 444.231972][T22960] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 444.348892][T22961] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 444.378690][T22960] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 444.759445][T22958] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 444.777574][T22958] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 446.186856][T23037] device syzkaller0 entered promiscuous mode [ 446.686135][T23077] tap1: tun_chr_ioctl cmd 1074025677 [ 446.699154][T23077] tap1: linktype set to 6 [ 447.204026][T23116] device syzkaller0 entered promiscuous mode [ 448.042523][T23169] Ÿë: port 1(veth0_to_team) entered blocking state [ 448.049743][T23169] Ÿë: port 1(veth0_to_team) entered disabled state [ 448.056850][T23169] device veth0_to_team entered promiscuous mode [ 448.897482][T23185] device syzkaller0 entered promiscuous mode [ 449.427831][T23215] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.537249][T23234] device syzkaller0 entered promiscuous mode [ 450.465188][T23288] device syzkaller0 entered promiscuous mode [ 451.571747][T23335] device syzkaller0 left promiscuous mode [ 451.619010][T23335] device syzkaller0 entered promiscuous mode [ 451.728327][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 451.753753][T23343] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 451.778069][T23338] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 451.814481][T23338] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 452.705212][T23416] device syzkaller0 entered promiscuous mode [ 452.924523][ T24] audit: type=1400 audit(1774651034.360:177): avc: denied { create } for pid=23436 comm="syz.4.6678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 454.331697][T23489] device veth1_macvtap left promiscuous mode [ 454.467167][T23489] device veth1_macvtap entered promiscuous mode [ 454.505337][T23489] device macsec0 entered promiscuous mode [ 454.713662][T23505] device syzkaller0 entered promiscuous mode [ 455.784816][T23554] device syzkaller0 entered promiscuous mode [ 456.282107][T23577] bridge0: port 3(gretap0) entered blocking state [ 456.288737][T23577] bridge0: port 3(gretap0) entered disabled state [ 456.309929][T23577] device gretap0 entered promiscuous mode [ 456.407317][T23586] gretap0: mtu less than device minimum [ 456.794558][T23592] device syzkaller0 entered promiscuous mode [ 456.903942][T23603] device wg2 entered promiscuous mode [ 457.622069][T23660] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.629286][T23660] bridge0: port 2(bridge_slave_1) entered listening state [ 457.636549][T23660] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.643815][T23660] bridge0: port 1(bridge_slave_0) entered listening state [ 458.069219][T23660] device bridge0 entered promiscuous mode [ 461.150889][T23806] device wg2 left promiscuous mode [ 461.229172][T23806] device wg2 entered promiscuous mode [ 462.676700][T23903] device syzkaller0 entered promiscuous mode [ 462.946253][T23914] device syzkaller0 entered promiscuous mode [ 463.347210][T23943] device syzkaller0 entered promiscuous mode [ 464.320465][T23980] device syzkaller0 entered promiscuous mode [ 465.551060][T24005] device syzkaller0 entered promiscuous mode [ 465.624655][T24016] device wg2 left promiscuous mode [ 466.179719][T24059] device syzkaller0 entered promiscuous mode [ 466.560670][T24087] device syzkaller0 entered promiscuous mode [ 468.492741][T24190] device syzkaller0 left promiscuous mode [ 469.047362][T24239] device syzkaller0 entered promiscuous mode [ 469.094271][T24229] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.334211][T24229] device bridge_slave_1 left promiscuous mode [ 469.365602][T24229] bridge0: port 2(bridge_slave_1) entered disabled state [ 469.392476][T24229] device bridge_slave_0 left promiscuous mode [ 469.410312][T24229] bridge0: port 1(bridge_slave_0) entered disabled state [ 469.881263][T24268] tun0: tun_chr_ioctl cmd 1074025676 [ 469.886823][T24268] tun0: owner set to 0 [ 470.672891][T24287] Ÿë: port 1(veth0_to_team) entered blocking state [ 470.749326][T24287] Ÿë: port 1(veth0_to_team) entered disabled state [ 470.879402][T24287] device veth0_to_team entered promiscuous mode [ 472.300161][T24367] device syzkaller0 entered promiscuous mode [ 473.655399][T24412] IPv6: GPL: Disabled Multicast RS [ 474.142166][T24451] device syzkaller0 entered promiscuous mode [ 474.161241][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 474.260240][T24445] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 474.835966][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 474.904918][T24487] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 475.480839][T24533] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 475.520809][T24532] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 475.530311][T24536] IPv6: pim6reg1: Disabled Multicast RS [ 475.869550][T24572] device veth0_vlan left promiscuous mode [ 475.881683][T24572] device veth0_vlan entered promiscuous mode [ 476.066018][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 476.080912][T24580] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 476.142300][T24609] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 476.231404][T24609] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 476.242875][T24618] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 476.349729][ T24] audit: type=1400 audit(1774651057.790:178): avc: denied { create } for pid=24624 comm="syz.0.7020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 476.373293][T24608] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 476.566674][T24637] device wg2 left promiscuous mode [ 476.586766][T24637] device wg2 entered promiscuous mode [ 477.039093][T24649] device syzkaller0 left promiscuous mode [ 477.305130][T24674] syz.1.7035[24674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.306353][T24674] syz.1.7035[24674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.909284][T24707] device sit0 left promiscuous mode [ 477.974432][T24707] device sit0 entered promiscuous mode [ 479.565697][T24785] device syzkaller0 entered promiscuous mode [ 480.726006][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 480.738095][T24855] device syzkaller0 entered promiscuous mode [ 480.764467][T24855] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 480.805868][T24859] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 480.824326][T24855] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 480.895322][T24853] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 480.906754][T24853] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 481.029657][T24868] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 481.119928][T24865] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 481.636339][T24913] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 481.681552][T24913] device syzkaller0 entered promiscuous mode [ 481.791092][T24927] device bridge_slave_1 left promiscuous mode [ 481.799039][T24927] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.809769][T24927] device bridge_slave_0 left promiscuous mode [ 481.818988][T24927] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.447744][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.466216][T25006] device syzkaller0 left promiscuous mode [ 482.479285][T25006] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.505704][T25006] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.580263][T25020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.592850][T25020] device syzkaller0 entered promiscuous mode [ 482.599042][T25020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.614673][T25019] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.810194][T25038] device syzkaller0 entered promiscuous mode [ 482.821306][T25042] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.829870][T25042] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 482.845429][T25042] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 483.006623][T25046] device syzkaller0 entered promiscuous mode [ 483.032017][T25044] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 484.361712][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 484.373346][T25127] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 484.405930][T25127] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 484.438740][T25127] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 484.457407][T25126] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 484.481453][T25126] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 484.541338][T25126] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 485.346298][T25178] device syzkaller0 entered promiscuous mode [ 485.752258][T25190] geneve0: tun_chr_ioctl cmd 1074025677 [ 485.778248][T25190] geneve0: linktype set to 823 [ 487.779278][ C0] bridge0: port 1(bridge_slave_0) entered learning state [ 487.786899][ C0] bridge0: port 2(bridge_slave_1) entered learning state [ 488.854754][T25366] device syzkaller0 entered promiscuous mode [ 489.053787][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 489.078910][T25386] syzkaller0: tun_chr_ioctl cmd 1074812118 [ 489.194689][T25398] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 489.230606][T25387] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 490.383023][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 491.033245][T25462] device syzkaller0 entered promiscuous mode [ 491.158264][T25452] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 492.599787][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 492.651862][T25557] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 492.663866][T25564] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 492.713895][T25556] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 492.740865][T25556] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 493.103975][T25579] device syzkaller0 entered promiscuous mode [ 493.949697][T25616] batadv0: tun_chr_ioctl cmd 2148553947 [ 495.090251][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 495.151331][T25667] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 495.920682][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 495.940014][T25701] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 495.971516][T25700] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 496.162747][T25712] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 496.735838][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 496.748754][T25749] device  entered promiscuous mode [ 496.764468][T25749] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 496.831586][T25749] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 496.865727][T25748] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 496.936145][T25748] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 498.436910][T25800] device syzkaller0 entered promiscuous mode [ 499.126507][T25848] syz.0.7379[25848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.126571][T25848] syz.0.7379[25848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.206098][T25851] device wg2 left promiscuous mode [ 499.331419][T25858] device wg2 entered promiscuous mode [ 499.510142][T25862] device syzkaller0 entered promiscuous mode [ 501.417955][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 501.429707][T25967] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 501.454181][T25969] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 501.573829][T25976] device syzkaller0 entered promiscuous mode [ 504.211007][T26113] device sit0 entered promiscuous mode [ 504.583100][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 504.593716][T26134] device syzkaller0 left promiscuous mode [ 504.629278][T26134] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 504.690325][T26134] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 505.273863][T26162] device syzkaller0 entered promiscuous mode [ 506.831477][T26289] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 506.837448][T26289] syzkaller0: linktype set to 772 [ 507.026079][T26308] nr0: port 1(macsec0) entered blocking state [ 507.047854][T26308] nr0: port 1(macsec0) entered disabled state [ 507.284060][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 507.699588][T26330] device syzkaller0 entered promiscuous mode [ 508.026073][T26342] device syzkaller0 entered promiscuous mode [ 508.150088][T26325] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 508.187678][T26348] device syzkaller0 entered promiscuous mode [ 508.470219][T26364] device syzkaller0 entered promiscuous mode [ 509.290941][T26400] sit0: mtu greater than device maximum [ 511.816617][T26510] device pim6reg1 entered promiscuous mode [ 513.187507][T26569] tap0: tun_chr_ioctl cmd 1074025692 [ 513.325401][T26583] device syzkaller0 entered promiscuous mode [ 514.355204][T26636] device sit0 left promiscuous mode [ 514.563725][T26657] device pim6reg1 entered promiscuous mode [ 515.664097][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 515.688077][T26708] device syzkaller0 entered promiscuous mode [ 515.699765][T26708] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 515.775741][T26708] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 515.807503][T26708] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 515.876833][T26708] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 515.889873][T26708] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 516.323168][T26730] device syzkaller0 entered promiscuous mode [ 516.606714][T26707] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 516.669176][T26707] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 516.708393][T26707] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 516.717488][T26707] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 516.877911][T26741] device syzkaller0 entered promiscuous mode [ 517.119880][T26733] device syzkaller0 entered promiscuous mode [ 517.858992][ C0] bridge0: port 2(bridge_slave_1) entered forwarding state [ 517.866454][ C0] bridge0: topology change detected, propagating [ 517.872897][ C0] bridge0: port 1(bridge_slave_0) entered forwarding state [ 517.880130][ C0] bridge0: topology change detected, propagating [ 517.892312][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 517.919510][T26822] device gretap0 left promiscuous mode [ 517.939189][T26822] bridge0: port 3(gretap0) entered disabled state [ 517.956444][T26822] device bridge_slave_1 left promiscuous mode [ 517.979045][T26822] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.999488][T26822] device bridge_slave_0 left promiscuous mode [ 518.027141][T26822] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.819163][T26854] lo: mtu less than device minimum [ 518.955295][T26868] device syzkaller0 entered promiscuous mode [ 519.041654][T26871] device syzkaller0 left promiscuous mode [ 519.629638][T26910] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 519.639077][T26910] syzkaller0: linktype set to 825 [ 519.947942][T26926] device syzkaller0 entered promiscuous mode [ 519.968197][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 519.986698][T26931] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 520.388706][T26942] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.427566][T26942] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.451863][T26942] device bridge_slave_0 entered promiscuous mode [ 520.485462][T26942] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.508915][T26942] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.516512][T26942] device bridge_slave_1 entered promiscuous mode [ 520.717126][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 520.732072][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 520.769637][T26979] IPv6: pim6reg1: Disabled Multicast RS [ 520.786765][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 520.800070][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 520.818538][T20952] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.825680][T20952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 520.834847][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 520.843471][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 520.851969][T20952] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.859053][T20952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 520.876915][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 520.885065][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 520.893348][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 520.903184][T26981] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 520.921370][T26981] device syzkaller0 entered promiscuous mode [ 520.934382][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 520.962688][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 520.970968][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 520.978521][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 520.988127][T26942] device veth0_vlan entered promiscuous mode [ 521.005734][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 521.016233][T26942] device veth1_macvtap entered promiscuous mode [ 521.030177][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 521.071318][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 521.221695][T27008] ³þ: renamed from bond_slave_0 [ 522.699589][T27087] FAULT_INJECTION: forcing a failure. [ 522.699589][T27087] name failslab, interval 1, probability 0, space 0, times 1 [ 522.713298][T27087] CPU: 0 PID: 27087 Comm: syz.2.7752 Tainted: G W syzkaller #0 [ 522.722798][T27087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 522.732946][T27087] Call Trace: [ 522.736292][T27087] __dump_stack+0x21/0x24 [ 522.740659][T27087] dump_stack_lvl+0x1a7/0x208 [ 522.745496][T27087] ? show_regs_print_info+0x18/0x18 [ 522.750896][T27087] dump_stack+0x15/0x1c [ 522.755071][T27087] should_fail+0x3c1/0x510 [ 522.759534][T27087] ? btf_new_fd+0x113/0xa00 [ 522.764080][T27087] __should_failslab+0xa4/0xe0 [ 522.768985][T27087] should_failslab+0x9/0x20 [ 522.773525][T27087] kmem_cache_alloc_trace+0x3a/0x2e0 [ 522.778832][T27087] btf_new_fd+0x113/0xa00 [ 522.783365][T27087] bpf_btf_load+0x5e/0x70 [ 522.787730][T27087] __se_sys_bpf+0x4ea/0x740 [ 522.792269][T27087] ? __x64_sys_bpf+0x90/0x90 [ 522.796894][T27087] ? debug_smp_processor_id+0x17/0x20 [ 522.802294][T27087] __x64_sys_bpf+0x7b/0x90 [ 522.806828][T27087] do_syscall_64+0x31/0x40 [ 522.810083][T27091] device syzkaller0 entered promiscuous mode [ 522.811318][T27087] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 522.823148][T27087] RIP: 0033:0x7ffa67f5f799 [ 522.827605][T27087] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 522.847477][T27087] RSP: 002b:00007ffa669ba028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 522.855912][T27087] RAX: ffffffffffffffda RBX: 00007ffa681d8fa0 RCX: 00007ffa67f5f799 [ 522.864021][T27087] RDX: 0000000000000028 RSI: 0000200000000300 RDI: 0000000000000012 [ 522.872010][T27087] RBP: 00007ffa669ba090 R08: 0000000000000000 R09: 0000000000000000 [ 522.879986][T27087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 522.887956][T27087] R13: 00007ffa681d9038 R14: 00007ffa681d8fa0 R15: 00007ffdeb445f98 [ 523.090410][ T4458] nr0: port 1(macsec0) entered disabled state [ 523.099504][ T4458] device veth1_macvtap left promiscuous mode [ 523.656698][T27149] device syzkaller0 entered promiscuous mode [ 525.267132][T27284] device syzkaller0 entered promiscuous mode [ 525.377733][T27282] device sit0 entered promiscuous mode [ 526.911790][T27349] FAULT_INJECTION: forcing a failure. [ 526.911790][T27349] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 526.968914][T27349] CPU: 1 PID: 27349 Comm: syz.1.7835 Tainted: G W syzkaller #0 [ 526.978013][T27349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 526.988278][T27349] Call Trace: [ 526.991588][T27349] __dump_stack+0x21/0x24 [ 526.996057][T27349] dump_stack_lvl+0x1a7/0x208 [ 527.000756][T27349] ? show_regs_print_info+0x18/0x18 [ 527.005968][T27349] dump_stack+0x15/0x1c [ 527.010147][T27349] should_fail+0x3c1/0x510 [ 527.014579][T27349] should_fail_alloc_page+0x4f/0x60 [ 527.019868][T27349] __alloc_pages_nodemask+0x119/0x620 [ 527.025250][T27349] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 527.030832][T27349] ? memcpy+0x56/0x70 [ 527.034817][T27349] handle_pte_fault+0x1719/0x3750 [ 527.039970][T27349] handle_mm_fault+0xf81/0x1710 [ 527.044846][T27349] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 527.051280][T27349] ? can_reuse_spf_vma+0xe0/0xe0 [ 527.056242][T27349] ? __kasan_check_write+0x14/0x20 [ 527.061496][T27349] ? down_read_trylock+0x106/0x160 [ 527.066748][T27349] ? __init_rwsem+0x1c0/0x1c0 [ 527.071440][T27349] ? vmacache_update+0xb7/0x120 [ 527.076415][T27349] ? find_vma+0x13b/0x150 [ 527.080766][T27349] do_user_addr_fault+0x5a8/0xc90 [ 527.085815][T27349] ? do_kern_addr_fault+0x80/0x80 [ 527.090977][T27349] exc_page_fault+0x5a/0xc0 [ 527.095495][T27349] asm_exc_page_fault+0x1e/0x30 [ 527.100358][T27349] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 527.106698][T27349] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 527.126446][T27349] RSP: 0018:ffffc900011bfb48 EFLAGS: 00050203 [ 527.132540][T27349] RAX: ffffffff823e7401 RBX: 000000000000000f RCX: 0000000000000001 [ 527.140527][T27349] RDX: 0000000000000007 RSI: ffff88812849f214 RDI: 0000200000002540 [ 527.148606][T27349] RBP: ffffc900011bfb78 R08: 30203a636967616d R09: 1ffff11025093e44 [ 527.157081][T27349] R10: dffffc0000000000 R11: ffffed1025093e45 R12: 00007ffffffff000 [ 527.165206][T27349] R13: 000020000000254f R14: ffff88812849f214 R15: 0000200000002540 [ 527.173581][T27349] ? _copy_from_user+0x61/0xd0 [ 527.178358][T27349] ? _copy_to_user+0x78/0x90 [ 527.182979][T27349] bpf_verifier_vlog+0x1b4/0x330 [ 527.187939][T27349] __btf_verifier_log+0xdf/0x130 [ 527.192921][T27349] ? btf_check_sec_info+0x350/0x350 [ 527.198148][T27349] ? memcpy+0x56/0x70 [ 527.202141][T27349] btf_parse_hdr+0x36a/0x7c0 [ 527.206739][T27349] btf_new_fd+0x4af/0xa00 [ 527.211162][T27349] bpf_btf_load+0x5e/0x70 [ 527.215501][T27349] __se_sys_bpf+0x4ea/0x740 [ 527.220703][T27349] ? __x64_sys_bpf+0x90/0x90 [ 527.225310][T27349] ? debug_smp_processor_id+0x17/0x20 [ 527.230685][T27349] __x64_sys_bpf+0x7b/0x90 [ 527.235107][T27349] do_syscall_64+0x31/0x40 [ 527.239528][T27349] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 527.245517][T27349] RIP: 0033:0x7f1603be1799 [ 527.249936][T27349] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 527.269868][T27349] RSP: 002b:00007f160263c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 527.278404][T27349] RAX: ffffffffffffffda RBX: 00007f1603e5afa0 RCX: 00007f1603be1799 [ 527.286385][T27349] RDX: 0000000000000028 RSI: 0000200000000300 RDI: 0000000000000012 [ 527.294377][T27349] RBP: 00007f160263c090 R08: 0000000000000000 R09: 0000000000000000 [ 527.302364][T27349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.310430][T27349] R13: 00007f1603e5b038 R14: 00007f1603e5afa0 R15: 00007fff52a5d448 [ 527.859932][T27382] device syzkaller0 entered promiscuous mode [ 527.929353][T27384] FAULT_INJECTION: forcing a failure. [ 527.929353][T27384] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 527.971634][T27384] CPU: 0 PID: 27384 Comm: syz.0.7849 Tainted: G W syzkaller #0 [ 527.980662][T27384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 527.990733][T27384] Call Trace: [ 527.994049][T27384] __dump_stack+0x21/0x24 [ 527.998395][T27384] dump_stack_lvl+0x1a7/0x208 [ 528.003086][T27384] ? thaw_kernel_threads+0x220/0x220 [ 528.008392][T27384] ? show_regs_print_info+0x18/0x18 [ 528.013692][T27384] ? vsnprintf+0x14e/0x1990 [ 528.018247][T27384] ? memcpy+0x56/0x70 [ 528.022247][T27384] dump_stack+0x15/0x1c [ 528.026410][T27384] should_fail+0x3c1/0x510 [ 528.031016][T27384] should_fail_usercopy+0x1a/0x20 [ 528.036064][T27384] _copy_to_user+0x20/0x90 [ 528.040586][T27384] bpf_verifier_vlog+0x1b4/0x330 [ 528.045542][T27384] __btf_verifier_log+0xdf/0x130 [ 528.050494][T27384] ? btf_check_sec_info+0x350/0x350 [ 528.055713][T27384] ? memcpy+0x56/0x70 [ 528.059711][T27384] btf_parse_hdr+0x396/0x7c0 [ 528.064315][T27384] btf_new_fd+0x4af/0xa00 [ 528.068656][T27384] bpf_btf_load+0x5e/0x70 [ 528.073012][T27384] __se_sys_bpf+0x4ea/0x740 [ 528.077532][T27384] ? __x64_sys_bpf+0x90/0x90 [ 528.082147][T27384] ? debug_smp_processor_id+0x17/0x20 [ 528.087878][T27384] __x64_sys_bpf+0x7b/0x90 [ 528.092310][T27384] do_syscall_64+0x31/0x40 [ 528.096742][T27384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 528.102650][T27384] RIP: 0033:0x7f5cf247c799 [ 528.107224][T27384] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 528.127111][T27384] RSP: 002b:00007f5cf0ed7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 528.135562][T27384] RAX: ffffffffffffffda RBX: 00007f5cf26f5fa0 RCX: 00007f5cf247c799 [ 528.143551][T27384] RDX: 0000000000000028 RSI: 0000200000000300 RDI: 0000000000000012 [ 528.151542][T27384] RBP: 00007f5cf0ed7090 R08: 0000000000000000 R09: 0000000000000000 [ 528.159562][T27384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 528.167554][T27384] R13: 00007f5cf26f6038 R14: 00007f5cf26f5fa0 R15: 00007ffd6767f448 [ 528.722805][T27432] device syzkaller0 entered promiscuous mode [ 529.085313][T27444] -1: renamed from syzkaller0 [ 529.293669][T27448] device syzkaller0 entered promiscuous mode [ 529.835338][T27466] device syzkaller0 entered promiscuous mode [ 530.635563][T27520] device veth1_macvtap left promiscuous mode [ 530.694138][T27520] device veth1_macvtap entered promiscuous mode [ 530.702008][T27520] device macsec0 entered promiscuous mode [ 532.946483][T27628] device veth1_macvtap left promiscuous mode [ 534.295285][T27672] device syzkaller0 entered promiscuous mode [ 534.451168][T27704] tap0: tun_chr_ioctl cmd 1074025677 [ 534.456572][T27704] tap0: linktype set to 23 [ 534.461400][T27704] tap0: tun_chr_ioctl cmd 1074025677 [ 534.466809][T27704] tap0: linktype set to 778 [ 534.531170][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.546658][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.552395][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.557795][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.563558][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.569647][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.578697][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.584806][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.595483][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.600939][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.606290][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.611870][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.617203][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.623138][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.628456][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.634115][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.649811][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.655377][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.665299][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.670844][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.686427][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.693897][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.705470][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.713534][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.719540][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.727213][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.770994][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.776434][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.787572][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.793201][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.798568][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.804091][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.809636][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.815088][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.820997][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.853303][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.858712][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 534.894658][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.919070][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.924646][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 534.990747][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.031226][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.036586][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.108958][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 535.147349][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 535.153109][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.189721][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 535.218964][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.239109][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.278284][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 535.294702][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 535.301243][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.336971][T27712] tap0: tun_chr_ioctl cmd 1074025673 [ 535.371362][T27715] tap0: tun_chr_ioctl cmd 1074025681 [ 536.961995][T27845] device syzkaller0 entered promiscuous mode [ 537.504781][T27864] device syzkaller0 entered promiscuous mode [ 538.489231][T27965] batadv0: tun_chr_ioctl cmd 1074025677 [ 538.494842][T27965] batadv0: linktype set to 776 [ 538.500012][T27965] batadv0: tun_chr_ioctl cmd 1074025672 [ 538.505565][T27965] batadv0: ignored: set checksum disabled [ 539.148298][T27978] device wg2 left promiscuous mode [ 540.255838][T28035] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 540.607351][T28037] device syzkaller0 entered promiscuous mode [ 541.342564][T28089] device syzkaller0 entered promiscuous mode [ 542.557012][T28164] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.564139][T28164] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.571922][T28164] device bridge_slave_0 entered promiscuous mode [ 542.579135][T28164] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.586225][T28164] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.593815][T28164] device bridge_slave_1 entered promiscuous mode [ 542.658395][T28164] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.665473][T28164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.672790][T28164] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.679969][T28164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 542.707024][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 542.716219][T21135] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.723933][T21135] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.740790][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 542.749089][T21135] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.756150][T21135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 542.766047][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 542.774923][T21135] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.782004][T21135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.799777][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 542.808135][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 542.834870][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 542.857805][T28164] device veth0_vlan entered promiscuous mode [ 542.869020][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 542.879381][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 542.893320][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 542.916238][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 542.939386][T28164] device veth1_macvtap entered promiscuous mode [ 542.990411][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 543.028140][T21135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 543.888571][T28220] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.895795][T28220] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.904757][T28220] device bridge_slave_0 entered promiscuous mode [ 543.949073][T28220] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.959786][T28220] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.988979][T28220] device bridge_slave_1 entered promiscuous mode [ 544.434296][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 544.447207][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 544.495471][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 544.504991][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 544.513846][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.520946][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.528421][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 544.542323][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 544.550900][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.558076][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 544.565732][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 544.763968][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 544.775998][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 544.788729][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 544.800505][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 544.894956][T28220] device veth0_vlan entered promiscuous mode [ 544.902829][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 544.911326][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 544.919877][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 544.927914][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 544.936395][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 544.944145][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 545.081505][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 545.101485][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 545.123725][T28220] device veth1_macvtap entered promiscuous mode [ 545.210587][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 545.222941][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 545.255347][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 545.264470][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 545.573500][T28299] Ÿë: port 1(veth0_to_team) entered blocking state [ 545.580251][T28299] Ÿë: port 1(veth0_to_team) entered disabled state [ 545.587303][T28299] device veth0_to_team entered promiscuous mode [ 546.158008][T28332] device syzkaller0 entered promiscuous mode [ 546.627731][T28359] 7B’ç÷ï: renamed from syzkaller0 [ 549.214711][T28483] tap0: tun_chr_ioctl cmd 35108 [ 549.915087][T28502] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.931465][T28502] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.969986][T28502] device bridge_slave_0 entered promiscuous mode [ 549.983789][T28502] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.997777][T28502] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.009436][T28502] device bridge_slave_1 entered promiscuous mode [ 550.033212][T28514] device syzkaller0 entered promiscuous mode [ 550.184551][T28502] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.191652][T28502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 550.199094][T28502] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.206218][T28502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 550.346900][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 550.364745][ T4458] bridge0: port 1(bridge_slave_0) entered disabled state [ 550.390350][ T4458] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.424808][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 550.460277][ T4458] bridge0: port 1(bridge_slave_0) entered blocking state [ 550.467376][ T4458] bridge0: port 1(bridge_slave_0) entered forwarding state [ 550.533941][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 550.590265][ T4458] bridge0: port 2(bridge_slave_1) entered blocking state [ 550.597359][ T4458] bridge0: port 2(bridge_slave_1) entered forwarding state [ 550.758861][T28521] nr0: port 1(macsec0) entered blocking state [ 550.764983][T28521] nr0: port 1(macsec0) entered disabled state [ 550.789812][T28521] device macsec0 entered promiscuous mode [ 550.875654][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 550.935280][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 551.029543][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 551.102508][T28502] device veth0_vlan entered promiscuous mode [ 551.142270][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 551.192232][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 551.284415][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 551.345725][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 551.417032][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 551.488147][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 551.523580][T28502] device veth1_macvtap entered promiscuous mode [ 551.595729][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 551.609244][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 551.645665][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 551.719366][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 551.749241][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 551.864745][T28548] device syzkaller0 entered promiscuous mode [ 552.000903][T21135] device veth0_to_team left promiscuous mode [ 552.007008][T21135] Ÿë: port 1(veth0_to_team) entered disabled state [ 552.061096][T21135] device veth1_macvtap left promiscuous mode [ 552.067493][T21135] device veth0_vlan left promiscuous mode [ 552.254197][T28563] device syzkaller0 entered promiscuous mode [ 552.478063][T28578] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.485298][T28578] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.495477][T28579] device bridge_slave_1 left promiscuous mode [ 552.501869][T28579] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.509614][T28579] device bridge_slave_0 left promiscuous mode [ 552.515792][T28579] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.091298][T28625] device syzkaller0 entered promiscuous mode [ 553.097446][T28625] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 553.167061][T28628] device syzkaller0 entered promiscuous mode [ 553.236440][T28640] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.243696][T28640] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.410202][T28641] device bridge_slave_1 left promiscuous mode [ 553.426277][T28641] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.459463][T28641] device bridge_slave_0 left promiscuous mode [ 553.465776][T28641] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.633825][T28649] device veth0_vlan left promiscuous mode [ 553.644908][T28649] device veth0_vlan entered promiscuous mode [ 553.662652][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 553.671864][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 553.679955][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 553.811227][T28662] device vlan0 entered promiscuous mode [ 554.009146][T28674] device veth0_vlan left promiscuous mode [ 554.036103][T28674] device veth0_vlan entered promiscuous mode [ 558.142279][T28897] device syzkaller0 entered promiscuous mode [ 559.410024][ T24] audit: type=1400 audit(1774651140.850:179): avc: denied { setattr } for pid=28981 comm="syz.2.8330" path="pipe:[93474]" dev="pipefs" ino=93474 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 560.308325][T29038] device syzkaller0 entered promiscuous mode [ 561.111123][T29052] device syzkaller0 entered promiscuous mode [ 565.029642][T29197] device syzkaller0 entered promiscuous mode [ 565.820035][T29264] device syzkaller0 entered promiscuous mode [ 566.222443][T29302] nr0: port 1(macsec0) entered blocking state [ 566.228619][T29302] nr0: port 1(macsec0) entered disabled state [ 567.338270][T29369] device syzkaller0 entered promiscuous mode [ 567.636477][T29382] device sit0 entered promiscuous mode [ 569.589968][T29462] device sit0 entered promiscuous mode [ 571.029788][T29519] lo: mtu less than device minimum [ 571.148107][T29524] device syzkaller0 entered promiscuous mode [ 572.079784][T29568] device syzkaller0 entered promiscuous mode [ 572.868181][T29596] device wg2 entered promiscuous mode [ 573.782346][T29633] device syzkaller0 entered promiscuous mode [ 573.820765][T29630] -1: renamed from syzkaller0 [ 574.516157][T29686] : port 1(syz_tun) entered blocking state [ 574.529642][T29686] : port 1(syz_tun) entered disabled state [ 574.549631][T29686] device syz_tun entered promiscuous mode [ 574.927059][T29718] device syzkaller0 entered promiscuous mode [ 575.195144][T29751] device veth1_macvtap left promiscuous mode [ 575.279116][T29767] device veth1_macvtap entered promiscuous mode [ 575.289650][T29767] device macsec0 entered promiscuous mode [ 575.386685][T29777] device syzkaller0 entered promiscuous mode [ 575.474453][T29781] device veth1_macvtap left promiscuous mode [ 575.793650][T29792] device syzkaller0 entered promiscuous mode [ 575.836137][T29792] device syzkaller0 left promiscuous mode [ 576.490607][T29837] device wg2 entered promiscuous mode [ 576.823245][T29853] Ñ26±ÿ: renamed from team_slave_1 [ 577.049735][ T4458] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 577.541340][T29916] device lo entered promiscuous mode [ 577.642198][T29932] device syzkaller0 entered promiscuous mode [ 577.710081][T29944] device syzkaller0 entered promiscuous mode [ 577.845736][T29956] device syzkaller0 entered promiscuous mode [ 579.275111][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.295479][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.322474][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.649996][T30021] device syzkaller0 entered promiscuous mode [ 579.699948][T30024] device syzkaller0 entered promiscuous mode [ 580.616017][T30045] @ÿ: renamed from bond_slave_0 [ 581.008605][T30071] device pim6reg1 entered promiscuous mode [ 581.476450][T30087] device syzkaller0 entered promiscuous mode [ 582.302292][T30143] ÿÿÿÿÿÿ: renamed from vlan1 [ 583.031593][T30209] device syzkaller0 entered promiscuous mode [ 583.413374][T30227] device syzkaller0 left promiscuous mode [ 583.868152][T30251] device syzkaller0 entered promiscuous mode [ 584.347641][ T24] audit: type=1400 audit(1774651165.780:180): avc: denied { create } for pid=30279 comm="syz.1.8699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 584.446365][T30284] device syzkaller0 entered promiscuous mode [ 585.308929][T21780] device syz_tun left promiscuous mode [ 585.315622][T21780] : port 1(syz_tun) entered disabled state [ 585.965346][T30331] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.029166][T30331] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.061422][T30331] device bridge_slave_0 entered promiscuous mode [ 586.090797][T30331] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.103340][T30331] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.137457][T30331] device bridge_slave_1 entered promiscuous mode [ 586.557901][T30368] device syzkaller0 entered promiscuous mode [ 586.954602][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 586.971490][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 586.982644][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 587.037892][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 587.061398][T20952] bridge0: port 1(bridge_slave_0) entered blocking state [ 587.068467][T20952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 587.079045][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 587.089196][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 587.098434][T20952] bridge0: port 2(bridge_slave_1) entered blocking state [ 587.105544][T20952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 587.231551][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 587.240297][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 587.248496][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 587.257247][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 587.265985][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 587.326260][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 587.369196][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 587.421381][T30331] device veth0_vlan entered promiscuous mode [ 587.442158][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 587.451873][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 587.494511][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 587.504459][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 587.515121][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 587.524884][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 587.549989][T30331] device veth1_macvtap entered promiscuous mode [ 587.591755][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 587.606478][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 587.641304][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 587.708120][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 587.783702][T20952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 589.031816][ T343] device veth0_to_team left promiscuous mode [ 589.037920][ T343] Ÿë: port 1(veth0_to_team) entered disabled state [ 589.098661][ T343] device macsec0 left promiscuous mode [ 589.114184][ T343] nr0: port 1(macsec0) entered disabled state [ 589.624370][T30477] device syzkaller0 entered promiscuous mode [ 589.658371][T30489] device syzkaller0 entered promiscuous mode [ 591.641737][T30605] device wg2 entered promiscuous mode [ 591.776938][T30619] tap0: tun_chr_ioctl cmd 2147767520 [ 592.820649][T30650] device vlan0 entered promiscuous mode [ 593.527354][T30688] Ÿë: port 1(veth0_to_team) entered blocking state [ 593.548505][T30688] Ÿë: port 1(veth0_to_team) entered disabled state [ 593.570601][T30688] device veth0_to_team entered promiscuous mode [ 594.045753][T30703] device syzkaller0 entered promiscuous mode [ 595.633612][T30777] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 595.729168][T30782] device wg2 left promiscuous mode [ 595.769260][T30780] device wg2 entered promiscuous mode [ 597.045400][T30858] bridge0: port 3(veth0_to_bridge) entered blocking state [ 597.066121][T30858] bridge0: port 3(veth0_to_bridge) entered disabled state [ 597.092847][T30858] device veth0_to_bridge entered promiscuous mode [ 597.121758][T30858] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 597.169999][T30858] bridge0: port 3(veth0_to_bridge) entered blocking state [ 597.177273][T30858] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 597.347607][T30869] device syzkaller0 left promiscuous mode [ 599.056437][T30928] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 599.107861][T30928] device syzkaller0 entered promiscuous mode [ 599.461889][ T24] audit: type=1400 audit(1774651180.900:181): avc: denied { read } for pid=30935 comm="poweroff" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Stopping sshd: stopped /usr/sbin/sshd (pid 186) OK Stopping crond: stopped /usr/sbin/crond (pid 179) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 133) [ 600.635880][ T24] audit: type=1400 audit(1774651182.070:182): avc: denied { search } for pid=30999 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Stopping network: [ 600.918371][ T24] audit: type=1400 audit(1774651182.350:183): avc: denied { write } for pid=134 comm="dhcpcd" name="dhcpcd" dev="tmpfs" ino=411 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 600.975572][ T24] audit: type=1400 audit(1774651182.350:184): avc: denied { remove_name } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 OK [ 601.064001][ T24] audit: type=1400 audit(1774651182.350:185): avc: denied { unlink } for pid=134 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 Stopping iptables: [ 601.104661][ T24] audit: type=1400 audit(1774651182.380:186): avc: denied { unlink } for pid=134 comm="dhcpcd" name="pid" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 OK Stopping system message bus: [ 601.154954][ T24] audit: type=1400 audit(1774651182.400:187): avc: denied { read write } for pid=31024 comm="ip" path="/dev/console" dev="rootfs" ino=36 scontext=system_u:system_r:ifconfig_t tcontext=system_u:object_r:root_t tclass=chr_file permissive=1 [ 601.199100][ T24] audit: type=1400 audit(1774651182.570:188): avc: denied { search } for pid=31040 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 601.248859][ T24] audit: type=1400 audit(1774651182.570:189): avc: denied { write } for pid=31040 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 601.291020][ T24] audit: type=1400 audit(1774651182.570:190): avc: denied { add_name } for pid=31040 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 done killall: can't kill pid 301: No such process Stopping klogd: OK Stopping acpid: [ 602.433576][T31136] device syzkaller0 entered promiscuous mode OK Stopping syslogd: stopped /sbin/syslogd (pid 77) OK umount: can't remount debugfs read-only [ 603.002660][T31198] device syzkaller0 entered promiscuous mode [ 603.018287][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Connection to 10.128.0.51 closed by remote host. Sent SIGTERM to all processes Sent SIGKILL to all processes Requesting system poweroff [ 604.619547][T21135] device veth0_to_team left promiscuous mode [ 604.625828][T21135] Ÿë: port 1(veth0_to_team) entered disabled state [ 604.633025][T21135] nr0: port 1(macsec0) entered disabled state [ 604.640304][T21135] device bridge_slave_1 left promiscuous mode [ 604.646420][T21135] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.653865][T21135] device bridge_slave_0 left promiscuous mode [ 604.660090][T21135] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.667925][T21135] device bridge_slave_1 left promiscuous mode [ 604.674169][T21135] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.681615][T21135] device bridge_slave_0 left promiscuous mode [ 604.687743][T21135] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.696144][T21135] device veth0_vlan left promiscuous mode [ 604.702134][T21135] device veth1_macvtap left promiscuous mode [ 604.708337][T21135] device veth1_macvtap left promiscuous mode [ 604.714425][T21135] device veth0_vlan left promiscuous mode [ 605.303255][T31223] kvm: exiting hardware virtualization [ 605.310272][T31223] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 605.317060][T31223] ACPI: Preparing to enter system sleep state S5 [ 605.323755][T31223] reboot: Power down serialport: VM disconnected.