last executing test programs: 9.498575419s ago: executing program 3 (id=8641): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80281, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000040)) (async) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_to_team\x00'}) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f00000000c0)=0x9) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)) (async) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000100)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000140)={'macsec0\x00', @multicast}) socketpair(0x29, 0x80000, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x8, 0x7f, 0x5, 0x4008, 0xffffffffffffffff, 0x767, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4, 0xd}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000240), &(0x7f0000000280)='%+9llu \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0x1}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={0x1, 0xffffffffffffffff}, 0x4) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xc1e, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@o_path={&(0x7f00000003c0)='./file0\x00', 0x0, 0x4010, r1}, 0x18) (async) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@o_path={&(0x7f00000003c0)='./file0\x00', 0x0, 0x4010, r1}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@restrict={0xc}, @type_tag={0xe, 0x0, 0x0, 0x12, 0x1}, @func={0xc, 0x0, 0x0, 0xc, 0x3}, @float={0x5, 0x0, 0x0, 0x10, 0x8}, @restrict={0x1, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x2e, 0x5f, 0x30]}}, &(0x7f0000000740)=""/246, 0x59, 0xf6, 0x0, 0x8, 0x10000}, 0x28) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x1}, 0xc) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x1}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x2d, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x2}, @map_fd={0x18, 0x4, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @alu={0x7, 0x0, 0x3, 0x6, 0xa, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @map_fd={0x18, 0x0, 0x1, 0x0, r5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000005c0)='syzkaller\x00', 0x7dd, 0x0, 0x0, 0x40f00, 0x4, '\x00', r7, 0x25, r8, 0x8, &(0x7f0000000880)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, r9], 0x0, 0x10, 0xab0}, 0x94) perf_event_open$cgroup(&(0x7f0000000a40)={0xbbc836bf2f2d30cd, 0x80, 0x5, 0xce, 0xfd, 0xe, 0x0, 0x1, 0x9008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xc4c5, 0x8000000000000000}, 0x60, 0x9, 0xaf, 0x7, 0x3, 0x10000, 0x627, 0x0, 0x40, 0x0, 0x8000000000000001}, r4, 0x7, 0xffffffffffffffff, 0x5) (async) r10 = perf_event_open$cgroup(&(0x7f0000000a40)={0xbbc836bf2f2d30cd, 0x80, 0x5, 0xce, 0xfd, 0xe, 0x0, 0x1, 0x9008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0xc4c5, 0x8000000000000000}, 0x60, 0x9, 0xaf, 0x7, 0x3, 0x10000, 0x627, 0x0, 0x40, 0x0, 0x8000000000000001}, r4, 0x7, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000ac0)=',*\\*}*\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000ac0)=',*\\*}*\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b00)) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000b40)={r9, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={r11, 0x58, &(0x7f0000000b80)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c00)={r11, 0x58, &(0x7f0000000b80)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)) gettid() (async) r12 = gettid() r13 = perf_event_open$cgroup(&(0x7f0000000d40)={0x5, 0x80, 0xb, 0x3, 0x1, 0xd, 0x0, 0xfff, 0x82000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000d00), 0xd4b626ecd547f4dd}, 0x2, 0x4, 0x4, 0xe, 0x6, 0x4, 0x8, 0x0, 0x1ff}, 0xffffffffffffffff, 0x1, r10, 0x4) perf_event_open(&(0x7f0000000c80)={0x3, 0x80, 0x5, 0x1, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x102c0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, @perf_config_ext={0x6, 0xb}, 0x11004, 0x3, 0x4, 0xf, 0x8, 0x25, 0x4, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, r12, 0xd, r13, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r14, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000e00)="509258128a0f28da545c6a8864b51e713e939a6b1c075867c547f14244a6e5d7ab7c23da696c60103f555407646b8712cddaad31bb1e07a382a5a6b59b984a4364dd73eb37447ea9959b04d90e79ac5a1e3c5d0e0b94bb77570cecf3baecb3f27b4a0502ff7eaf457d54af677f40e04dff9b0e168d572afa663342c6d44997ee9d2fb62ca176a619a5a2d13c9319a7e3c76c897fdb62f04da7485b4e888d2ce2dab2921381dc3e09f49d5b7b27dd319b9107c4139d443c023503aecbbe363f261e5de60ab4aa39c5423b7a60e42394f1b93a8dbb45bc41b07bbd", 0xda}, {&(0x7f0000000f00)="4443db737714edfc6529eebf7006fc98a0a667acd7e22571b227a7126621c3e88bbe3536bbee208d226cd4023139b162a8f956a2fdfc843564a63a4c35b94ee64392", 0x42}, {&(0x7f0000000f80)}, {&(0x7f0000000fc0)="b65b7facbbb29a39354abe3b9e9ea5826fcc4d306c717d9f6554ca4ffc6f94dd12b7d51b8266d76fbae2e83388a4c225a2", 0x31}, {&(0x7f0000001000)="3074e41a03d1098b921e90b2c4d1d27ff0d9ef74335bcce0460dfb7ce040eead5d49242201e9ae5619f5e10110a732ce330b8871f4177fb68bcddf59849ca78c850022f977b03984d86b1ec635c876773a010ae75ed06f999587e70be732a3d92f902845fb1498c575036db7a36ff5386bcbf29347cc9700a3ffe7e39cdd52aed72f8a93ce7d1c904f3e76e5ba2ba4", 0x8f}], 0x5}, 0x48001) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x101) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001280)={r5, &(0x7f0000001180)="fd9f8c561d9ed7a24420027f19f28dd9b4bf139265104c5c2ed6b36fad39eaaa253bba3109f4db5084c28d623cd43ed7fb3a6861ac93851c60be334e65a360ec2f8fe89bff4d380db34295337b8c9a2fd24d7c29abfab9d89a38740f9c26fd3b970a2b961971331d955a0a064803207668dcf180", &(0x7f0000001200)=""/101}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f00000012c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x9, [@enum64={0x10, 0x8, 0x0, 0x13, 0x1, 0x1, [{0x5, 0x8001, 0x1ba}, {0x1, 0x8, 0x6}, {0x9, 0xc, 0x4}, {0x1, 0x2, 0x8}, {0x5, 0xd90d, 0x1}, {0x9, 0x1, 0x3c23}, {0xf, 0x7, 0x2}, {0xc, 0x8, 0x1ff}]}]}, {0x0, [0x0, 0x6e, 0x2e, 0x61, 0x61, 0x5f, 0x0]}}, &(0x7f0000001380)=""/156, 0x8d, 0x9c, 0x1, 0x1}, 0x28) 9.465263171s ago: executing program 3 (id=8642): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1c, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xc}, 0x94) 9.350980569s ago: executing program 3 (id=8645): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x14100}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x15, 0x10, 0x2}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f5, &(0x7f0000000900)={'sit0\x00', @random="0060230c1100"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea032c00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r4 = openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000600), 0x12) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xd}, 0x1fab4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@base={0xa, 0x4, 0xfff, 0x7}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xb, 0x5, 0x400, 0xb, 0x1}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x19}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0xc18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r5, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 8.302262962s ago: executing program 3 (id=8658): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0x1, 0x180, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, r1}, 0x50) close(r1) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$LINK_DETACH(0x22, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0, 0xe}, 0x400, 0x2000001, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x0, 0x0}, 0x8) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r4, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r5, r3, 0x0, r2}, 0x10) 8.298403482s ago: executing program 3 (id=8660): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071123f00000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@fallback=r0, 0x7, 0x0, 0x5, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0]}, 0x40) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) 8.192196899s ago: executing program 3 (id=8663): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETOFFLOAD(r0, 0x400454ce, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="ae000000000000007111b7000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x22) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x10117, 0x80, 0xa0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETOFFLOAD(r0, 0x400454ce, 0xa) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="ae000000000000007111b7000000000016000000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x22) (async) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x10117, 0x80, 0xa0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) 4.572593322s ago: executing program 0 (id=8740): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000900)={0x0, 0x2, [@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}]}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000002c0)={'geneve0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x52, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x0, 0x34a4c000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2, 0x0, 0x2101, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) socketpair(0x2a, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x8000c, 0x8}, 0x410, 0x2000001, 0xfffffffc, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r3}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) close(r6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1a1102, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x306) close(r4) 3.385597574s ago: executing program 0 (id=8761): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0100000006000000060000000800000040000000", @ANYRES32, @ANYBLOB="000040000000000040c10bc635560c6b00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, 0x10020) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xaf}}, &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18f811000700000000000c4d8847222176c400000080000085003e0000750000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b705000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d40)={r7, 0x0, 0xe, 0x0, &(0x7f0000000040)="0000ffffffffa000903626e43925", 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 2.291957791s ago: executing program 1 (id=8768): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) (async, rerun: 64) r1 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) (rerun: 64) close(r1) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000340)=@framed={{0x18, 0x8}, [@map_idx={0x18, 0x5, 0x5, 0x0, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @generic={0xc, 0x0, 0x0, 0x0, 0x7}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @exit={0x95, 0x0, 0xc00}], {0x95, 0x0, 0x7000}}, &(0x7f0000000000)='GPL\x00', 0x4, 0xe9, &(0x7f0000000640)=""/233, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="02000000040000000700000002"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000730140000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="180000000000000000000000feffffff850000002300000085000000230000009500000000000000463a53fb345f9653d0c2a5d85fbcbdc479558e7c0c4a97b285372fd4554be78aa1c39a18b968cea249d6ba76af1650dc77"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', r3, 0x4000, r3}, 0x18) 2.225094715s ago: executing program 4 (id=8769): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpu.weight.nice\x00', 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 2.143587611s ago: executing program 4 (id=8770): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110cf00000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="1100"], 0xa) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000000c00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000005000000000000009500000000000000b1f8306e05d1e4aab009c16b5c05077115d0749619ca39f89974785ae0619b77c6585f678ac92a3b6b4148f56b43c3dd75d75f97c8f92f60a2def458df05e2fbfb3e849b2b3cffd4f29446ae60dd76654b2639b2bc14350706214a6ab7a712d4317fbc3ca01d0d3ed6110b3775903141a5091a4d3db8eb335414fbdb288aba73aaf6d18000a3a2a069cf7f9402e1425bb6bc370576aa1faea0fe222671ecf99038fce8dba53dcb11f87cca"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006111000000000000711a0eff000000009500000c00000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x23}, 0x22) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)={@ifindex, r1, 0x11}, 0xa) (async) syz_clone(0x40000480, &(0x7f0000000040)="514e80fafbf48dcce05bb964f355471420f2136d43ce5451916087a71f3ab75dc489f597dcbe1ea7de71da2642e4083dcbc5b698724eac7d5410", 0x3a, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="a4ba77571b7035019a67ce6773c7fb9279d977ff3dcbd542652f387a6ee9f6abc96940fd60a6948f1626d37d0f0737fb1c44a79b3bb8b568196f06de66199c2a4b78498a5e4ff7c34b0f5af65641ce47172d3b9646869ba660da8432e7e8319cfe9c3a424e03f2532ac59bfa5b9fb56b1d1c1b94c99dc8fa285122b80af3") 2.086481195s ago: executing program 4 (id=8771): openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x414, 0x2000000, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, 0x0, &(0x7f0000000480)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x81142, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000280)=""/73}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r5, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext, 0x102002, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x1a9) 2.069285466s ago: executing program 1 (id=8772): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000780)={'pim6reg0\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'tunl0\x00', @link_local}) write$cgroup_int(r0, &(0x7f0000000240)=0x2, 0x12) close(0x3) 1.733602619s ago: executing program 1 (id=8774): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000040000000400000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1b, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x400}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x0, 0x0, 0xb, 0x7, 0x30}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xa}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xb}, @generic={0x1, 0xd, 0x1, 0x100, 0x6}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='GPL\x00', 0x2, 0x95, &(0x7f0000000140)=""/149, 0x40f00, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000400)=[r0, r1, r2, r0, r1, r0, 0x1], &(0x7f00000004c0)=[{0x2, 0x5, 0x6, 0x8}, {0x5, 0x1, 0x2, 0x5}, {0x5, 0x3, 0x2, 0xc}, {0x5, 0x4, 0xa, 0x3}, {0x5, 0x6, 0x2}, {0x5, 0x1, 0x10, 0x4}, {0x0, 0x5, 0xc, 0x4}], 0x10, 0x1}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r3}, 0xc) 1.72110376s ago: executing program 1 (id=8775): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1e) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.1479619s ago: executing program 2 (id=8778): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{r2, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x7b, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a81bff88caffff4060632f77fbac14142ce934a0a662079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000)="ffabeeb6ab51a48157219144d3619b5cb8cbe72e2e49c15c8546cc944e1eea07229c36ff23a9fdc249c00c3368e20431c100149b8925001b89aa24e3037645d8b1908f8ff028ddedb0390d5aa98e879d7ae537970fffac36a053cd2f4ed3a74b6a58ede7b852ed394968f50ce6846d7ca9"}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) (async) close(r0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(r0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0xfffffffc}, 0x50) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{r2}, &(0x7f00000009c0), &(0x7f0000000a00)}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0xae31cbdd19173c73, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x7b, 0x0, &(0x7f0000000100)="b9ff030f6044238cb89e14f088a81bff88caffff4060632f77fbac14142ce934a0a662079f4b4d2f87e56dca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000, 0x0, 0x0, &(0x7f0000000000)="ffabeeb6ab51a48157219144d3619b5cb8cbe72e2e49c15c8546cc944e1eea07229c36ff23a9fdc249c00c3368e20431c100149b8925001b89aa24e3037645d8b1908f8ff028ddedb0390d5aa98e879d7ae537970fffac36a053cd2f4ed3a74b6a58ede7b852ed394968f50ce6846d7ca9"}, 0x2c) (async) 949.651504ms ago: executing program 4 (id=8779): bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="150000001000000008"], 0x50) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x77) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32=r2], 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000000000f37538e486dd630080fc5c082c00db5bffffffffff000000060300000023000000000000000000000000ac1414aa2c200007"], 0xfdef) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r4, 0x20, &(0x7f0000000700)={&(0x7f0000000500)=""/201, 0xc9, 0x0, &(0x7f0000000600)=""/201, 0xc9}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r2, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0x2f, &(0x7f0000000300)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000780), 0x8, 0xb8, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @cgroup_device, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5, r2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 934.497565ms ago: executing program 2 (id=8780): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2083}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x2, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x2e, 0xe]}}, &(0x7f0000000480)=""/171, 0x29, 0xab, 0x1}, 0x28) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 848.416531ms ago: executing program 1 (id=8781): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000007000000000000000000000001050000001000000000000000010000850200000000000000020000000000004100000000da"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x1}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x400000, [{0x6, 0x3, 0x1b}]}]}, {0x0, [0x2e, 0x2e, 0x61, 0x61, 0x30, 0x2e, 0x5f]}}, &(0x7f0000000580)=""/250, 0x39, 0xfa, 0x1}, 0x28) 765.422177ms ago: executing program 2 (id=8782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x1c, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r0, @ANYBLOB="00000000000000b7080000000000007b8af8ff00000000bfa20c4000d64aa49b38d766c92aeca955000000f3000007020000f8ffffffb703000018000000b7040000020000008500"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x1, 0x16, 0xb4, 0x7f, 0x5}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r2, @ANYBLOB="001800000000000079006a01000000001800000000000000000000000000000095000800000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x7, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000000800000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xd, 0x941159a9, 0xca, 0x7fffffff, 0x0, r0, 0x9, '\x00', r1, r5, 0x0, 0x5, 0x2}, 0x50) 682.408942ms ago: executing program 1 (id=8783): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x20, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc5, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000740), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0xd, &(0x7f0000001080)=ANY=[], 0x0, 0x3f6, 0x2d, &(0x7f0000000c80)=""/45, 0x41100, 0x5f, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000cc0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000d00)={0x5, 0xe, 0x2, 0x4}, 0x10, r1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, 0x0, 0x15) write$cgroup_int(r4, &(0x7f0000000440), 0x12) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a000000050000000300000004"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a00)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xfffff000, '\x00', r0, r2, 0x1, 0x3, 0x3}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ac0)=@bpf_lsm={0x1d, 0x13, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffed, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0x4, 0x8, 0x9, 0x100, 0xfffffffffffffff0}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000008c0)='syzkaller\x00', 0x1, 0x61, &(0x7f0000000900)=""/97, 0x41000, 0x0, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000980)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000009c0)={0x2, 0xf, 0xfffffffa, 0xfca}, 0x10, r1, 0x0, 0x0, &(0x7f0000000a80)=[r4, r7, r4], 0x0, 0x10, 0x5dd6}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x12, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007b000000180100002020782500000000002020207b1af8ff0000000007010000f8ff02ffb702000008000000b703000000000000850000005e00000095"], &(0x7f00000006c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000f51701000020756c2500000000002020207b1af8ff00000000bfa100000000000007daea79cad6a8b9aec128b0e8010000f8ffffffb70200000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305829, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x81, &(0x7f0000000180)=[{}, {}], 0x10, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', r10, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x50) 630.244926ms ago: executing program 2 (id=8784): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x4, 0x7, 0x5, 0x0, 0xe000000000, 0x800a, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x40, 0x3, @perf_bp={&(0x7f0000000040), 0xa85d4cb07744f0ec}, 0x1500, 0xc, 0x4, 0x5, 0x0, 0x7, 0x3, 0x0, 0x1, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x1}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0x40, 0xc0, 0x1}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x20000050) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 293.67967ms ago: executing program 2 (id=8785): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/233, 0xe9}], 0x1, &(0x7f0000002d00)=""/4080, 0xff0}, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0xd, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x4, @perf_bp={0x0}, 0x4100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000001c0)=ANY=[@ANYBLOB="0a00000016000000b40000000300000000000000", @ANYBLOB="3eccb2042e1702b0a8dcb52da93928ed95b53e15dcd9031efafb28f636ecdee63713f6c525be588c48b0d0db803637d347b869330d5d02177f148a226437dd5c421715dc264dfce043f106dc5930bb67e9f757f6278092854fbe4228c3b698", @ANYBLOB="00000000c65006ed851d297b3d7cce00000000f1edffffffffffe9ff000000", @ANYRES32=0x0, @ANYRES8=r2, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x79, 0x0, 0x0, 0xed}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) 289.02622ms ago: executing program 0 (id=8786): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_ext={0x1c, 0x25, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@exit, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x31c}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @map_val={0x18, 0x9, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x129}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @printk={@lld}, @generic={0x3, 0x0, 0x9, 0x9, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000240)='GPL\x00', 0x8, 0x71, &(0x7f00000003c0)=""/113, 0x40e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x0, 0x7f, 0x2}, 0x10, 0xfe98, 0xffffffffffffffff, 0x0, &(0x7f0000000580)=[r2, r0, r0, r0, r0], 0x0, 0x10, 0x8}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000840), &(0x7f0000000880)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r3, &(0x7f00000000c0)="84d09a77", 0x0}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r4, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001440)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffcac, 0xfffffffffffffffd}}, 0x10) 277.787461ms ago: executing program 0 (id=8787): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000300)="534d6fa86dc9", 0x6}], 0x1}, 0x8000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x13, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000fe1f702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000017000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27cb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$inet(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000cc0)="aa", 0x1}], 0x1}, 0x800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.swap.events\x00', 0x275a, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000050000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r4}, 0xc) setsockopt$sock_attach_bpf(r0, 0x1, 0x2a, &(0x7f0000000100)=r3, 0x4) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="620a272b9875a97b18174300000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000050000006a0a00fe00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c061c6238975d43a4505f80e39c9f3c530cf08e467b592f868ee3b0a435df0a0e8c1bf176db2a6b2feb4b77d3d5707bfd2d84aaa3b1d4e984c46ea7e2b347a36f5662403e1b2be4284322a4908a0d411a9872971c7c46f0979bd10b97163c066d0e196bf02f46c7953ab1abdaf9de9ca3c00cb9bf4e418d076feafa22f0610a70f2bdf4000200000066b60d00b0c2c1254f0963f63223b7b80197aa3161f45346b100000000000000000089e399f6609876b5887437a172ebc02a740694298b79dc194e533583412dff048fc21f28bdd3e26a1a8a0481e9f0da43bb6ca66e2f55a9ff19ffcafe3e64be033c9d2f972cc93c1c13caec04a367c24a9fb6a6991ddb737d527d6acb15426415b6e8b14f822e86067a5e991c3b404984dfa2c6e94bd0339454c13ad3c328a182c15dc760a3000000005dc2ed0e0b29e98fa883c71949a34d84030323e3d54f45b29d27643453ad9211e3550ee5520211d9370175133f260c6882a146880b9387f1beb5418618bc83a3becf9bb57da7ba8b913c685fc6700848dc6665d73248c1f74e08ad04ce905faf32706e0000249a028044ede964362cfb7830a246c3b2f60000fc4deb8eda1368b0960b8d69bd99c64893d44f962524429dc058528e7e541c903869d96989b9a986620cb2c95c83f2a082c52764f49e51188f9418b01bcd8ae164acdac95318ec8b2c6feacdcf4b528e5e582160ed048c46e1dccca05bfa1d67c83795eae2d31968c055d325a9c794ef88b30c2de4a274878b73c05ffa88b7033be648b12bb1fee58958d6a6f31bfe568215dfbde59dad00008a73b40f09cf018cd496b36050d70c28f76749262e33e16429a6da35ceb1a989de81c3f8b8bc3a4763948a1cbc10348ef2ac3781b847611fcb0a26acafdd6d9ab05865fcf7c493d8f8cd344a1d470ca0d6f16ab0293774b5509fb0e7113936d59d5a60dbd84a938476adeebab9ff44f531bb81c53f16d80f51006cbc71570a5e272b223425e09dc6b6cc1fbc455a64fd449284f71761092a0302000000000000008a05d36fd9b814b4292745418c92d944763a4bf5e138d810e29a31f08f7dea7762d28484e15dc4320e4f85c16a8fbffadf8214d6d24cabe17ad4135d8872935ce0e6a468fd20fa4461d1d600234feac6eb4f046f2acc1b0efb4438abddcabb4e4e72a450aab72b589bec83bbb688e659fb426cb43d0ee993516fd4e867232cde69b6ffad447dcd92e0ef8234ff850ec3948dd1fa7afb77d951fe4abf618121b7894c1044ef221973432ccc7e62b151eb898a01010a7ec5acd0a5dcb2de443880c8a682515d1da9a3048744acb44384d1591df789883c0560495cb0cb32283529926d25e5c7f4815237c3aa356217738898a16ba603439f6eaad8e70b"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0a0000000400000006000000ff00000042"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x619, r5}, 0x38) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r7}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={r8, &(0x7f0000000d40), 0x0}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r8, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x1, '\x00', r9, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) close(r6) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x800141, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x80047456, &(0x7f0000001200)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={r4, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0xda, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000280), &(0x7f0000000340), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000b80)=r11, 0x4) 204.694896ms ago: executing program 2 (id=8788): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000280)=""/15, 0xf, 0x0, &(0x7f0000001380)=""/227, 0xe3}}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0x7c2}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000009c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x352aafc04994267d, 0x4, 0x8, 0xc, 0x1, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r5 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000180)={0x0, 0x0}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000001c0)) syz_clone(0x2100000, &(0x7f0000000080)="fe6f697ddca261961cbc51e7d4f8daa757c26fe248b976df8e11be551f4aad124e6d5e01c812f38028ab66bb71df29b908f0bb72a9a18d60b172aa8203233b2ce97127229fb6f47d85c9039253cc2e5beee857758d2bb93447a7e7c17277c358755f303f76c06e654bf3ea9d249f46e91a55cedddb0f7f32f1cf3c76673f6f315a957cbc05ed10e39a811efe427b16a2a551b5ef6589206c048e91469250fa6de703134842f879a3a6e37c05eb71d62280b4fe4b5c430a120cdf4c3eded3b336548361d14cbb", 0xc6, 0x0, &(0x7f0000000200), &(0x7f0000000380)="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") 133.965611ms ago: executing program 0 (id=8789): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100ae06392d000000003c0000003c000000020000000000000002000004ffffffff0000000003000000000000000000000003000000e5000000000000000000000200000000000000000000000602"], 0x0, 0x56}, 0x28) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], 0x0, 0x14, &(0x7f0000000240)=[{}, {}], 0x10, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0xf9, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000012850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b807200500000000", &(0x7f00000004c0)=""/18, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x23) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)={0x1b, 0x0, 0x0, 0x8, 0x0, r1, 0x5, '\x00', r2, r0, 0x4, 0x2, 0x2}, 0x50) 127.875681ms ago: executing program 4 (id=8790): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_config_ext={0x3, 0x48}, 0x0, 0x9460, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="0508000027235b1a53bb000000000011ae00000073d88500000005000900000000000000000095004925746d053a79093ba7e99b0a6b58f67f0041e10dc90d96459f3161cacf7ff8a33d6aff534ab35c0a15ce661637bd92291008431f63cea195706b1f590d30cb5269036e01ff226033da00a27de99f"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0xa49a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x60, 0x0, 0x1, 0x6, 0x0, 0x3, 0x10, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffffa, 0x6, @perf_bp={&(0x7f0000000040), 0xc}, 0xd213, 0x4, 0x8000, 0x0, 0x1, 0x81, 0x0, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_config_ext={0x4, 0x5b}, 0x1218, 0x2000001, 0xfff, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000060000000450000007"], 0x48) bpf$PROG_LOAD(0x2, 0x0, 0x0) sendmsg$sock(r4, 0x0, 0x20040851) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1c, 0xd, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e0000003dc7000002"], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x104046}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) 31.598868ms ago: executing program 0 (id=8791): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001800)) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x40000}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000100), &(0x7f0000000140)=r1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\xea!\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x200}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="120000000b000000080000000b"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000000), 0x0}, 0x20) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x399, 0x8, 0x0, 0x201, 0xffffffffffffffff, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0xb}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x10, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@call={0x85, 0x0, 0x0, 0x30}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0xfffffff8, 0x1, &(0x7f0000000240)=""/1, 0x40f00, 0x40, '\x00', 0x0, 0x25, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x3, 0x7, 0x8, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[r5], 0x0, 0x10, 0x2}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0xb, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) 0s ago: executing program 4 (id=8792): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x11, 0x2, 0x0, &(0x7f0000000480)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x1000000}, 0xfffffedf, 0x10, &(0x7f0000000040), 0xeafcf7e0, 0x0, 0xffffffffffffffff, 0xd}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) sendmsg$inet(r2, &(0x7f0000001f80)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="16480fb922884699d64df573", 0xc}], 0x1}, 0x850) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0x8000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x3, 0x2, 0x3, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000200000005"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x11, 0x15, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1000009}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x61800, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r7, r6}, 0xc) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xab, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0], 0x0, 0xba, &(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0xa8, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) mkdir(&(0x7f0000000440)='./file0\x00', 0xc2) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000080)) kernel console output (not intermixed with test programs): negative timeout [ 98.102138][ T4821] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.150519][ T4821] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.201054][ T4821] device bridge_slave_0 entered promiscuous mode [ 98.261076][ T4821] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.287510][ T4821] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.295012][ T4821] device bridge_slave_1 entered promiscuous mode [ 98.645549][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 98.661375][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 98.743369][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 98.785571][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 98.844716][ T297] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.851787][ T297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.956396][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 98.964870][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 98.973284][ T297] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.980366][ T297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.102524][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 99.112986][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.121652][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.221431][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 99.323830][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.346149][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.381934][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.410962][ T4821] device veth0_vlan entered promiscuous mode [ 99.435127][ T9] device macsec0 left promiscuous mode [ 99.441460][ T9] nr0: port 1(macsec0) entered disabled state [ 99.467844][ T9] device veth1_macvtap left promiscuous mode [ 99.488134][ T9] device veth0_vlan left promiscuous mode [ 99.804398][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.822155][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.846252][ T4821] device veth1_macvtap entered promiscuous mode [ 99.885932][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.897102][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.939352][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.965985][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.976864][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 100.014399][ T4912] device syzkaller0 entered promiscuous mode [ 100.572335][ T24] audit: type=1400 audit(1775687233.150:160): avc: denied { write } for pid=4967 comm="syz.2.1363" name="cgroup.subtree_control" dev="cgroup2" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.635566][ T4970] ÿÿÿÿÿÿþ€: renamed from vlan1 [ 100.654456][ T24] audit: type=1400 audit(1775687233.160:161): avc: denied { open } for pid=4967 comm="syz.2.1363" path="" dev="cgroup2" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 101.844311][ T5044] device veth0_vlan left promiscuous mode [ 101.864541][ T5044] device veth0_vlan entered promiscuous mode [ 101.915502][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.933937][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 101.984284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.407655][ T24] audit: type=1400 audit(1775687234.990:162): avc: denied { create } for pid=5059 comm="syz.2.1388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 103.229070][ T24] audit: type=1400 audit(1775687235.810:163): avc: denied { append } for pid=5114 comm="syz.0.1404" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 103.573596][ T24] audit: type=1400 audit(1775687236.150:164): avc: denied { ioctl } for pid=5138 comm="syz.2.1412" path="" dev="cgroup2" ino=374 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 104.028067][ T5168] device syzkaller0 entered promiscuous mode [ 104.552406][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.576515][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.633816][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.883187][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 105.154197][ T5269] device syzkaller0 entered promiscuous mode [ 107.279488][ T5377] device syzkaller0 entered promiscuous mode [ 108.168817][ T5400] device syzkaller0 entered promiscuous mode [ 108.321314][ T5444] device syzkaller0 entered promiscuous mode [ 108.391918][ T5460] device syzkaller0 entered promiscuous mode [ 108.459430][ T5473] tap0: tun_chr_ioctl cmd 1074025675 [ 108.464952][ T5473] tap0: persist enabled [ 108.472165][ T5473] tap0: tun_chr_ioctl cmd 1074025675 [ 108.477675][ T5473] tap0: persist enabled [ 109.465561][ T24] audit: type=1400 audit(1775687242.050:165): avc: denied { create } for pid=5509 comm="syz.4.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 109.558691][ T24] audit: type=1400 audit(1775687242.070:166): avc: denied { create } for pid=5509 comm="syz.4.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 109.913905][ T5527] device syzkaller0 entered promiscuous mode [ 111.130247][ T5609] device syzkaller0 entered promiscuous mode [ 111.246478][ T5633] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 111.255259][ T5633] pim6reg0: linktype set to 768 [ 111.310526][ T5635] device syzkaller0 entered promiscuous mode [ 113.498258][ T5759] device syzkaller0 entered promiscuous mode [ 113.545644][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 116.284538][ T5889] device syzkaller0 entered promiscuous mode [ 116.397727][ T5907] tap0: tun_chr_ioctl cmd 2147767520 [ 116.901922][ T24] audit: type=1400 audit(1775687249.480:167): avc: denied { create } for pid=5940 comm="syz.2.1634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 117.243010][ T5960] ref_ctr_offset mismatch. inode: 0x6c7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 117.317105][ T5947] device syzkaller0 entered promiscuous mode [ 117.736696][ T5990] device wg2 entered promiscuous mode [ 117.899781][ T6002] device syzkaller0 left promiscuous mode [ 118.309106][ T6013] device veth0_vlan left promiscuous mode [ 118.315737][ T6013] device veth0_vlan entered promiscuous mode [ 118.356175][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.364140][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 118.371922][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 118.559691][ T6026] device virt_wifi0 entered promiscuous mode [ 118.916920][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.060041][ T6039] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.086545][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.120101][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.133715][ T6050] device syzkaller0 entered promiscuous mode [ 119.143359][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.157398][ T6057] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.172966][ T6050] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.212351][ T6062] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.242635][ T6062] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 119.259064][ T6062] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 120.560103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 120.675724][ T6128] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 122.002496][ T6226] device syzkaller0 left promiscuous mode [ 122.214606][ T6242] syz.3.1720[6242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.214755][ T6242] syz.3.1720[6242] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 123.683407][ T6339] device syzkaller0 entered promiscuous mode [ 123.873120][ T6350] device wg2 entered promiscuous mode [ 125.059853][ T6419] syz.0.1768[6419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.059912][ T6419] syz.0.1768[6419] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.084719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 125.177082][ T6420] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 125.235855][ T6447] device wg2 left promiscuous mode [ 125.357487][ T6462] device syzkaller0 entered promiscuous mode [ 125.636470][ T6481] bridge0: port 3(veth1) entered blocking state [ 125.655965][ T6481] bridge0: port 3(veth1) entered disabled state [ 125.674764][ T6481] device veth1 entered promiscuous mode [ 125.698147][ T6481] device veth1 left promiscuous mode [ 125.715706][ T6481] bridge0: port 3(veth1) entered disabled state [ 126.621664][ T6523] device sit0 left promiscuous mode [ 126.824600][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 126.836289][ T6556] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 126.856729][ T6555] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 127.536911][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 127.568211][ T6614] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 130.104525][ T6754] IPv6: pim6reg1: Disabled Multicast RS [ 130.139989][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 130.175419][ T6753] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 130.202910][ T6752] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 130.239542][ T6752] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 130.377232][ T6767] device syzkaller0 entered promiscuous mode [ 132.729302][ T6924] device wg2 entered promiscuous mode [ 133.226815][ T7002] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.264886][ T7002] device bridge0 left promiscuous mode [ 133.365975][ T7002] device bridge_slave_1 left promiscuous mode [ 133.372150][ T7002] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.384389][ T7002] device bridge_slave_0 left promiscuous mode [ 133.390599][ T7002] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.449790][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 133.486932][ T7021] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 133.531141][ T7021] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 133.728989][ T7020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 133.817942][ T7020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 133.846155][ T7020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 134.113442][ T7065] tun1: tun_chr_ioctl cmd 1074025677 [ 134.131281][ T7065] tun1: linktype set to 820 [ 134.203551][ T7079] device macsec0 left promiscuous mode [ 134.475022][ T7079] device veth1_macvtap entered promiscuous mode [ 134.497734][ T7079] device macsec0 entered promiscuous mode [ 134.564283][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.160709][ T7127] device syzkaller0 entered promiscuous mode [ 135.190484][ T7143] device syzkaller0 left promiscuous mode [ 136.150249][ T7198] device syzkaller0 left promiscuous mode [ 136.313294][ T7222] geneve0: tun_chr_ioctl cmd 1074025677 [ 136.325427][ T7222] geneve0: linktype set to 1 [ 136.330154][ T7222] geneve0: tun_chr_ioctl cmd 1074025677 [ 136.336359][ T7222] geneve0: linktype set to 1 [ 136.342249][ T7222] geneve0: tun_chr_ioctl cmd 1074025677 [ 136.357390][ T7222] geneve0: linktype set to 1 [ 136.373916][ T7220] device syzkaller0 entered promiscuous mode [ 136.674501][ T7250] syz.0.2014[7250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.674558][ T7250] syz.0.2014[7250] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.692431][ T7298] : port 1(ip6gretap0) entered blocking state [ 137.829114][ T7298] : port 1(ip6gretap0) entered disabled state [ 137.878015][ T7298] device ip6gretap0 entered promiscuous mode [ 137.996940][ T7306] device ip6gretap0 left promiscuous mode [ 138.002784][ T7306] : port 1(ip6gretap0) entered disabled state [ 138.230802][ T7336] batadv0: tun_chr_ioctl cmd 1074025677 [ 138.279303][ T7336] batadv0: linktype set to 776 [ 140.687375][ T7520] device wg2 left promiscuous mode [ 141.021089][ T7542] tap0: tun_chr_ioctl cmd 1074025677 [ 141.059825][ T7542] tap0: linktype set to 6 [ 141.064752][ T7534] Ÿë: port 1(veth0_to_team) entered blocking state [ 141.105035][ T7534] Ÿë: port 1(veth0_to_team) entered disabled state [ 141.113070][ T7534] device veth0_to_team entered promiscuous mode [ 141.951711][ T7585] device syzkaller0 entered promiscuous mode [ 142.843237][ T7644] tap1: tun_chr_ioctl cmd 1074025673 [ 142.868063][ T7643] tap1: tun_chr_ioctl cmd 35108 [ 142.873787][ T7644] tap1: tun_chr_ioctl cmd 2148553947 [ 142.883712][ T7644] tap1: tun_chr_ioctl cmd 1074025681 [ 142.981140][ T7643] tap1: tun_chr_ioctl cmd 2148553947 [ 143.264892][ T7678] device syzkaller0 entered promiscuous mode [ 146.698260][ T7874] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 146.706705][ T7865] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 148.136174][ T7938] device wg2 entered promiscuous mode [ 148.160532][ T7945] tap0: tun_chr_ioctl cmd 1074025677 [ 148.165917][ T7945] tap0: linktype set to 270 [ 148.190491][ T7949] device veth1_macvtap left promiscuous mode [ 150.176932][ T8079] device syzkaller0 left promiscuous mode [ 151.358459][ T8163] €Â0: renamed from pim6reg1 [ 151.763031][ T8208] device syzkaller0 entered promiscuous mode [ 151.965052][ T8230] syzkaller0: tun_net_xmit 1280 [ 151.995270][ C1] syzkaller0: tun_net_xmit 76 [ 153.501128][ T8334] device syzkaller0 entered promiscuous mode [ 153.886496][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 153.939843][ T8375] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 154.760378][ T8428] device syzkaller0 entered promiscuous mode [ 155.030118][ T8446] device syzkaller0 left promiscuous mode [ 155.094250][ T24] audit: type=1400 audit(1775687287.670:168): avc: denied { create } for pid=8451 comm="syz.4.2385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 155.157661][ T8468] device syzkaller0 entered promiscuous mode [ 155.587308][ T8504] device veth0_vlan left promiscuous mode [ 155.615408][ T8504] device veth0_vlan entered promiscuous mode [ 155.698440][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.706918][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.724673][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿþ€: link becomes ready [ 156.108911][ T8520] syz.2.2404[8520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.108967][ T8520] syz.2.2404[8520] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.237019][ T8530] syz.4.2407[8530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.366456][ T8535] syzkaller0: tun_net_xmit 1280 [ 156.385863][ C0] syzkaller0: tun_net_xmit 76 [ 156.415926][ T8535] syzkaller0: create flow: hash 266201585 index 1 [ 156.453018][ T8534] syzkaller0: delete flow: hash 266201585 index 1 [ 158.236033][ T8582] device syzkaller0 entered promiscuous mode [ 159.811393][ T8692] batadv0: tun_chr_ioctl cmd 1074025677 [ 159.818205][ T8692] batadv0: linktype set to 776 [ 159.827281][ T8692] batadv0: tun_chr_ioctl cmd 1074025680 [ 159.956477][ T8710] device veth1_macvtap left promiscuous mode [ 159.962657][ T8710] device macsec0 entered promiscuous mode [ 159.992026][ T8713] ±ÿ: renamed from team_slave_1 [ 160.696260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 160.715285][ T8777] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 160.802171][ T8784] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 161.530857][ T8776] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 161.541304][ T8776] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 161.579763][ T8844] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 161.737528][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 161.994491][ T8843] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 162.440832][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 162.567670][ T8886] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 162.666071][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.078658][ T8933] device syzkaller0 entered promiscuous mode [ 163.147944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.171493][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.229822][ T8942] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.248296][ T8942] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.271544][ T8942] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.360203][ T8956] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.375999][ T8956] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 163.637123][ T8960] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.761427][ T8990] device syzkaller0 entered promiscuous mode [ 165.575243][ T9106] device syzkaller0 entered promiscuous mode [ 166.953254][ T24] audit: type=1400 audit(1775687299.530:169): avc: denied { create } for pid=9189 comm="syz.0.2610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 167.034667][ T9203] device veth1_macvtap entered promiscuous mode [ 167.041171][ T9203] device macsec0 entered promiscuous mode [ 167.047585][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.266831][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 168.302045][ T9266] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 168.473302][ T9290] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 168.495713][ T9290] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 168.803706][ T9292] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 168.863117][ T9292] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 169.404869][ T9337] tap1: tun_chr_ioctl cmd 1074025675 [ 169.440048][ T9337] tap1: persist enabled [ 169.505200][ T9336] tap1: tun_chr_ioctl cmd 1074025675 [ 169.526705][ T9336] tap1: persist enabled [ 169.877446][ T9372] device syzkaller0 entered promiscuous mode [ 169.908206][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 169.926215][ T9376] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 169.932042][ T9376] syzkaller0: persist disabled [ 169.938116][ T9376] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 169.959618][ T9376] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 170.459403][ T9404] device syzkaller0 entered promiscuous mode [ 170.847806][ T9414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.515311][ T9430] device wg2 left promiscuous mode [ 171.570379][ T9450] syz.1.2684[9450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.570434][ T9450] syz.1.2684[9450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.071843][ T24] audit: type=1400 audit(1775687304.650:170): avc: denied { mounton } for pid=9492 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 172.332760][ T9492] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.360319][ T9492] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.376533][ T9492] device bridge_slave_0 entered promiscuous mode [ 172.401616][ T9492] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.413202][ T9492] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.433069][ T9492] device bridge_slave_1 entered promiscuous mode [ 172.711093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.718924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.948558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.962506][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.977274][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.984436][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.001141][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.012271][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.022468][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.029536][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.049415][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.057608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.067453][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.076526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.084661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.129304][ T9492] device veth0_vlan entered promiscuous mode [ 173.138647][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 173.150516][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 173.170462][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 173.180127][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 173.219211][ T9492] device veth1_macvtap entered promiscuous mode [ 173.266648][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 173.283168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 173.290843][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 173.377903][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 173.387362][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 173.399041][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 173.410925][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.460293][ T24] audit: type=1400 audit(1775687306.040:171): avc: denied { unmount } for pid=9492 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 174.736710][ T297] device veth1_macvtap left promiscuous mode [ 174.743043][ T297] device veth0_vlan left promiscuous mode [ 175.036641][ T9655] syz.2.2740[9655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.036696][ T9655] syz.2.2740[9655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.998395][ T9731] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 177.088935][ T9725] device syzkaller0 left promiscuous mode [ 177.178170][ T9738] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.188040][ T9738] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.197735][ T9738] device bridge_slave_0 entered promiscuous mode [ 177.217124][ T9738] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.226861][ T9738] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.234617][ T9738] device bridge_slave_1 entered promiscuous mode [ 177.323221][ T9738] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.330349][ T9738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.337750][ T9738] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.344792][ T9738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.391108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.401277][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.428021][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.443169][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.455804][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.462881][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.476265][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.484535][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.491627][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.526485][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.536467][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.544587][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.556613][ T9738] device veth0_vlan entered promiscuous mode [ 177.565949][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.575987][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.585953][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.606365][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.633800][ T9738] device veth1_macvtap entered promiscuous mode [ 177.643980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.654297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.336381][ T9799] device syzkaller0 entered promiscuous mode [ 178.607562][ T9830] device veth0_vlan left promiscuous mode [ 178.708485][ T9830] device veth0_vlan entered promiscuous mode [ 179.017412][ T297] device bridge_slave_1 left promiscuous mode [ 179.023581][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 179.056687][ T297] device bridge_slave_0 left promiscuous mode [ 179.074077][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 179.100269][ T297] device veth1_macvtap left promiscuous mode [ 179.129884][ T297] device veth0_vlan left promiscuous mode [ 179.678073][ T9865] device syzkaller0 entered promiscuous mode [ 180.592820][ T9926] device syzkaller0 entered promiscuous mode [ 182.005879][ T9985] -1: renamed from syzkaller0 [ 182.054204][ T24] audit: type=1400 audit(1775687314.630:172): avc: denied { create } for pid=9994 comm="syz.0.2834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 183.546491][T10070] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.553658][T10070] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.561310][T10070] device bridge_slave_0 entered promiscuous mode [ 183.572820][T10070] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.584690][T10070] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.592506][T10070] device bridge_slave_1 entered promiscuous mode [ 183.949340][T10070] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.956437][T10070] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.045397][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.063771][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.079351][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.087316][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.096145][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.105572][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.112612][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.144683][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.152987][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.160045][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.186786][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 184.197401][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.205824][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.226802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.238384][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.250946][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.259656][T10070] device veth0_vlan entered promiscuous mode [ 184.284236][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.294565][T10070] device veth1_macvtap entered promiscuous mode [ 184.336302][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.355955][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.104798][T10186] device syzkaller0 entered promiscuous mode [ 185.640360][ T297] device vlan1 left promiscuous mode [ 185.666690][ T297] Ÿë: port 1(vlan1) entered disabled state [ 185.731083][ T297] device veth1_macvtap left promiscuous mode [ 186.857098][T10271] device syzkaller0 left promiscuous mode [ 187.210499][T10283] device syzkaller0 entered promiscuous mode [ 187.549568][T10313] device team_slave_1 entered promiscuous mode [ 187.559004][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.568687][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.834604][T10323] device syzkaller0 entered promiscuous mode [ 188.577426][T10386] device wg2 entered promiscuous mode [ 189.258360][T10453] device syzkaller0 entered promiscuous mode [ 189.947126][T10484] device aaaaaaaaaaaaaaa entered promiscuous mode [ 190.376715][T10514] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.383865][T10514] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.393366][T10514] device bridge_slave_0 entered promiscuous mode [ 190.407363][T10514] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.415110][T10514] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.423084][T10514] device bridge_slave_1 entered promiscuous mode [ 190.611602][T10514] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.618712][T10514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.626003][T10514] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.633056][T10514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.694403][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.711210][ T792] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.718771][ T792] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.738805][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.747061][ T792] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.754088][ T792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.761756][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.770062][ T792] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.777093][ T792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.798411][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.806844][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.828476][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.839491][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.861871][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.872534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.881330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.889676][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.905701][T10514] device veth0_vlan entered promiscuous mode [ 190.923415][T10514] device veth1_macvtap entered promiscuous mode [ 190.934628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.943281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.952897][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.963267][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.971905][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.979918][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.988599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.007719][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.016202][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.227640][ T297] device bridge_slave_1 left promiscuous mode [ 191.233815][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.248373][ T297] device bridge_slave_0 left promiscuous mode [ 191.256095][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.274583][ T297] device veth0_vlan left promiscuous mode [ 191.675340][T10612] device syzkaller0 entered promiscuous mode [ 191.983853][T10641] device syzkaller0 entered promiscuous mode [ 192.145432][T10646] device syzkaller0 entered promiscuous mode [ 192.160786][T10641] device syzkaller0 left promiscuous mode [ 192.240464][T10657] device syzkaller0 entered promiscuous mode [ 192.510563][T10671] device syz_tun entered promiscuous mode [ 192.941719][T10693] device syzkaller0 entered promiscuous mode [ 193.131306][T10709] device sit0 entered promiscuous mode [ 193.908418][ T24] audit: type=1400 audit(1775687326.490:173): avc: denied { create } for pid=10760 comm="syz.4.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 194.235094][T10789] device syzkaller0 entered promiscuous mode [ 194.725559][T10855] device syzkaller0 entered promiscuous mode [ 195.599486][T10877] device syzkaller0 entered promiscuous mode [ 196.779782][T10964] tap0: tun_chr_ioctl cmd 35108 [ 196.821192][T10965] tap0: tun_chr_ioctl cmd 35108 [ 196.901786][T10964] device syzkaller0 entered promiscuous mode [ 197.076820][T10989] device veth0_vlan left promiscuous mode [ 197.103463][T10989] device veth0_vlan entered promiscuous mode [ 197.237045][T10993] device wg2 entered promiscuous mode [ 197.909532][T11018] device syzkaller0 entered promiscuous mode [ 200.391128][T11121] device syzkaller0 entered promiscuous mode [ 201.485319][T11227] device syzkaller0 entered promiscuous mode [ 201.552622][T11229] : port 1(ip6gretap0) entered blocking state [ 201.563394][T11229] : port 1(ip6gretap0) entered disabled state [ 201.595510][T11229] device ip6gretap0 entered promiscuous mode [ 201.623961][T11232] device ip6gretap0 left promiscuous mode [ 201.631524][T11232] : port 1(ip6gretap0) entered disabled state [ 201.638670][T11233] syz.1.3184[11233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.638747][T11233] syz.1.3184[11233] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.456841][T11265] device syzkaller0 entered promiscuous mode [ 202.894140][T11295] +: renamed from team_slave_1 [ 203.397779][T11330] device vlan0 entered promiscuous mode [ 203.473893][T11332] : renamed from bond_slave_0 [ 205.518474][T11416] ÿÿÿÿÿÿ: renamed from vlan1 [ 206.034196][T11461] tap0: tun_chr_ioctl cmd 1074025673 [ 206.302776][T11499] device sit0 entered promiscuous mode [ 206.535363][T11526] device wg2 entered promiscuous mode [ 206.634766][T11538] device syzkaller0 entered promiscuous mode [ 207.140704][T11598] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.150853][T11598] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.219602][T11601] device bridge_slave_1 left promiscuous mode [ 207.226047][T11601] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.234325][T11601] device bridge_slave_0 left promiscuous mode [ 207.242248][T11601] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.663663][T11687] device syzkaller0 entered promiscuous mode [ 209.053172][T11708] device syzkaller0 entered promiscuous mode [ 209.261966][T11720] device syzkaller0 entered promiscuous mode [ 209.427048][T11740] device syzkaller0 entered promiscuous mode [ 209.438558][ T9553] syzkaller0: tun_net_xmit 76 [ 209.443669][ T9553] syzkaller0: tun_net_xmit 48 [ 209.465248][ C1] syzkaller0: tun_net_xmit 76 [ 211.828781][T11882] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 212.003429][T11889] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 212.016291][T11889] syzkaller0: Linktype set failed because interface is up [ 212.025728][ C0] syzkaller0: tun_net_xmit 76 [ 213.051302][T11969] device veth0_vlan left promiscuous mode [ 213.098680][T11969] device veth0_vlan entered promiscuous mode [ 213.203393][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.218584][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.236550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.402692][ T24] audit: type=1400 audit(1775687345.980:174): avc: denied { create } for pid=11990 comm="syz.4.3407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 213.711167][T12007] device syzkaller0 entered promiscuous mode [ 214.137597][T12047] ªªªªªª™™: renamed from vlan0 [ 216.176956][T12167] device syzkaller0 entered promiscuous mode [ 216.774237][T12191] device syzkaller0 entered promiscuous mode [ 218.812122][T12328] ÿÿÿÿÿÿ: renamed from vlan1 [ 218.958045][T12334] bridge0: port 3(gretap0) entered blocking state [ 218.995295][T12334] bridge0: port 3(gretap0) entered disabled state [ 219.006994][T12334] device gretap0 entered promiscuous mode [ 219.031194][T12334] bridge0: port 3(gretap0) entered blocking state [ 219.037769][T12334] bridge0: port 3(gretap0) entered forwarding state [ 219.998205][T12389] device pim6reg1 entered promiscuous mode [ 220.064616][T12398] device pim6reg1 entered promiscuous mode [ 220.149510][T12413] device pim6reg1 entered promiscuous mode [ 221.571101][T12493] device sit0 left promiscuous mode [ 221.814867][T12526] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 221.835592][T12526] device syzkaller0 entered promiscuous mode [ 222.428285][T12579] tun0: tun_chr_ioctl cmd 1074025677 [ 222.433819][T12579] tun0: linktype set to 820 [ 224.047804][T12664] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.057078][T12664] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.064698][T12664] device bridge_slave_0 entered promiscuous mode [ 224.102808][T12664] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.110765][T12664] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.119294][T12664] device bridge_slave_1 entered promiscuous mode [ 224.249978][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.258108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.301874][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.324398][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.333639][ T792] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.340743][ T792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.348878][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.357705][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.366920][ T792] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.373980][ T792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.381551][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.498762][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.514818][T12696] device syzkaller0 entered promiscuous mode [ 224.536171][T12698] device syzkaller0 entered promiscuous mode [ 224.544858][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.597805][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.609372][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.617404][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.624832][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.633683][T12664] device veth0_vlan entered promiscuous mode [ 224.650138][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.670170][T12664] device veth1_macvtap entered promiscuous mode [ 224.707675][T12700] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 224.727374][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.755587][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.931354][ T9] device bridge_slave_1 left promiscuous mode [ 224.968659][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.976548][ T9] device bridge_slave_0 left promiscuous mode [ 224.982753][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.001757][ T9] device veth1_macvtap left promiscuous mode [ 225.030946][ T9] device veth0_vlan left promiscuous mode [ 225.317861][T12736] device syzkaller0 entered promiscuous mode [ 225.824864][T12787] device syzkaller0 entered promiscuous mode [ 225.998486][T12802] device syzkaller0 entered promiscuous mode [ 226.295556][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.316146][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.324012][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 226.691380][T12827] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 226.718244][T12827] device syzkaller0 entered promiscuous mode [ 227.065391][T12860] device wg2 left promiscuous mode [ 227.917622][T12918] device syzkaller0 entered promiscuous mode [ 227.932989][T12926] bridge0: mtu greater than device maximum [ 228.294178][T12943] syz.2.3686 (12943) used obsolete PPPIOCDETACH ioctl [ 228.554256][T12967] tun0: tun_chr_ioctl cmd 1074025678 [ 228.564004][T12967] tun0: group set to 1 [ 229.054446][T12993] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 229.088450][T12993] device syzkaller0 entered promiscuous mode [ 230.362886][T13065] device syzkaller0 entered promiscuous mode [ 230.407572][T13074] device syzkaller0 entered promiscuous mode [ 230.447020][ T6957] syzkaller0: tun_net_xmit 48 [ 230.486724][T13065] syzkaller0: create flow: hash 3788940295 index 2 [ 230.613688][T13076] syzkaller0: delete flow: hash 3788940295 index 2 [ 230.777276][T13096] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 230.788192][T13096] device syzkaller0 entered promiscuous mode [ 230.918214][T13115] device syzkaller0 left promiscuous mode [ 230.966751][T13108] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 231.031324][T13108] device syzkaller0 entered promiscuous mode [ 232.293340][T13191] tun0: tun_chr_ioctl cmd 2147767506 [ 234.122835][T13292] device wg2 left promiscuous mode [ 234.420061][T13314] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 234.797486][T13369] device syzkaller0 entered promiscuous mode [ 235.107547][T13391] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 235.140502][T13391] device syzkaller0 entered promiscuous mode [ 236.120150][T13434] device wg2 entered promiscuous mode [ 236.535334][T13475] device veth1_macvtap left promiscuous mode [ 236.542991][T13475] device macsec0 entered promiscuous mode [ 236.857551][T13492] device syzkaller0 entered promiscuous mode [ 237.088465][T13496] +: renamed from team_slave_1 [ 237.328990][T13507] device wg2 entered promiscuous mode [ 238.560275][T13627] device syzkaller0 entered promiscuous mode [ 238.620435][T13625] device syzkaller0 entered promiscuous mode [ 240.461143][T13773] syz.3.3930[13773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.461929][T13773] syz.3.3930[13773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.209054][T13933] device syzkaller0 entered promiscuous mode [ 244.769805][ T24] audit: type=1400 audit(1775687377.350:175): avc: denied { create } for pid=14015 comm="syz.3.3999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 245.790062][T14077] device wg2 left promiscuous mode [ 246.796792][T14142] device wg2 left promiscuous mode [ 246.829478][T14142] device wg2 entered promiscuous mode [ 246.903482][T14151] device wg2 entered promiscuous mode [ 247.474955][T14179] device syzkaller0 entered promiscuous mode [ 248.589663][T14241] device syzkaller0 entered promiscuous mode [ 248.710598][T14255] device syzkaller0 entered promiscuous mode [ 249.054712][T14269] device syzkaller0 entered promiscuous mode [ 249.209251][T14305] device syzkaller0 entered promiscuous mode [ 249.334479][T14313] ªªªªªª™™: renamed from vlan0 [ 250.103703][T14364] device syzkaller0 entered promiscuous mode [ 250.155380][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 250.734695][T14408] device syzkaller0 entered promiscuous mode [ 250.812252][T14432] device pim6reg1 entered promiscuous mode [ 251.242157][T14462] device syzkaller0 entered promiscuous mode [ 252.774294][T14597] device syzkaller0 left promiscuous mode [ 252.988764][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 253.003029][T14626] device syzkaller0 entered promiscuous mode [ 253.759339][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.782408][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.796628][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 253.843576][T14663] device pim6reg1 entered promiscuous mode [ 254.014868][T14667] device syzkaller0 entered promiscuous mode [ 254.317110][T14681] Ÿë: port 1(veth0_to_team) entered blocking state [ 254.358904][T14681] Ÿë: port 1(veth0_to_team) entered disabled state [ 254.373084][T14681] device veth0_to_team entered promiscuous mode [ 255.149113][T14727] device wg2 entered promiscuous mode [ 255.391907][T14759] device syzkaller0 entered promiscuous mode [ 256.326576][T14850] device syzkaller0 entered promiscuous mode [ 257.094024][T14910] device sit0 entered promiscuous mode [ 259.037167][T15002] device macsec0 entered promiscuous mode [ 262.280488][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 262.293018][T15182] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 264.168290][T15328] -1: renamed from syzkaller0 [ 264.978352][T15405] device syzkaller0 entered promiscuous mode [ 267.351581][T15534] device syzkaller0 entered promiscuous mode [ 269.416701][T15714] device syzkaller0 entered promiscuous mode [ 269.537745][T15718] device syzkaller0 left promiscuous mode [ 270.221411][T15748] device syzkaller0 entered promiscuous mode [ 270.550832][T15791] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 271.167411][T15832] device syzkaller0 entered promiscuous mode [ 271.376736][T15836] device veth0_vlan left promiscuous mode [ 271.473806][T15836] device veth0_vlan entered promiscuous mode [ 271.585252][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.593586][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 271.656289][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 275.517223][T16098] tap0: tun_chr_ioctl cmd 1074025677 [ 275.522701][T16098] tap0: linktype set to 769 [ 276.489899][T16169] device macsec0 entered promiscuous mode [ 276.974688][T16215] ³þœLt'ÒK1[§: renamed from bond_slave_0 [ 278.272594][T16258] : port 1(ip6gretap0) entered blocking state [ 278.356373][T16258] : port 1(ip6gretap0) entered disabled state [ 278.474342][T16258] device ip6gretap0 entered promiscuous mode [ 278.604814][T16265] device ip6gretap0 left promiscuous mode [ 278.636265][T16265] : port 1(ip6gretap0) entered disabled state [ 279.895829][T16318] bridge0: port 3(gretap0) entered disabled state [ 279.902430][T16318] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.909813][T16318] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.553865][T16372] device syzkaller0 entered promiscuous mode [ 280.871277][T16389] device wg2 left promiscuous mode [ 280.895762][T16388] device wg2 entered promiscuous mode [ 282.414056][T16455] tap0: tun_chr_ioctl cmd 1074025677 [ 282.432703][T16455] tap0: linktype set to 778 [ 282.669945][T16480] device syzkaller0 entered promiscuous mode [ 282.814853][T16484] : port 1(syz_tun) entered blocking state [ 282.841430][T16484] : port 1(syz_tun) entered disabled state [ 282.851366][T16484] device syz_tun entered promiscuous mode [ 283.649719][T16521] device syzkaller0 entered promiscuous mode [ 283.755219][T16521] device syzkaller0 left promiscuous mode [ 284.149506][T16547] device syzkaller0 entered promiscuous mode [ 285.264691][T16617] device wg2 left promiscuous mode [ 285.407365][T16617] device wg2 entered promiscuous mode [ 286.362844][T16660] tap0: tun_chr_ioctl cmd 1074025677 [ 286.369796][T16660] tap0: linktype set to 778 [ 288.491698][T16778] device syzkaller0 entered promiscuous mode [ 288.693357][T16793] device wg2 left promiscuous mode [ 288.902919][T16807] device syzkaller0 entered promiscuous mode [ 289.534650][T16863] device syzkaller0 entered promiscuous mode [ 290.898407][T16926] device pim6reg1 entered promiscuous mode [ 292.012849][T16997] device syzkaller0 entered promiscuous mode [ 292.042309][T16997] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 292.090124][T17003] device syzkaller0 entered promiscuous mode [ 294.366775][T17151] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.374832][T17151] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.499965][T17163] €Â0: renamed from pim6reg1 [ 296.367384][T17231] device dummy0 entered promiscuous mode [ 296.676867][T17270] syz.4.4948[17270] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.077604][T17301] cgroup: fork rejected by pids controller in /syz4 [ 297.152321][T17305] IPv6: pim6reg1: Disabled Multicast RS [ 297.379839][T17306] device syz_tun left promiscuous mode [ 297.392182][T17306] : port 1(syz_tun) entered disabled state [ 298.072727][T17348] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.122624][T17348] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.148212][T17348] device bridge_slave_0 entered promiscuous mode [ 298.180908][T17348] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.205309][T17348] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.212883][T17348] device bridge_slave_1 entered promiscuous mode [ 298.500051][T17348] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.507159][T17348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.514436][T17348] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.521482][T17348] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.642069][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.656523][ T792] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.674095][ T792] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.692912][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.715739][ T792] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.722953][ T792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.745726][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.754569][ T792] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.762332][ T792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.783001][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.801637][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.827256][T17397] device syzkaller0 entered promiscuous mode [ 298.864542][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 298.905688][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.955823][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.984436][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.004594][T17348] device veth0_vlan entered promiscuous mode [ 299.017767][T17348] device veth1_macvtap entered promiscuous mode [ 299.067821][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 299.080499][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 299.099867][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 299.146972][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 299.160326][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 299.198298][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 299.213179][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.389070][T17431] device syzkaller0 left promiscuous mode [ 299.576808][T17453] device veth0_vlan left promiscuous mode [ 299.586278][T17453] device veth0_vlan entered promiscuous mode [ 299.596177][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.609534][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 299.661952][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.751900][T17456] macsec0: mtu greater than device maximum [ 300.121010][ T49] device bridge_slave_1 left promiscuous mode [ 300.148130][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.168871][ T49] device bridge_slave_0 left promiscuous mode [ 300.208243][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.816241][ T24] audit: type=1400 audit(1775687434.400:176): avc: denied { setattr } for pid=17535 comm="syz.4.5028" path="/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 301.882133][T17539] device gretap0 left promiscuous mode [ 301.887897][T17539] bridge0: port 3(gretap0) entered disabled state [ 301.895073][T17539] device bridge_slave_1 left promiscuous mode [ 301.901728][T17539] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.910623][T17539] device bridge_slave_0 left promiscuous mode [ 301.917124][T17539] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.206595][T17558] device wg2 left promiscuous mode [ 303.026831][T17593] device wg2 entered promiscuous mode [ 303.321856][T17619] device syzkaller0 left promiscuous mode [ 304.234524][T17721] device sit0 entered promiscuous mode [ 304.781912][T17746] device syzkaller0 entered promiscuous mode [ 308.606459][T17998] device syzkaller0 entered promiscuous mode [ 310.087134][T18078] device syzkaller0 entered promiscuous mode [ 310.403853][T18102] €Â0: renamed from pim6reg1 [ 310.794505][T18128] device macsec0 entered promiscuous mode [ 311.061821][T18152] device syzkaller0 entered promiscuous mode [ 311.395952][T18167] device syzkaller0 entered promiscuous mode [ 311.582425][T18175] syz.1.5221[18175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.582494][T18175] syz.1.5221[18175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.562607][T18245] : port 1(ip6gretap0) entered blocking state [ 312.597397][T18245] : port 1(ip6gretap0) entered disabled state [ 312.635076][T18245] device ip6gretap0 entered promiscuous mode [ 313.080975][T18289] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.089191][T18289] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.192479][T18290] device bridge_slave_1 left promiscuous mode [ 313.244614][T18290] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.272735][T18290] device bridge_slave_0 left promiscuous mode [ 313.309960][T18290] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.045923][T18365] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 315.809885][T18472] device syzkaller0 entered promiscuous mode [ 315.989771][T18484] device syzkaller0 entered promiscuous mode [ 316.082241][T18509] device syzkaller0 left promiscuous mode [ 317.271750][T18579] device sit0 left promiscuous mode [ 317.305430][T18579] device sit0 entered promiscuous mode [ 317.901419][T18623] device syzkaller0 left promiscuous mode [ 318.090503][T18634] device syzkaller0 entered promiscuous mode [ 318.139412][T18639] nr0: port 1(macsec0) entered blocking state [ 318.169493][T18639] nr0: port 1(macsec0) entered disabled state [ 318.327256][T18649] dvmrp0: tun_chr_ioctl cmd 1074025677 [ 318.338203][T18649] dvmrp0: linktype set to 773 [ 318.358867][T18652] device lo entered promiscuous mode [ 318.896551][T18685] IPv6: pim6reg1: Disabled Multicast RS [ 318.919441][T18685] tun0: tun_chr_ioctl cmd 2147767506 [ 319.390219][T18718] syz.4.5391[18718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.390281][T18718] syz.4.5391[18718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.421057][T18714] device xfrm0 entered promiscuous mode [ 320.078223][T18774] device syzkaller0 entered promiscuous mode [ 320.085756][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 320.361639][T18834] ªªªªªª™™: renamed from vlan0 [ 320.446958][T18843] device syzkaller0 entered promiscuous mode [ 321.435682][T18902] device syzkaller0 entered promiscuous mode [ 321.769109][T18923] IPv6: pim6reg1: Disabled Multicast RS [ 322.269512][T18963] device syzkaller0 entered promiscuous mode [ 322.684103][T19007] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.691487][T19007] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.700631][T19007] device bridge_slave_0 entered promiscuous mode [ 322.726362][T19007] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.743279][T19007] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.754246][T19007] device bridge_slave_1 entered promiscuous mode [ 322.767341][T19020] device syzkaller0 entered promiscuous mode [ 322.776503][T19020] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 322.856206][T19007] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.863309][T19007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.870649][T19007] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.877710][T19007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.970597][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.978653][ T792] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.988763][ T792] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.027294][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.045728][ T792] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.052878][ T792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.179387][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.199451][ T792] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.206761][ T792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.240065][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.305545][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.403094][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.433305][T19007] device veth0_vlan entered promiscuous mode [ 323.448124][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 323.486556][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.505976][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.531349][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.611947][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.636716][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.668578][T19007] device veth1_macvtap entered promiscuous mode [ 323.829306][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 323.870736][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 323.895765][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 323.928931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 323.959360][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.537757][ C0] Illegal XDP return value 16128, expect packet loss! [ 324.720687][ T9] device veth0_to_team left promiscuous mode [ 324.729727][ T9] Ÿë: port 1(veth0_to_team) entered disabled state [ 324.740859][ T9] device veth1_macvtap left promiscuous mode [ 324.750050][ T9] device veth0_vlan left promiscuous mode [ 325.315960][T19156] device syzkaller0 entered promiscuous mode [ 325.338834][T19159] device syzkaller0 entered promiscuous mode [ 325.348462][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 325.966808][T19180] device syzkaller0 entered promiscuous mode [ 325.979560][T19181] device syzkaller0 left promiscuous mode [ 328.434078][T19291] batadv0: tun_chr_ioctl cmd 21731 [ 330.331578][T19339] device syzkaller0 entered promiscuous mode [ 330.460588][T19356] device syzkaller0 entered promiscuous mode [ 330.589971][T19359] IPv6: pim6reg1: Disabled Multicast RS [ 330.978100][T19408] device syzkaller0 entered promiscuous mode [ 330.996972][T19398] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.004099][T19398] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.011974][T19398] device bridge_slave_0 entered promiscuous mode [ 331.048796][T19398] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.056549][T19398] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.063968][T19398] device bridge_slave_1 entered promiscuous mode [ 331.169407][T19398] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.176695][T19398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.184081][T19398] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.191188][T19398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.214579][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.222351][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.231149][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.243895][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.252348][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.259449][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.281731][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.290006][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.297627][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.307824][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.320076][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.346848][T19436] device veth0_vlan left promiscuous mode [ 331.352973][T19436] device veth0_vlan entered promiscuous mode [ 331.361342][T19436] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.369823][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.381156][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.391815][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.422108][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.448987][T19398] device veth0_vlan entered promiscuous mode [ 331.459019][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.479337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.491173][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.508669][T19398] device veth1_macvtap entered promiscuous mode [ 331.522053][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.544335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 331.560387][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.497065][T19484] device syzkaller0 entered promiscuous mode [ 333.079534][T19513] device syzkaller0 entered promiscuous mode [ 333.304526][ T49] device veth1_macvtap left promiscuous mode [ 333.325450][ T49] device veth0_vlan left promiscuous mode [ 336.040261][T19686] bridge0: port 3(gretap0) entered blocking state [ 336.060998][T19686] bridge0: port 3(gretap0) entered disabled state [ 336.077975][T19686] device gretap0 entered promiscuous mode [ 336.096536][T19686] bridge0: port 3(gretap0) entered blocking state [ 336.103201][T19686] bridge0: port 3(gretap0) entered forwarding state [ 336.287340][T19713] device syzkaller0 entered promiscuous mode [ 337.028378][T19769] Ÿë: port 1(vlan1) entered blocking state [ 337.044993][T19769] Ÿë: port 1(vlan1) entered disabled state [ 337.053925][T19769] device vlan1 entered promiscuous mode [ 339.004930][T19862] device syzkaller0 entered promiscuous mode [ 339.860440][T19913] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.872015][T19913] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.879861][T19913] device bridge_slave_0 entered promiscuous mode [ 339.887502][T19913] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.894639][T19913] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.902459][T19913] device bridge_slave_1 entered promiscuous mode [ 339.956328][T19913] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.963438][T19913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 339.970792][T19913] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.977864][T19913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.013215][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 340.059641][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.069989][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.140352][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.155420][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.162490][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.185282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.200022][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.207135][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.214993][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 340.223354][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 340.244979][T19913] device veth0_vlan entered promiscuous mode [ 340.256391][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 340.265825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.273995][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.282412][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 340.319613][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 340.339436][T19913] device veth1_macvtap entered promiscuous mode [ 340.359264][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 340.396557][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 340.771096][ T49] device ip6gretap0 left promiscuous mode [ 340.789890][ T49] : port 1(ip6gretap0) entered disabled state [ 341.630581][ T49] device veth0_vlan left promiscuous mode [ 341.843459][T20033] Ÿë: port 1(vlan1) entered blocking state [ 341.855653][T20033] Ÿë: port 1(vlan1) entered disabled state [ 341.862025][T20033] device vlan1 entered promiscuous mode [ 342.511632][T20100] tap0: tun_chr_ioctl cmd 1074025675 [ 342.528529][T20100] tap0: persist enabled [ 342.559891][T20100] tap0: tun_chr_ioctl cmd 1074025675 [ 342.567953][T20100] tap0: persist disabled [ 342.602117][T20108] device syzkaller0 entered promiscuous mode [ 343.670020][T20173] device syzkaller0 entered promiscuous mode [ 345.774899][T20313] device syzkaller0 entered promiscuous mode [ 346.459312][T20348] Ÿë: port 1(veth0_to_team) entered blocking state [ 346.472630][T20348] Ÿë: port 1(veth0_to_team) entered disabled state [ 346.499942][T20348] device veth0_to_team entered promiscuous mode [ 346.822951][T20372] device sit0 entered promiscuous mode [ 347.375252][T20384] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.505555][T20410] device pimreg0 entered promiscuous mode [ 348.832966][T20449] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.883747][T20453] device bridge_slave_1 left promiscuous mode [ 348.890547][T20453] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.901201][T20453] device bridge_slave_0 left promiscuous mode [ 348.907692][T20453] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.932482][T20611] device syzkaller0 entered promiscuous mode [ 352.099220][T20689] device syzkaller0 entered promiscuous mode [ 353.013563][T20766] device syzkaller0 entered promiscuous mode [ 353.177791][T20782] tap0: tun_chr_ioctl cmd 1074025673 [ 353.184247][T20782] @ÿ: renamed from bond_slave_0 [ 353.228053][T20769] device syzkaller0 entered promiscuous mode [ 353.731828][T20851] device syzkaller0 entered promiscuous mode [ 354.606842][T20876] : port 1(ip6gretap0) entered blocking state [ 354.706432][T20876] : port 1(ip6gretap0) entered disabled state [ 354.713278][T20876] device ip6gretap0 entered promiscuous mode [ 354.838059][T20899] device sit0 left promiscuous mode [ 354.894434][T20899] device sit0 entered promiscuous mode [ 355.129241][T20921] device syzkaller0 entered promiscuous mode [ 355.388422][T20940] device syzkaller0 entered promiscuous mode [ 356.176277][T20953] device syzkaller0 entered promiscuous mode [ 357.406163][T21022] device syzkaller0 entered promiscuous mode [ 357.485674][T21021] device wg2 entered promiscuous mode [ 358.079127][T21081] device syzkaller0 entered promiscuous mode [ 358.122678][T21084] device syzkaller0 entered promiscuous mode [ 358.198404][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 358.544506][T21110] device syzkaller0 entered promiscuous mode [ 358.556976][T21110] PF_CAN: dropped non conform CAN skbuff: dev type 280, len 65487 [ 359.067928][T21176] bridge0: port 3(gretap0) entered blocking state [ 359.082581][T21176] bridge0: port 3(gretap0) entered disabled state [ 359.107568][T21176] device gretap0 entered promiscuous mode [ 359.120374][T21176] bridge0: port 3(gretap0) entered blocking state [ 359.126886][T21176] bridge0: port 3(gretap0) entered forwarding state [ 359.224582][T21176] device pimreg0 entered promiscuous mode [ 359.792001][T21211] syzkaller0: refused to change device tx_queue_len [ 359.949461][T21232] tap0: tun_chr_ioctl cmd 1074025677 [ 359.954857][T21232] tap0: linktype set to 769 [ 360.032861][T21234] device syzkaller0 entered promiscuous mode [ 360.507694][T21295] device veth1_macvtap left promiscuous mode [ 360.550641][T21295] device veth1_macvtap entered promiscuous mode [ 360.568829][T21295] device macsec0 entered promiscuous mode [ 360.654763][T21313] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 361.061601][T21357] device syzkaller0 entered promiscuous mode [ 362.466793][T21413] device sit0 entered promiscuous mode [ 363.477197][T21470] device syzkaller0 entered promiscuous mode [ 364.922700][T21543] device syzkaller0 entered promiscuous mode [ 365.306965][T21588] syz.4.6230[21588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.307019][T21588] syz.4.6230[21588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.954234][T21772] ³þ: renamed from bond_slave_0 [ 370.413906][T21833] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.445115][T21833] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.453681][T21833] device bridge_slave_0 entered promiscuous mode [ 370.486086][T21833] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.493172][T21833] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.535856][T21833] device bridge_slave_1 entered promiscuous mode [ 370.806356][T21833] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.813541][T21833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.820940][T21833] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.827989][T21833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.362322][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.378767][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.418517][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.445058][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.471283][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 371.495240][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 371.581103][T21833] device veth0_vlan entered promiscuous mode [ 371.641722][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 371.653313][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.667334][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 371.682171][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.692426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.700208][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.751012][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 371.763721][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.790280][T21833] device veth1_macvtap entered promiscuous mode [ 371.804503][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 371.812948][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 371.822057][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.839011][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 371.847572][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 371.991489][ T297] bridge0: port 3(gretap0) entered disabled state [ 372.000622][ T297] device gretap0 left promiscuous mode [ 372.008747][ T297] bridge0: port 3(gretap0) entered disabled state [ 372.220730][ T297] device veth0_to_team left promiscuous mode [ 372.227297][ T297] Ÿë: port 1(veth0_to_team) entered disabled state [ 372.240698][ T297] device bridge_slave_1 left promiscuous mode [ 372.271880][ T297] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.282780][ T297] device bridge_slave_0 left promiscuous mode [ 372.289482][ T297] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.298456][ T297] device veth1_macvtap left promiscuous mode [ 372.311460][ T297] device veth0_vlan left promiscuous mode [ 372.752335][T21964] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 372.759328][T21964] syzkaller0: linktype set to 825 [ 372.911222][T21964] device syzkaller0 entered promiscuous mode [ 372.947717][T18816] syzkaller0: tun_net_xmit 64 [ 372.978632][T21964] syzkaller0: tun_chr_ioctl cmd 2147767521 [ 373.013971][T21964] syzkaller0: tun_net_xmit 1280 [ 373.035173][T21964] syzkaller0: create flow: hash 1410297061 index 3 [ 373.087184][T21963] syzkaller0: delete flow: hash 1410297061 index 3 [ 374.149376][T22031] device syzkaller0 entered promiscuous mode [ 374.216486][T22037] device syzkaller0 left promiscuous mode [ 375.056727][T22073] device syzkaller0 entered promiscuous mode [ 375.131684][T22094] bridge0: port 3(gretap0) entered blocking state [ 375.143341][T22094] bridge0: port 3(gretap0) entered disabled state [ 375.150721][T22094] device gretap0 entered promiscuous mode [ 375.156636][T22094] bridge0: port 3(gretap0) entered blocking state [ 375.163275][T22094] bridge0: port 3(gretap0) entered forwarding state [ 375.173579][T22096] device syzkaller0 entered promiscuous mode [ 377.280258][T22284] device syzkaller0 entered promiscuous mode [ 378.590877][T22369] tap0: tun_chr_ioctl cmd 1074025677 [ 378.633499][T22369] tap0: linktype set to 0 [ 379.223114][T22416] device syzkaller0 entered promiscuous mode [ 381.561943][T22535] device wg2 entered promiscuous mode [ 381.709653][T22552] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.716868][T22552] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.743454][T22552] device bridge_slave_1 left promiscuous mode [ 381.754751][T22552] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.772229][T22552] device bridge_slave_0 left promiscuous mode [ 381.787408][T22552] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.291256][T22580] device syzkaller0 entered promiscuous mode [ 382.369977][T22579] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 382.404159][T22579] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 382.504602][T22607] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 382.751299][T22652] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 382.863163][T22660] device syzkaller0 entered promiscuous mode [ 382.909164][T22660] device syzkaller0 left promiscuous mode [ 383.647086][T22680] device syzkaller0 entered promiscuous mode [ 384.529274][T22742] device syzkaller0 entered promiscuous mode [ 389.913659][T23015] device veth1_macvtap left promiscuous mode [ 389.924328][T23015] device macsec0 left promiscuous mode [ 390.544990][T23038] device sit0 entered promiscuous mode [ 391.133315][T23071] device syzkaller0 entered promiscuous mode [ 391.494037][T23094] device syzkaller0 entered promiscuous mode [ 391.659454][T23108] device pim6reg1 entered promiscuous mode [ 392.077515][T23133] device syzkaller0 entered promiscuous mode [ 392.792426][T23204] device syzkaller0 entered promiscuous mode [ 393.315988][T23213] device wg0 entered promiscuous mode [ 394.998134][T23354] device syzkaller0 entered promiscuous mode [ 395.055750][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 395.169481][T23351] device syzkaller0 entered promiscuous mode [ 395.317488][T23377] device syzkaller0 entered promiscuous mode [ 395.373859][T23374] device dummy0 entered promiscuous mode [ 395.387141][T23374] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 396.098550][T23423] device syzkaller0 entered promiscuous mode [ 396.193780][T23440] ÿÿÿÿÿÿ: renamed from vlan1 [ 396.495527][T23470] tap0: tun_chr_ioctl cmd 1074025677 [ 396.505792][T23470] tap0: linktype set to 805 [ 396.589205][T23488] device syzkaller0 entered promiscuous mode [ 397.169342][T23544] 7B’ç÷ï: renamed from syzkaller0 [ 398.672118][T23655] device syzkaller0 entered promiscuous mode [ 400.031364][T23725] @ÿ: renamed from bond_slave_0 [ 401.009945][T23775] @0Ù: renamed from bond_slave_1 [ 401.664715][T23792] device veth1_macvtap left promiscuous mode [ 402.009831][T23792] device veth1_macvtap entered promiscuous mode [ 402.025412][T23792] device macsec0 entered promiscuous mode [ 402.031697][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 402.756317][T23848] device syzkaller0 entered promiscuous mode [ 404.142957][T23921] device syzkaller0 entered promiscuous mode [ 404.468048][T23973] device syzkaller0 entered promiscuous mode [ 404.833272][T24016] device syzkaller0 entered promiscuous mode [ 406.027850][T24062] device veth0_vlan left promiscuous mode [ 406.086047][T24062] device veth0_vlan entered promiscuous mode [ 406.171208][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 406.184764][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 406.201141][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 406.935856][T24098] bridge0: port 3(gretap0) entered disabled state [ 406.942388][T24098] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.949780][T24098] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.958466][T24104] device gretap0 left promiscuous mode [ 406.964070][T24104] bridge0: port 3(gretap0) entered disabled state [ 406.971213][T24104] device bridge_slave_1 left promiscuous mode [ 406.977417][T24104] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.984908][T24104] device bridge_slave_0 left promiscuous mode [ 406.991105][T24104] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.235949][T24143] device syzkaller0 entered promiscuous mode [ 408.397971][T24154] device syzkaller0 entered promiscuous mode [ 408.405679][T24154] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 410.054509][T24301] device syzkaller0 entered promiscuous mode [ 410.286184][T24334] device wg2 left promiscuous mode [ 410.318929][T24334] device wg2 entered promiscuous mode [ 410.631956][T24393] device syzkaller0 entered promiscuous mode [ 411.614606][T24448] device syzkaller0 entered promiscuous mode [ 411.692026][T24450] device wg2 left promiscuous mode [ 411.725555][T24450] device wg2 entered promiscuous mode [ 411.732381][T24450] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 412.477819][T24473] device syzkaller0 entered promiscuous mode [ 413.115006][T24505] batadv0: tun_chr_ioctl cmd 2147767521 [ 413.224418][T24507] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.231648][T24507] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.386325][T24507] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.393503][T24507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.400828][T24507] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.407898][T24507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.445219][T24507] device bridge0 entered promiscuous mode [ 413.572015][T24523] device syzkaller0 entered promiscuous mode [ 414.465116][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 415.805527][T24613] -1: renamed from syzkaller0 [ 416.454998][T24662] device syzkaller0 entered promiscuous mode [ 417.673827][T24777] device syzkaller0 entered promiscuous mode [ 418.227512][T24827] device sit0 left promiscuous mode [ 418.797836][T24892] device syzkaller0 entered promiscuous mode [ 419.367927][T24945] device syzkaller0 entered promiscuous mode [ 420.684005][T25046] device syzkaller0 entered promiscuous mode [ 421.370959][T25091] device syzkaller0 entered promiscuous mode [ 423.308825][T25215] geneve0: tun_chr_ioctl cmd 1074025677 [ 423.322025][T25215] geneve0: linktype set to 823 [ 423.503194][T25222] device syzkaller0 entered promiscuous mode [ 423.803586][T25277] device syzkaller0 entered promiscuous mode [ 424.172746][T25312] device sit0 entered promiscuous mode [ 425.591507][T25402] sock: sock_set_timeout: `syz.1.7353' (pid 25402) tries to set negative timeout [ 425.653042][T25404] sock: sock_set_timeout: `syz.1.7353' (pid 25404) tries to set negative timeout [ 426.423106][T25425] device syzkaller0 entered promiscuous mode [ 427.630767][T25502] device syzkaller0 entered promiscuous mode [ 428.637857][T25569] device syzkaller0 entered promiscuous mode [ 428.822426][T25591] ±ÿ: renamed from team_slave_1 [ 429.229468][T25633] device sit0 left promiscuous mode [ 429.289201][T25619] device sit0 entered promiscuous mode [ 429.611941][T25656] device syzkaller0 entered promiscuous mode [ 429.623409][T25666] device sit0 left promiscuous mode [ 429.737344][T25666] device sit0 entered promiscuous mode [ 430.762177][T25737] device wg2 left promiscuous mode [ 430.809247][T25744] -1: renamed from syzkaller0 [ 431.189908][T25776] device syzkaller0 entered promiscuous mode [ 432.496441][T25852] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 432.512282][T25852] device syzkaller0 entered promiscuous mode [ 433.534539][T25886] device syzkaller0 entered promiscuous mode [ 434.150183][T25895] device syzkaller0 entered promiscuous mode [ 434.331800][T25905] device syzkaller0 entered promiscuous mode [ 437.300446][T26009] device aaaaaaaaaaaaaaa entered promiscuous mode [ 438.538086][T26099] device syzkaller0 entered promiscuous mode [ 438.674546][T26103] device syzkaller0 entered promiscuous mode [ 440.136830][T26200] device syzkaller0 entered promiscuous mode [ 440.649674][T26225] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.657371][T26225] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.730099][T26225] device bridge0 left promiscuous mode [ 440.899829][T26229] device syzkaller0 entered promiscuous mode [ 440.940147][T26228] device bridge_slave_1 left promiscuous mode [ 440.960350][T26228] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.005935][T26228] device bridge_slave_0 left promiscuous mode [ 441.032645][T26228] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.117942][T26238] device wg2 left promiscuous mode [ 441.841491][T26296] ±ÿ: renamed from team_slave_1 [ 442.152740][T26322] device syzkaller0 entered promiscuous mode [ 442.864738][T26404] device syzkaller0 entered promiscuous mode [ 444.960924][T26498] device syzkaller0 entered promiscuous mode [ 445.192628][T26500] device syzkaller0 entered promiscuous mode [ 445.923657][T26520] device syzkaller0 entered promiscuous mode [ 447.056006][T26544] device syzkaller0 entered promiscuous mode [ 447.158399][T26568] device syzkaller0 entered promiscuous mode [ 447.416286][T26611] +: renamed from team_slave_1 [ 448.941846][T26693] device syzkaller0 entered promiscuous mode [ 450.968143][T26799] sock: sock_set_timeout: `syz.1.7768' (pid 26799) tries to set negative timeout [ 451.012531][T26804] syz.0.7769[26804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.012601][T26804] syz.0.7769[26804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.454669][T26864] device syzkaller0 entered promiscuous mode [ 452.624857][T26875] device syzkaller0 entered promiscuous mode [ 452.829512][T26882] device syzkaller0 entered promiscuous mode [ 453.780779][T26912] device dummy0 entered promiscuous mode [ 456.327433][T27073] device sit0 left promiscuous mode [ 457.093407][T27127] syz.4.7864[27127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.986775][T27155] device sit0 left promiscuous mode [ 458.369057][T27157] device syzkaller0 entered promiscuous mode [ 458.402348][T27163] device syzkaller0 left promiscuous mode [ 458.592796][T27175] device syzkaller0 entered promiscuous mode [ 458.842475][T27194] device syzkaller0 entered promiscuous mode [ 458.938486][T27198] FAULT_INJECTION: forcing a failure. [ 458.938486][T27198] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 459.024363][T27198] CPU: 1 PID: 27198 Comm: syz.3.7886 Tainted: G W syzkaller #0 [ 459.033246][T27198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 459.043762][T27198] Call Trace: [ 459.047236][T27198] __dump_stack+0x21/0x24 [ 459.051680][T27198] dump_stack_lvl+0x1a7/0x208 [ 459.056360][T27198] ? show_regs_print_info+0x18/0x18 [ 459.061560][T27198] ? vfs_write+0xb27/0xdc0 [ 459.065983][T27198] dump_stack+0x15/0x1c [ 459.070144][T27198] should_fail+0x3c1/0x510 [ 459.074662][T27198] should_fail_usercopy+0x1a/0x20 [ 459.079693][T27198] _copy_from_user+0x20/0xd0 [ 459.084287][T27198] __se_sys_bpf+0x1bb/0x740 [ 459.088795][T27198] ? __x64_sys_bpf+0x90/0x90 [ 459.093400][T27198] ? debug_smp_processor_id+0x17/0x20 [ 459.098780][T27198] __x64_sys_bpf+0x7b/0x90 [ 459.103196][T27198] do_syscall_64+0x31/0x40 [ 459.107631][T27198] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 459.113617][T27198] RIP: 0033:0x7f79adda6819 [ 459.118039][T27198] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 459.137758][T27198] RSP: 002b:00007f79ac801028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 459.146187][T27198] RAX: ffffffffffffffda RBX: 00007f79ae01ffa0 RCX: 00007f79adda6819 [ 459.154175][T27198] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 459.162174][T27198] RBP: 00007f79ac801090 R08: 0000000000000000 R09: 0000000000000000 [ 459.170179][T27198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.178155][T27198] R13: 00007f79ae020038 R14: 00007f79ae01ffa0 R15: 00007ffd62ffd6c8 [ 459.882349][T27259] FAULT_INJECTION: forcing a failure. [ 459.882349][T27259] name failslab, interval 1, probability 0, space 0, times 1 [ 460.048638][T27259] CPU: 0 PID: 27259 Comm: syz.1.7902 Tainted: G W syzkaller #0 [ 460.057530][T27259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 460.067589][T27259] Call Trace: [ 460.070892][T27259] __dump_stack+0x21/0x24 [ 460.075225][T27259] dump_stack_lvl+0x1a7/0x208 [ 460.079892][T27259] ? show_regs_print_info+0x18/0x18 [ 460.085080][T27259] ? stack_trace_save+0xa6/0xf0 [ 460.089920][T27259] ? stack_trace_snprint+0xf0/0xf0 [ 460.095466][T27259] dump_stack+0x15/0x1c [ 460.099613][T27259] should_fail+0x3c1/0x510 [ 460.104017][T27259] ? kvmalloc_node+0x88/0x130 [ 460.108685][T27259] __should_failslab+0xa4/0xe0 [ 460.113441][T27259] should_failslab+0x9/0x20 [ 460.117931][T27259] __kmalloc+0x60/0x330 [ 460.122075][T27259] kvmalloc_node+0x88/0x130 [ 460.126569][T27259] __htab_map_lookup_and_delete_batch+0x490/0x1880 [ 460.133155][T27259] ? memset+0x35/0x40 [ 460.137128][T27259] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 460.143708][T27259] ? lookup_nulls_elem_raw+0x160/0x160 [ 460.149166][T27259] htab_percpu_map_lookup_and_delete_batch+0x33/0x40 [ 460.155828][T27259] ? htab_percpu_map_lookup_batch+0x40/0x40 [ 460.161792][T27259] bpf_map_do_batch+0x463/0x5f0 [ 460.166633][T27259] __se_sys_bpf+0x3b0/0x740 [ 460.171475][T27259] ? __x64_sys_bpf+0x90/0x90 [ 460.176056][T27259] ? debug_smp_processor_id+0x17/0x20 [ 460.181416][T27259] __x64_sys_bpf+0x7b/0x90 [ 460.185819][T27259] do_syscall_64+0x31/0x40 [ 460.190226][T27259] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 460.196109][T27259] RIP: 0033:0x7faa89f9c819 [ 460.200519][T27259] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 460.220207][T27259] RSP: 002b:00007faa889d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 460.228697][T27259] RAX: ffffffffffffffda RBX: 00007faa8a216090 RCX: 00007faa89f9c819 [ 460.236833][T27259] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 460.244796][T27259] RBP: 00007faa889d6090 R08: 0000000000000000 R09: 0000000000000000 [ 460.252754][T27259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.260716][T27259] R13: 00007faa8a216128 R14: 00007faa8a216090 R15: 00007ffe8aeb9528 [ 463.349060][T27437] FAULT_INJECTION: forcing a failure. [ 463.349060][T27437] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 463.480801][T27437] CPU: 1 PID: 27437 Comm: syz.1.7950 Tainted: G W syzkaller #0 [ 463.489788][T27437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 463.499862][T27437] Call Trace: [ 463.503168][T27437] __dump_stack+0x21/0x24 [ 463.507511][T27437] dump_stack_lvl+0x1a7/0x208 [ 463.512188][T27437] ? show_regs_print_info+0x18/0x18 [ 463.517556][T27437] ? stack_trace_save+0xa6/0xf0 [ 463.522402][T27437] dump_stack+0x15/0x1c [ 463.526552][T27437] should_fail+0x3c1/0x510 [ 463.531048][T27437] should_fail_alloc_page+0x4f/0x60 [ 463.536234][T27437] __alloc_pages_nodemask+0x119/0x620 [ 463.542028][T27437] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 463.547646][T27437] ? 0xffffffffa0018fb8 [ 463.551803][T27437] ? __kernel_text_address+0xa0/0x100 [ 463.557250][T27437] wp_page_copy+0x1e5/0x15f0 [ 463.561830][T27437] ? trace_spf_pte_lock+0x110/0x110 [ 463.567024][T27437] do_wp_page+0x9a6/0xc80 [ 463.571346][T27437] handle_pte_fault+0xac1/0x3750 [ 463.576274][T27437] handle_mm_fault+0xf81/0x1710 [ 463.581124][T27437] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 463.587543][T27437] ? can_reuse_spf_vma+0xe0/0xe0 [ 463.592504][T27437] ? __kasan_check_write+0x14/0x20 [ 463.597646][T27437] ? down_read_trylock+0x106/0x160 [ 463.602745][T27437] ? __init_rwsem+0x1c0/0x1c0 [ 463.607411][T27437] ? vmacache_update+0xb7/0x120 [ 463.612245][T27437] ? find_vma+0x13b/0x150 [ 463.616648][T27437] do_user_addr_fault+0x5a8/0xc90 [ 463.621661][T27437] ? do_kern_addr_fault+0x80/0x80 [ 463.626674][T27437] ? debug_smp_processor_id+0x17/0x20 [ 463.632034][T27437] exc_page_fault+0x5a/0xc0 [ 463.636546][T27437] asm_exc_page_fault+0x1e/0x30 [ 463.641586][T27437] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 463.648160][T27437] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 463.667971][T27437] RSP: 0018:ffffc900011afac0 EFLAGS: 00050206 [ 463.674129][T27437] RAX: ffffffff823e7401 RBX: 0000000000001400 RCX: 0000000000000940 [ 463.682094][T27437] RDX: 0000000000001400 RSI: ffff88810f098ac0 RDI: 0000200000001000 [ 463.690057][T27437] RBP: ffffc900011afaf0 R08: ffff88810f0993ff R09: 1ffff11021e1327f [ 463.698104][T27437] R10: dffffc0000000000 R11: ffffed1021e13280 R12: 00007ffffffff000 [ 463.706085][T27437] R13: 0000200000001940 R14: ffff88810f098000 R15: 0000200000000540 [ 463.714058][T27437] ? _copy_from_user+0x61/0xd0 [ 463.718815][T27437] ? _copy_to_user+0x78/0x90 [ 463.723480][T27437] __htab_map_lookup_and_delete_batch+0x150e/0x1880 [ 463.730091][T27437] ? lookup_nulls_elem_raw+0x160/0x160 [ 463.735551][T27437] htab_percpu_map_lookup_and_delete_batch+0x33/0x40 [ 463.742335][T27437] ? htab_percpu_map_lookup_batch+0x40/0x40 [ 463.748239][T27437] bpf_map_do_batch+0x463/0x5f0 [ 463.753112][T27437] __se_sys_bpf+0x3b0/0x740 [ 463.757611][T27437] ? __x64_sys_bpf+0x90/0x90 [ 463.762198][T27437] ? debug_smp_processor_id+0x17/0x20 [ 463.767604][T27437] __x64_sys_bpf+0x7b/0x90 [ 463.772015][T27437] do_syscall_64+0x31/0x40 [ 463.776424][T27437] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 463.782314][T27437] RIP: 0033:0x7faa89f9c819 [ 463.786720][T27437] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 463.806335][T27437] RSP: 002b:00007faa889d6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 463.814748][T27437] RAX: ffffffffffffffda RBX: 00007faa8a216090 RCX: 00007faa89f9c819 [ 463.822797][T27437] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 463.830755][T27437] RBP: 00007faa889d6090 R08: 0000000000000000 R09: 0000000000000000 [ 463.838721][T27437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 463.846769][T27437] R13: 00007faa8a216128 R14: 00007faa8a216090 R15: 00007ffe8aeb9528 [ 464.409262][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 464.422918][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 466.005741][T27584] device wg2 entered promiscuous mode [ 466.014689][T27584] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 466.151675][T27599] device syzkaller0 entered promiscuous mode [ 466.349016][T27602] device syzkaller0 entered promiscuous mode [ 470.198985][T27830] device syzkaller0 entered promiscuous mode [ 470.728491][T27854] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 470.801317][T27851] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.808394][T27851] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.816108][T27851] device bridge_slave_0 entered promiscuous mode [ 470.828583][T27851] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.835702][T27851] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.843223][T27851] device bridge_slave_1 entered promiscuous mode [ 470.916599][T27851] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.923776][T27851] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.931089][T27851] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.938230][T27851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.978232][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.987064][T19951] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.994463][T19951] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.007981][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 471.028197][T19951] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.035306][T19951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.048249][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 471.057057][T19951] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.064219][T19951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.081043][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 471.095364][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 471.111796][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 471.152023][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 471.165176][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 471.187632][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 471.215293][T27851] device veth0_vlan entered promiscuous mode [ 471.270662][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 471.307449][T27851] device veth1_macvtap entered promiscuous mode [ 471.323271][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 471.366106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 471.563269][ T24] audit: type=1400 audit(1775687604.140:177): avc: denied { create } for pid=27903 comm="syz.2.8104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 471.584106][T27901] veth0_vlan: mtu greater than device maximum [ 471.966046][ T49] bridge0: port 3(gretap0) entered disabled state [ 471.995866][ T49] device gretap0 left promiscuous mode [ 472.052215][ T49] bridge0: port 3(gretap0) entered disabled state [ 472.309327][ T49] device ÿÿÿÿÿÿ left promiscuous mode [ 472.314915][ T49] Ÿë: port 1(ÿÿÿÿÿÿ) entered disabled state [ 472.330440][ T49] nr0: port 1(macsec0) entered disabled state [ 472.345475][ T49] device bridge_slave_1 left promiscuous mode [ 472.345644][T27942] FAULT_INJECTION: forcing a failure. [ 472.345644][T27942] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.357066][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.385810][ T49] device bridge_slave_0 left promiscuous mode [ 472.394282][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.401699][T27942] CPU: 1 PID: 27942 Comm: syz.0.8115 Tainted: G W syzkaller #0 [ 472.410543][T27942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 472.420630][T27942] Call Trace: [ 472.423929][T27942] __dump_stack+0x21/0x24 [ 472.428271][T27942] dump_stack_lvl+0x1a7/0x208 [ 472.432948][T27942] ? show_regs_print_info+0x18/0x18 [ 472.438160][T27942] ? rcu_gp_kthread_wake+0x90/0x90 [ 472.443282][T27942] dump_stack+0x15/0x1c [ 472.447440][T27942] should_fail+0x3c1/0x510 [ 472.451940][T27942] should_fail_usercopy+0x1a/0x20 [ 472.456964][T27942] _copy_to_user+0x20/0x90 [ 472.461393][T27942] __htab_map_lookup_and_delete_batch+0x149f/0x1880 [ 472.468004][T27942] ? lookup_nulls_elem_raw+0x160/0x160 [ 472.473462][T27942] htab_percpu_map_lookup_and_delete_batch+0x33/0x40 [ 472.480221][T27942] ? htab_percpu_map_lookup_batch+0x40/0x40 [ 472.486206][T27942] bpf_map_do_batch+0x463/0x5f0 [ 472.491076][T27942] __se_sys_bpf+0x3b0/0x740 [ 472.495589][T27942] ? __x64_sys_bpf+0x90/0x90 [ 472.500199][T27942] ? debug_smp_processor_id+0x17/0x20 [ 472.505579][T27942] __x64_sys_bpf+0x7b/0x90 [ 472.510006][T27942] do_syscall_64+0x31/0x40 [ 472.514429][T27942] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 472.520321][T27942] RIP: 0033:0x7f07e7de5819 [ 472.524741][T27942] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 472.544445][T27942] RSP: 002b:00007f07e681f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 472.552878][T27942] RAX: ffffffffffffffda RBX: 00007f07e805f090 RCX: 00007f07e7de5819 [ 472.560959][T27942] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 472.568935][T27942] RBP: 00007f07e681f090 R08: 0000000000000000 R09: 0000000000000000 [ 472.576905][T27942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 472.584952][T27942] R13: 00007f07e805f128 R14: 00007f07e805f090 R15: 00007ffd28a3fa78 [ 473.363235][T28001] device syzkaller0 entered promiscuous mode [ 473.679984][ T24] audit: type=1400 audit(1775687606.260:178): avc: denied { create } for pid=28019 comm="syz.0.8137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 475.470173][T28087] device syzkaller0 entered promiscuous mode [ 475.912010][T28117] device syzkaller0 entered promiscuous mode [ 476.050080][T28126] device GPL entered promiscuous mode [ 476.488946][T28170] device sit0 entered promiscuous mode [ 476.803947][T28198] device syzkaller0 entered promiscuous mode [ 476.908833][T28208] device syzkaller0 entered promiscuous mode [ 477.259159][T28239] device syzkaller0 entered promiscuous mode [ 477.361256][T28247] ÿÿÿÿÿÿ: renamed from vlan1 [ 477.699508][T28278] syz.3.8211[28278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.699565][T28278] syz.3.8211[28278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 478.648051][T28337] FAULT_INJECTION: forcing a failure. [ 478.648051][T28337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 478.778367][T28337] CPU: 0 PID: 28337 Comm: syz.0.8230 Tainted: G W syzkaller #0 [ 478.787361][T28337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 478.797514][T28337] Call Trace: [ 478.800827][T28337] __dump_stack+0x21/0x24 [ 478.805246][T28337] dump_stack_lvl+0x1a7/0x208 [ 478.809924][T28337] ? show_regs_print_info+0x18/0x18 [ 478.815405][T28337] ? rcu_gp_kthread_wake+0x90/0x90 [ 478.820605][T28337] dump_stack+0x15/0x1c [ 478.824767][T28337] should_fail+0x3c1/0x510 [ 478.829194][T28337] should_fail_usercopy+0x1a/0x20 [ 478.834372][T28337] _copy_to_user+0x20/0x90 [ 478.838814][T28337] __htab_map_lookup_and_delete_batch+0x150e/0x1880 [ 478.845505][T28337] ? lookup_nulls_elem_raw+0x160/0x160 [ 478.850988][T28337] htab_percpu_map_lookup_and_delete_batch+0x33/0x40 [ 478.857740][T28337] ? htab_percpu_map_lookup_batch+0x40/0x40 [ 478.863626][T28337] bpf_map_do_batch+0x463/0x5f0 [ 478.868467][T28337] __se_sys_bpf+0x3b0/0x740 [ 478.872962][T28337] ? __x64_sys_bpf+0x90/0x90 [ 478.877546][T28337] ? debug_smp_processor_id+0x17/0x20 [ 478.882922][T28337] __x64_sys_bpf+0x7b/0x90 [ 478.887422][T28337] do_syscall_64+0x31/0x40 [ 478.891834][T28337] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 478.898236][T28337] RIP: 0033:0x7f07e7de5819 [ 478.902646][T28337] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 478.922242][T28337] RSP: 002b:00007f07e681f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 478.930912][T28337] RAX: ffffffffffffffda RBX: 00007f07e805f090 RCX: 00007f07e7de5819 [ 478.938961][T28337] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 478.946949][T28337] RBP: 00007f07e681f090 R08: 0000000000000000 R09: 0000000000000000 [ 478.954913][T28337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 478.962993][T28337] R13: 00007f07e805f128 R14: 00007f07e805f090 R15: 00007ffd28a3fa78 [ 478.972293][T28339] device pim6reg1 entered promiscuous mode [ 479.734734][T28379] FAULT_INJECTION: forcing a failure. [ 479.734734][T28379] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 479.799953][T28379] CPU: 1 PID: 28379 Comm: syz.2.8242 Tainted: G W syzkaller #0 [ 479.808838][T28379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 479.818998][T28379] Call Trace: [ 479.822311][T28379] __dump_stack+0x21/0x24 [ 479.826661][T28379] dump_stack_lvl+0x1a7/0x208 [ 479.831347][T28379] ? show_regs_print_info+0x18/0x18 [ 479.836573][T28379] dump_stack+0x15/0x1c [ 479.840731][T28379] should_fail+0x3c1/0x510 [ 479.845157][T28379] should_fail_alloc_page+0x4f/0x60 [ 479.850367][T28379] __alloc_pages_nodemask+0x119/0x620 [ 479.855753][T28379] ? rotate_reclaimable_page+0x4b0/0x4b0 [ 479.861482][T28379] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 479.867048][T28379] ? __mod_node_page_state+0x9e/0xd0 [ 479.872337][T28379] ? lru_cache_add+0x164/0x380 [ 479.877102][T28379] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 479.884050][T28379] wp_page_copy+0x1e5/0x15f0 [ 479.889168][T28379] ? trace_spf_pte_lock+0x110/0x110 [ 479.894372][T28379] do_wp_page+0x9a6/0xc80 [ 479.898844][T28379] handle_pte_fault+0xac1/0x3750 [ 479.903794][T28379] handle_mm_fault+0xf81/0x1710 [ 479.908660][T28379] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 479.915083][T28379] ? can_reuse_spf_vma+0xe0/0xe0 [ 479.920030][T28379] ? __kasan_check_write+0x14/0x20 [ 479.925145][T28379] ? down_read_trylock+0x106/0x160 [ 479.930258][T28379] ? __init_rwsem+0x1c0/0x1c0 [ 479.935028][T28379] ? find_vma+0x30/0x150 [ 479.939274][T28379] do_user_addr_fault+0x5a8/0xc90 [ 479.944307][T28379] ? do_kern_addr_fault+0x80/0x80 [ 479.949353][T28379] ? debug_smp_processor_id+0x17/0x20 [ 479.954741][T28379] exc_page_fault+0x5a/0xc0 [ 479.959256][T28379] asm_exc_page_fault+0x1e/0x30 [ 479.964128][T28379] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 479.970733][T28379] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 479.990449][T28379] RSP: 0018:ffffc90000f67ac0 EFLAGS: 00050206 [ 479.996537][T28379] RAX: ffffffff823e7401 RBX: 0000000000001400 RCX: 0000000000000d40 [ 480.004524][T28379] RDX: 0000000000001400 RSI: ffff88810f0606c0 RDI: 0000200000007000 [ 480.012514][T28379] RBP: ffffc90000f67af0 R08: ffff88810f0613ff R09: 1ffff11021e0c27f [ 480.020586][T28379] R10: dffffc0000000000 R11: ffffed1021e0c280 R12: 00007ffffffff000 [ 480.028652][T28379] R13: 0000200000007d40 R14: ffff88810f060000 R15: 0000200000006940 [ 480.036642][T28379] ? _copy_from_user+0x61/0xd0 [ 480.041409][T28379] ? _copy_to_user+0x78/0x90 [ 480.046003][T28379] __htab_map_lookup_and_delete_batch+0x150e/0x1880 [ 480.052605][T28379] ? lookup_nulls_elem_raw+0x160/0x160 [ 480.058082][T28379] htab_percpu_map_lookup_and_delete_batch+0x33/0x40 [ 480.064768][T28379] ? htab_percpu_map_lookup_batch+0x40/0x40 [ 480.070678][T28379] bpf_map_do_batch+0x463/0x5f0 [ 480.075540][T28379] __se_sys_bpf+0x3b0/0x740 [ 480.080047][T28379] ? __x64_sys_bpf+0x90/0x90 [ 480.084632][T28379] ? debug_smp_processor_id+0x17/0x20 [ 480.090011][T28379] __x64_sys_bpf+0x7b/0x90 [ 480.094587][T28379] do_syscall_64+0x31/0x40 [ 480.099084][T28379] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 480.104975][T28379] RIP: 0033:0x7f8cb9b39819 [ 480.109472][T28379] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 480.129069][T28379] RSP: 002b:00007f8cb8573028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 480.137561][T28379] RAX: ffffffffffffffda RBX: 00007f8cb9db3090 RCX: 00007f8cb9b39819 [ 480.145522][T28379] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 480.153483][T28379] RBP: 00007f8cb8573090 R08: 0000000000000000 R09: 0000000000000000 [ 480.161441][T28379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 480.169401][T28379] R13: 00007f8cb9db3128 R14: 00007f8cb9db3090 R15: 00007fff13218fe8 [ 480.371206][T28407] device syzkaller0 entered promiscuous mode [ 480.806955][T28434] FAULT_INJECTION: forcing a failure. [ 480.806955][T28434] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 480.836650][T28434] CPU: 0 PID: 28434 Comm: syz.0.8257 Tainted: G W syzkaller #0 [ 480.845530][T28434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 480.855693][T28434] Call Trace: [ 480.858999][T28434] __dump_stack+0x21/0x24 [ 480.863332][T28434] dump_stack_lvl+0x1a7/0x208 [ 480.868013][T28434] ? show_regs_print_info+0x18/0x18 [ 480.873214][T28434] ? rcu_gp_kthread_wake+0x90/0x90 [ 480.878333][T28434] dump_stack+0x15/0x1c [ 480.882490][T28434] should_fail+0x3c1/0x510 [ 480.886931][T28434] should_fail_usercopy+0x1a/0x20 [ 480.891957][T28434] _copy_to_user+0x20/0x90 [ 480.896377][T28434] __htab_map_lookup_and_delete_batch+0x149f/0x1880 [ 480.902979][T28434] ? lookup_nulls_elem_raw+0x160/0x160 [ 480.908446][T28434] htab_percpu_map_lookup_and_delete_batch+0x33/0x40 [ 480.915207][T28434] ? htab_percpu_map_lookup_batch+0x40/0x40 [ 480.921102][T28434] bpf_map_do_batch+0x463/0x5f0 [ 480.926045][T28434] __se_sys_bpf+0x3b0/0x740 [ 480.930823][T28434] ? __x64_sys_bpf+0x90/0x90 [ 480.935418][T28434] ? debug_smp_processor_id+0x17/0x20 [ 480.940792][T28434] __x64_sys_bpf+0x7b/0x90 [ 480.945213][T28434] do_syscall_64+0x31/0x40 [ 480.949725][T28434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 480.955620][T28434] RIP: 0033:0x7f07e7de5819 [ 480.960038][T28434] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 480.979658][T28434] RSP: 002b:00007f07e681f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 480.988238][T28434] RAX: ffffffffffffffda RBX: 00007f07e805f090 RCX: 00007f07e7de5819 [ 480.996325][T28434] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 481.004314][T28434] RBP: 00007f07e681f090 R08: 0000000000000000 R09: 0000000000000000 [ 481.012306][T28434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 481.020378][T28434] R13: 00007f07e805f128 R14: 00007f07e805f090 R15: 00007ffd28a3fa78 [ 481.364578][T28468] device syzkaller0 entered promiscuous mode [ 481.989120][T28493] FAULT_INJECTION: forcing a failure. [ 481.989120][T28493] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 482.244560][T28493] CPU: 1 PID: 28493 Comm: syz.2.8278 Tainted: G W syzkaller #0 [ 482.253524][T28493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 482.263679][T28493] Call Trace: [ 482.266994][T28493] __dump_stack+0x21/0x24 [ 482.271350][T28493] dump_stack_lvl+0x1a7/0x208 [ 482.276054][T28493] ? show_regs_print_info+0x18/0x18 [ 482.281280][T28493] dump_stack+0x15/0x1c [ 482.285440][T28493] should_fail+0x3c1/0x510 [ 482.289862][T28493] should_fail_alloc_page+0x4f/0x60 [ 482.295147][T28493] __alloc_pages_nodemask+0x119/0x620 [ 482.300525][T28493] ? rotate_reclaimable_page+0x4b0/0x4b0 [ 482.306156][T28493] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 482.311793][T28493] ? __mod_node_page_state+0x9e/0xd0 [ 482.317171][T28493] ? lru_cache_add+0x164/0x380 [ 482.321941][T28493] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 482.328907][T28493] wp_page_copy+0x1e5/0x15f0 [ 482.333500][T28493] ? trace_spf_pte_lock+0x110/0x110 [ 482.338788][T28493] do_wp_page+0x9a6/0xc80 [ 482.343124][T28493] handle_pte_fault+0xac1/0x3750 [ 482.348078][T28493] handle_mm_fault+0xf81/0x1710 [ 482.352926][T28493] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 482.359435][T28493] ? can_reuse_spf_vma+0xe0/0xe0 [ 482.364374][T28493] ? __kasan_check_write+0x14/0x20 [ 482.369485][T28493] ? down_read_trylock+0x106/0x160 [ 482.374597][T28493] ? __init_rwsem+0x1c0/0x1c0 [ 482.379283][T28493] ? find_vma+0x30/0x150 [ 482.383523][T28493] do_user_addr_fault+0x5a8/0xc90 [ 482.388640][T28493] ? do_kern_addr_fault+0x80/0x80 [ 482.393668][T28493] ? debug_smp_processor_id+0x17/0x20 [ 482.399043][T28493] exc_page_fault+0x5a/0xc0 [ 482.403545][T28493] asm_exc_page_fault+0x1e/0x30 [ 482.408405][T28493] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 482.415003][T28493] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 482.434611][T28493] RSP: 0018:ffffc90000f67ac0 EFLAGS: 00050206 [ 482.440682][T28493] RAX: ffffffff823e7401 RBX: 0000000000001400 RCX: 0000000000000d40 [ 482.448669][T28493] RDX: 0000000000001400 RSI: ffff88811f0606c0 RDI: 0000200000007000 [ 482.456738][T28493] RBP: ffffc90000f67af0 R08: ffff88811f0613ff R09: 1ffff11023e0c27f [ 482.464709][T28493] R10: dffffc0000000000 R11: ffffed1023e0c280 R12: 00007ffffffff000 [ 482.472692][T28493] R13: 0000200000007d40 R14: ffff88811f060000 R15: 0000200000006940 [ 482.480679][T28493] ? _copy_from_user+0x61/0xd0 [ 482.485470][T28493] ? _copy_to_user+0x78/0x90 [ 482.490063][T28493] __htab_map_lookup_and_delete_batch+0x150e/0x1880 [ 482.496654][T28493] ? lookup_nulls_elem_raw+0x160/0x160 [ 482.502117][T28493] htab_percpu_map_lookup_and_delete_batch+0x33/0x40 [ 482.508824][T28493] ? htab_percpu_map_lookup_batch+0x40/0x40 [ 482.514715][T28493] bpf_map_do_batch+0x463/0x5f0 [ 482.519564][T28493] __se_sys_bpf+0x3b0/0x740 [ 482.524238][T28493] ? __x64_sys_bpf+0x90/0x90 [ 482.528846][T28493] ? debug_smp_processor_id+0x17/0x20 [ 482.534224][T28493] __x64_sys_bpf+0x7b/0x90 [ 482.538655][T28493] do_syscall_64+0x31/0x40 [ 482.543080][T28493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 482.548973][T28493] RIP: 0033:0x7f8cb9b39819 [ 482.553385][T28493] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 482.572992][T28493] RSP: 002b:00007f8cb8573028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 482.581519][T28493] RAX: ffffffffffffffda RBX: 00007f8cb9db3090 RCX: 00007f8cb9b39819 [ 482.589493][T28493] RDX: 0000000000000038 RSI: 0000200000000800 RDI: 0000000000000019 [ 482.597776][T28493] RBP: 00007f8cb8573090 R08: 0000000000000000 R09: 0000000000000000 [ 482.605763][T28493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 482.613994][T28493] R13: 00007f8cb9db3128 R14: 00007f8cb9db3090 R15: 00007fff13218fe8 [ 484.173713][T28573] device syzkaller0 entered promiscuous mode [ 484.308757][T28599] device syzkaller0 entered promiscuous mode [ 484.318907][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 484.574736][T28617] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.581975][T28617] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.599918][T28617] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.607055][T28617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.614335][T28617] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.621405][T28617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.631383][T28617] device bridge0 entered promiscuous mode [ 484.852043][T28650] : port 2(syz_tun) entered blocking state [ 484.861312][T28650] : port 2(syz_tun) entered disabled state [ 484.868072][T28650] device syz_tun entered promiscuous mode [ 486.290978][T28753] device syzkaller0 left promiscuous mode [ 486.816155][T28822] device syz_tun entered promiscuous mode [ 487.419399][T28870] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 487.462429][T28870] device syzkaller0 entered promiscuous mode [ 487.997998][T28926] device wg2 entered promiscuous mode [ 488.007889][T28926] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 488.572099][T28975] device syzkaller0 entered promiscuous mode [ 488.800161][T28993] device syzkaller0 entered promiscuous mode [ 488.872300][T28993] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 488.894542][T28993] syzkaller0: Linktype set failed because interface is up [ 490.784841][T29148] device sit0 left promiscuous mode [ 492.393417][T29248] cgroup: fork rejected by pids controller in /syz0 [ 492.740588][T29344] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.747977][T29344] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.755720][T29344] device bridge_slave_0 entered promiscuous mode [ 492.763237][T29344] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.770840][T29344] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.781400][T29344] device bridge_slave_1 entered promiscuous mode [ 492.849437][T29344] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.856611][T29344] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.863927][T29344] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.870979][T29344] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.990201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 493.020023][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.084673][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.165278][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 493.176325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 493.184560][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 493.191621][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 493.210904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 493.236768][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 493.247385][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 493.254520][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 493.274861][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 493.289708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 493.308128][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 493.329090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 493.409617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 493.421484][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 493.484416][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 493.493947][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 493.503941][T29344] device veth0_vlan entered promiscuous mode [ 493.523294][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 493.532174][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 493.554109][T29344] device veth1_macvtap entered promiscuous mode [ 493.587044][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 493.602834][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 493.611247][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 493.672372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 493.684498][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 493.699231][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 493.710175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 494.513353][T29420] bridge0: port 1(bridge_slave_0) entered blocking state [ 494.557886][T29420] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.591162][T29420] device bridge_slave_0 entered promiscuous mode [ 494.775812][T29420] bridge0: port 2(bridge_slave_1) entered blocking state [ 494.782905][T29420] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.835713][T29420] device bridge_slave_1 entered promiscuous mode [ 495.189774][T29420] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.196982][T29420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 495.204386][T29420] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.211704][T29420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 495.333841][T19951] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.351913][T19951] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.535475][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 495.543164][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 495.560869][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 495.578197][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 495.594002][T19951] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.601200][T19951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 495.621676][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 495.637702][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 495.650255][T19951] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.657348][T19951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 495.665251][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 495.673462][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 495.682223][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 495.691260][T19951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 495.814214][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 495.823234][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 495.845148][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 495.853605][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 495.862196][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 495.870104][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 495.888395][T29420] device veth0_vlan entered promiscuous mode [ 495.929577][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 495.938621][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 495.966607][T29476] device syzkaller0 entered promiscuous mode [ 495.978379][T29420] device veth1_macvtap entered promiscuous mode [ 496.034960][T29492] syz.1.8561[29492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.035101][T29492] syz.1.8561[29492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.073321][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 496.103550][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 496.112647][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 496.121267][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 496.131187][ T297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 496.360136][T29522] syz.3.8571[29522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 496.360203][T29522] syz.3.8571[29522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.152227][T29550] device syzkaller0 entered promiscuous mode [ 497.978175][T29571] device syzkaller0 entered promiscuous mode [ 498.113804][ T49] device veth0_to_team left promiscuous mode [ 498.121060][ T49] Ÿë: port 1(veth0_to_team) entered disabled state [ 498.139292][ T49] device veth1_macvtap left promiscuous mode [ 498.148255][ T49] device veth0_vlan left promiscuous mode [ 499.489328][T29623] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.496507][T29623] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.512982][T29623] device bridge0 left promiscuous mode [ 499.528314][T29623] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.535425][T29623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 499.542709][T29623] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.549884][T29623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 499.630707][T29623] device bridge0 entered promiscuous mode [ 500.848813][T29658] device syzkaller0 entered promiscuous mode [ 500.892551][T29666] device syzkaller0 entered promiscuous mode [ 501.166632][T29691] ªªªªªª™™: renamed from vlan0 [ 501.219139][T29694] bridge0: port 1(bridge_slave_0) entered disabled state [ 501.324600][T29698] device syzkaller0 entered promiscuous mode [ 501.837868][T29727] device syzkaller0 entered promiscuous mode [ 502.752513][T29801] device pim6reg1 entered promiscuous mode [ 503.813019][T29847] device veth1_macvtap left promiscuous mode [ 503.834761][T29847] device veth1_macvtap entered promiscuous mode [ 503.862836][T29847] device macsec0 entered promiscuous mode [ 504.312449][T29897] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 504.331444][T29897] device syzkaller0 entered promiscuous mode [ 504.497929][T29908] device syzkaller0 entered promiscuous mode [ 504.601511][T29912] ªªªªªª™™: renamed from vlan0 [ 505.155777][T29952] device syzkaller0 entered promiscuous mode [ 505.682646][T29983] device syzkaller0 entered promiscuous mode [ 506.476124][T30063] device syzkaller0 entered promiscuous mode [ 507.560010][T30149] tap0: tun_chr_ioctl cmd 1074025677 [ 507.569946][T30149] tap0: linktype set to 778 [ 507.766714][T30158] device syzkaller0 entered promiscuous mode [ 509.537488][T30216] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 509.574092][T30216] device syzkaller0 entered promiscuous mode [ 511.485460][T30267] ------------[ cut here ]------------ [ 511.524666][T30267] kernel BUG at kernel/bpf/arraymap.c:980! [ 511.562627][T30267] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 511.568896][T30267] CPU: 1 PID: 30267 Comm: syz.0.8791 Tainted: G W syzkaller #0 [ 511.577745][T30267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 511.587819][T30267] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 511.594066][T30267] Code: 63 e9 ff eb 05 e8 ec 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff <0f> 0b e8 c5 63 e9 ff 0f 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f [ 511.613671][T30267] RSP: 0018:ffffc90000bc7c10 EFLAGS: 00010283 [ 511.619794][T30267] RAX: ffffffff817b4f84 RBX: ffff888117196310 RCX: 0000000000080000 [ 511.627812][T30267] RDX: ffffc90001519000 RSI: 0000000000000067 RDI: 0000000000000068 [ 511.635789][T30267] RBP: ffffc90000bc7c90 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 511.643859][T30267] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: ffffffffa0030400 [ 511.651836][T30267] R13: ffff8881180d2200 R14: 0000000000000001 R15: 00000000fffffff0 [ 511.659827][T30267] FS: 00007f3eb28db6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 511.668795][T30267] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 511.675387][T30267] CR2: 00002000000029c0 CR3: 0000000132657000 CR4: 00000000003506a0 [ 511.683363][T30267] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000200000000300 [ 511.691428][T30267] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 511.699396][T30267] Call Trace: [ 511.702779][T30267] ? bpf_prog_4b8b081278bac347+0xb/0x898 [ 511.708459][T30267] bpf_fd_array_map_update_elem+0x21f/0x330 [ 511.714437][T30267] bpf_map_update_value+0xb4/0x430 [ 511.719552][T30267] map_update_elem+0x4a1/0x5e0 [ 511.724324][T30267] __se_sys_bpf+0x3e0/0x740 [ 511.728835][T30267] ? __x64_sys_bpf+0x90/0x90 [ 511.733516][T30267] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 511.739679][T30267] __x64_sys_bpf+0x7b/0x90 [ 511.744097][T30267] do_syscall_64+0x31/0x40 [ 511.748634][T30267] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 511.754523][T30267] RIP: 0033:0x7f3eb3e80819 [ 511.758950][T30267] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 511.778556][T30267] RSP: 002b:00007f3eb28db028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 511.786976][T30267] RAX: ffffffffffffffda RBX: 00007f3eb40f9fa0 RCX: 00007f3eb3e80819 [ 511.794963][T30267] RDX: 0000000000000020 RSI: 0000200000000180 RDI: 0000000000000002 [ 511.803058][T30267] RBP: 00007f3eb3f16c91 R08: 0000000000000000 R09: 0000000000000000 [ 511.811122][T30267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 511.819188][T30267] R13: 00007f3eb40fa038 R14: 00007f3eb40f9fa0 R15: 00007ffedbd6c918 [ 511.827250][T30267] Modules linked in: [ 511.876732][T30267] ---[ end trace 892858e0c13851ec ]--- [ 511.882438][T30267] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 511.900701][T30267] Code: 63 e9 ff eb 05 e8 ec 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff <0f> 0b e8 c5 63 e9 ff 0f 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f [ 511.920764][T30267] RSP: 0018:ffffc90000bc7c10 EFLAGS: 00010283 [ 511.927369][T30267] RAX: ffffffff817b4f84 RBX: ffff888117196310 RCX: 0000000000080000 [ 511.935612][T30267] RDX: ffffc90001519000 RSI: 0000000000000067 RDI: 0000000000000068 [ 511.943926][T30267] RBP: ffffc90000bc7c90 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 511.952292][T30267] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: ffffffffa0030400 [ 511.960917][T30267] R13: ffff8881180d2200 R14: 0000000000000001 R15: 00000000fffffff0 [ 511.969295][T30267] FS: 00007f3eb28db6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 511.978555][T30267] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 511.986516][T30267] CR2: 0000000100000000 CR3: 0000000132657000 CR4: 00000000003506b0 [ 511.999361][T30267] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000200000000300 [ 512.015154][T30267] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 512.023573][T30267] Kernel panic - not syncing: Fatal exception [ 512.030052][T30267] Kernel Offset: disabled [ 512.034464][T30267] Rebooting in 86400 seconds..