last executing test programs: 3.862815547s ago: executing program 2 (id=7126): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611000000000000062000300000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x5, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x5}, 0x80) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0xfe, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu<=0||!') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"/2367], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x1c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) 3.26938565s ago: executing program 0 (id=7137): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000006000000040000000000000d"], 0x0, 0x52, 0x0, 0x0, 0x40bb}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0x12, 0xc, 0x8, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000180), &(0x7f0000000280)=r0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071101100000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 3.259204641s ago: executing program 0 (id=7138): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x6936, 0x340, 0x80, 0x1, 0xb98, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x0, 0xe}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000140)={r0, r1}, 0xc) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="0100002010fd"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f3, &(0x7f0000000080)) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r7 = gettid() sendmsg$unix(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="17fb9550430f", 0x6}], 0x1, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xee00}}}], 0x20, 0x80}, 0x40000) r8 = perf_event_open$cgroup(&(0x7f0000000580)={0x2, 0x80, 0x81, 0x9, 0x4, 0x4e, 0x0, 0x10001, 0x40080, 0xf, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x81, 0x1, @perf_config_ext={0x4, 0x7}, 0x820, 0xab5, 0x4, 0x7, 0x76, 0x0, 0x6, 0x0, 0x1000, 0x0, 0x3}, r0, 0xb, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0xf, 0x6, 0xf, 0x5, 0x0, 0x7, 0x50, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000003c0), 0xc}, 0x200, 0x401, 0x81, 0x7, 0x800, 0x9, 0x2, 0x0, 0x7fffffff, 0x0, 0x5}, r7, 0x9, r8, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x48) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r10, 0x1, 0x34, &(0x7f00000000c0)=r9, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071116d00000000008510000002000000850000002b00000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) 3.182523677s ago: executing program 0 (id=7141): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000100000000002f0000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000c000000009500007000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000180)=[0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000280), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) gettid() sendmsg$unix(r3, 0x0, 0x40800) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005100000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x10, &(0x7f0000000040), 0x4) r7 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x1d, 0x0, 0x0, 0x0, 0x945, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000840)={0x2, 0x100007, 0x3, 0x8001}, 0x10}, 0x94) 2.834513098s ago: executing program 2 (id=7147): r0 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) (async) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001840), 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001880), 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001cc0)={r1, 0xe0, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000001a40)=[0x0], &(0x7f0000001a80)=[0x0], 0x0, 0x19, &(0x7f0000001ac0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001b00), &(0x7f0000001b40), 0x8, 0xd4, 0x8, 0x8, &(0x7f0000001b80)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_merged\x00', 0x0, 0x0) recvmsg$unix(r4, &(0x7f0000000180)={&(0x7f0000000040), 0x6e, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/10, 0xa}, {&(0x7f0000000400)=""/221, 0xdd}], 0x2, &(0x7f0000000500)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001dc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001d40), &(0x7f0000001d80)=r1}, 0x20) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async, rerun: 32) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e00)='memory.events.local\x00', 0x0, 0x0) (async, rerun: 32) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001e40)={0x0, 0x2, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ec0)={0x18, 0x15, &(0x7f0000001900)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xf0c8, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd32}, @generic={0x81, 0xc, 0x8, 0x6, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xb5}, @ldst={0x0, 0x2, 0x3, 0x1, 0x0, 0x167, 0xfffffffffffffffc}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000019c0)='GPL\x00', 0xffff, 0x0, 0x0, 0x0, 0xda, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001d00)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001e80)=[r5, r6, r7, 0x1, 0x1, r8], 0x0, 0x10, 0x1000}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000018c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xc7, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x30, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0xa, &(0x7f0000000500)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0xffffffff}, [@map_idx={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0xf}, @generic={0xa7}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x94) (async, rerun: 64) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x6, 0x8, 0x8, 0x40, 0xffffffffffffffff, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r11, &(0x7f00000000c0), 0x0}, 0x20) recvmsg(r10, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f00000005c0)=""/232, 0xe8}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/48, 0x30}], 0x3, &(0x7f0000001740)=""/180, 0xb4}, 0x2000) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=r9, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x3, 0x16, &(0x7f0000002040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x64, '\x00', 0x0, @sched_cls}, 0x94) 2.271947748s ago: executing program 0 (id=7153): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='cpu<60||!') syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0xfa, 0x6, 0xe6, 0x1, 0x0, 0x81, 0x101, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x1, @perf_config_ext={0x7f, 0x2}, 0x1050, 0x4, 0x1, 0x7, 0x6, 0x8, 0x4, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x1, r0, 0x3) 2.062684087s ago: executing program 4 (id=7156): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0xc18, 0x80000000, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x44}, 0x28) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\n\x00\x00'], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000002000000310a000008"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000300), 0x207, r0}, 0x38) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETLINK(r1, 0x400454cc, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) 1.954663656s ago: executing program 2 (id=7157): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000800000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x88) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000007d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x18, 0x24, &(0x7f00000005c0)=@raw=[@exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @exit, @call={0x85, 0x0, 0x0, 0x4d}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3f}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @cb_func={0x18, 0x8, 0x4, 0x0, 0x9}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x6}], &(0x7f0000000080)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x4, 0x5dd, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[r3, r3, r3]}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000bc0)={@fallback=r0, 0x26, 0x1, 0xb, &(0x7f0000000ac0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000b00)=[0x0], &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000b80)=[0x0, 0x0], 0x0}, 0x40) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000c40)={0x8d1, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c00)=ANY=[@ANYRES32=r1, @ANYRES32=r5, @ANYBLOB='.\x00\x00\x004 \x00\x00\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB, @ANYRES64=r7], 0x20) recvmsg$unix(r6, &(0x7f0000000e40)={&(0x7f0000000c80)=@abs, 0x6e, &(0x7f0000000d80)=[{&(0x7f0000001040)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/109, 0x6d}], 0x2, &(0x7f0000000dc0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x10000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000071123a00000000009500000000000000b624be7df60ba4cebf999a11eb773df7e853813c3379787770dc2e2c2d4766251350f373999b8ea57c31a04ba15f69f3ca1303153800c8e14861ed2cad0f74c2d8c11c474e5e0513db91b333e8fc30c6a722fff3373ff1305d945408addcabf26695c21b2199ac6ee4107c7a1480c926d15a"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) 1.952747806s ago: executing program 2 (id=7158): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="b702000000000080bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e240000000000004504040001ffffff9404000001000a00b7040000000100006a0af2fe000000008500000078000000b70000000000000095000000000000009e17f199a68b061b93d83298a8cdda1ce784909b849d5550ad855dab54d8877a6db61d69f2ffcaa10350e11cb97ce8df1bc9a0c4eeceb9171e43405d621ffbc9b0d8ca56b50f0c010d631f6dbc8486bc5d5bf2ca8285056892db03cf1c62dd7c08a90b189d190c341035de53a9a53608c10556e5734eb84049761451ce540c772e069f80cb201b2de17dfdb4b60939d5d6aed4062049b87e03e2cd18568136207304e26f7fcc059c062234d5595f6fbaa187b81d1106000000000f0000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8000000000000000b91c61bd99dc89f12907af7dccd106cb937b450f859ce8292a79c3e40000b59b0fc46d6cec3c080a882add4e1179bd4a44f231a2d73148be428ba953df4aece69311687f4122073a236c3a32efa04137d46f0247d2638da3261c8162bb7c7824be6195a66d2e17e122040e11001131ce319045e5b3334e68475ac3f46aa2837f9004600daded9b19b35eebe52613c346e255421b23a278fd00004270b1cd5fc9aa2286ccca37db965d9dd366598f5ec993cb0cf127e2a46cfbdf63eea190d86a4d1b75ae98480100d33128954a7d093a54f7e75b3753508ca3c41685d1e407315e59d626c23b3f89a926e9382966853774e7dd1f1a2177cdf2802237c177d543e8da47a01f05e117e53518270239b69c117e2637c31085f4d8a596b6edab26afaf6605b231199f38a6fc7eb83714387450ea18eafbace8eec18a4b2c442e7b88a7611c1283bec84e1715fb9f4fcaf52c08058fc4f21c0ad71adabdd850aed3feec6eaab347bdf474e17b9aa345d1e6e3bb83f90230bdf53e7d0e5c3f914d905422b83f30936674ba8f0bffaf2305c0972df71fe5f4e01506471e897bced7798509e64df360d95f9a4099f864b0ba45efbdbd1d9db21a1d5c065567fd70aae68096827fa5c2d9bd20292344c7dcf6241447cfbb05b5d0fdb4e08afbac5397b64aa369922ed7ed8918f97294b6854210d2b93aaf92159dbaa2f186d4a420c68d6baf1c31de4f0bf478bfd51bb1e96ea849a80ae5a89be7e38474c7aade344d68324f9e12a6b9770e6bd12ae69efffaee58040753701af84c2924c1b5aea1650f42c9ae9820a33095f062fb88313d035ea405515a61a4be64f9fa0985c5be592090cc48291004609fdac2ab6100000000000000a84570c7c00d647daf8af334050b61e9b2d3f0adad1d1ff47be19b8da2799e9ecef8efabe73f92dbd0760f8bbd9c710bd1371e2b5d9a2ea2190f5e4f5cd641cdfe5d89f84a368ef7e6ff1eacdc0ec9e97b8f9c9e314661ea0aa8a104008d188b66b3a4aedeed9df4238a08fc2fb1007233cc2c87fcaa0cccd8ec03444471c1dd660c73acc17bff740d199a7c0c52c63c0408b5158e0000000c275eedb02f141113cf2c55b2c08c2c68cc99d2bb5840fba332e1c82862ec9b90104c48e41d32a47ac94ddee815dba8aeb5d3121cf247a81aef7805b020e9eec44cbe3055be69fe066824ba2292b9cdce41635fc00df96fb10a3a8cc60c4a76c65ebbb0640e0a29de94edf5cbefac1c5fa96e7080af804b22cabce10ea52f1018527f4aa39cdafa3eff63de2a7f50d042667820f6f86f276afb2b81da301e031351ee13013137e9d5cec0c84d7e3f82c6fd12eb98f9ea654bcb9ce59a2015183c6e65bb0537e611b830d74c30fb8207fca0990acdbb51e4e234026e00000000b3ebae3eb52c140953a350fcf0124b1a30b1afc29ea56f8413686d912eb8118d73ef9c6d3843ebcb555301c0205dd3040000002e334319c8979c322e92fbc2c400009f2404b941553843de114fdb03c19d606bd760c40f7f28360820b82d548198041562bcbd9edce223b54cf3c35823f3c446f0a20160ac181c96606dbc967673aca98d6f5637b20fd2809a29ea5e40139a19415f7fc5d852209bdfed74008651752b5e052412d3e00a44417b7caf91a173925a66ee6e30723e73f3b7d66d2a5d09ff40c0bc6e7a5cfef7f327018578892a23014c3629f2e41af619f0d9f0ec8d551415051ff94391c03f3501c928ed7818af61729278f84d4730ef28af4c202e0f175e2a5cbddc8b973e2701b33f1b963025220c04817010b6fb70"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000000}, 0x1cad, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0xc18, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.922871139s ago: executing program 0 (id=7159): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x19, 0x52, &(0x7f0000000040)="9d4b49589acdad2091bfdf4345839acec8a99d91f8ffc3e0ca", &(0x7f0000000080)=""/82, 0x800, 0x0, 0x34, 0xbc, &(0x7f0000000100)="41a25a284dd28127a0865e41dc54625a29161b8a01847e042e8b3f41bb66caa396b0746b34edf6e747cf9c5ace89dad4d6ac086c", &(0x7f0000000140)="0745ad8bdcbc9d23b2bda03fbad4f64f2c180defea0f447f12a0e72b98d43e10c92e2342cf2355913f19f7e81b335c4908d8513ab26f95ddc6e94a3b1e24514c552b3105702f38131d65057fda8b4d4be7681db8468a57ef3e6d67802143cb7038c8237ac8e341996fcd73b14b786cde1033c681eb3dfe6e6f11b7244fd4f0c204236a5237e3c5173c430bb3ff2af0e6a26f763c31b84f86b75ac9d6073381992c69c0f42d1a3ae5e11ddcb890e52c8cd78d16887cb7f85c18052f3e", 0x4, 0x0, 0x5}, 0x50) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r0}, 0x8) r2 = openat$cgroup_procs(r1, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x3, 0xf, 0x3, 0xea, 0x0, 0xf, 0x20, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x9, 0x4}, 0x400, 0x7fff, 0x80000000, 0x0, 0xe3a, 0x5b9d, 0x3, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, r1, 0x2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x4800, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0)={r0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r1, 0xe0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001500)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000001540)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb3, &(0x7f00000015c0)=[{}, {}], 0x10, 0x10, &(0x7f0000001600), &(0x7f0000001640), 0x8, 0x5a, 0x8, 0x8, &(0x7f0000001680)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001880)={0x5, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0xb, 0x17, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0xfffffffa}, {}, {}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, @exit, @jmp={0x5, 0x0, 0xa, 0x9, 0x3, 0x4, 0x4}, @ldst={0x1, 0x3, 0x1, 0xa, 0x1, 0xc, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000004c0)='GPL\x00', 0x3, 0x1000, &(0x7f0000000500)=""/4096, 0x41000, 0x68, '\x00', r6, @fallback=0x38, r1, 0x8, &(0x7f0000001800)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000001840)={0x5, 0x0, 0xffffff15, 0x4}, 0x10, r7, r1, 0x7, 0x0, &(0x7f00000018c0)=[{0x1, 0x5, 0xf, 0x2}, {0x4, 0x2, 0xe, 0x5}, {0x0, 0x4, 0x10, 0x7}, {0x1, 0x2, 0xe, 0x2}, {0x5, 0x1, 0x7, 0x1}, {0x1, 0x4, 0x0, 0xb}, {0x0, 0x2, 0x1}], 0x10, 0x8001}, 0x94) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000001a00)='\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001b40)={@fallback=r4, 0x37, 0x0, 0x10000, &(0x7f0000001a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000001a80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001ac0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001b00)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001b80)={@ifindex=r6, r8, 0x33, 0x2008, r0, @value=r1, @void, @void, @void, r10}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001bc0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = openat$cgroup_type(r9, &(0x7f0000001c00), 0x2, 0x0) write$cgroup_devices(r5, &(0x7f0000001c40)={'b', ' *:* ', 'r\x00'}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001c80)={0xa}, 0x8) r13 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001cc0)='ns/uts\x00') openat$cgroup_subtree(r13, &(0x7f0000001d00), 0x2, 0x0) r14 = openat$cgroup_ro(r0, &(0x7f0000001d40)='blkio.bfq.io_queued\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000001d80)) r15 = gettid() r16 = syz_clone(0x10040100, &(0x7f0000002100)="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", 0x1000, &(0x7f0000003100), &(0x7f0000003140), &(0x7f0000003180)="ea30374bda79b3d86d5e1f36813931379c0415bfdd327c5b7d26863e3eb74810f7db97efb272a837117dcb843547dd76fd27903e250e305945c65c43093b849dcff4872914a39497d14d10cdc362f35706b50f8e709336b5155293fc1d76a1bd9656c4bfd870ef535950a7ef6060eca2c5b5b7b98f78ddf2fd559bab047e4fd91f5d95c673aafbc19f969e5e539f90a003dd38c8cf52abb86c0c29142c64a2baa2b6b4010d3da085df22e4e4cd6ab5a36db4fbb43e052ed992bd4dc7e82cbed7ea4b46833cf7a28166") sendmsg$unix(r5, &(0x7f0000003340)={&(0x7f0000001dc0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002080)=[{&(0x7f0000001e40)="8fa44a0b1437de9e9ffd739c2f591c387d8e", 0x12}, {&(0x7f0000001e80)="ae17888ddd603fd36cdc0c038e94d6b64c64a950fbed76ea08991e", 0x1b}, {&(0x7f0000001ec0)="f78c3888a9eaea70509e14b4da1da1e0e3053b70ecf3c412e8da1ae330edac527d17f0523d3491806cd0afd9da3415bfcca7832dc635628fbbd986782dc43813f572c2efe269c87463fe2d1bfd2753dd20cce4ca569fd6ba9d1bdf4f5553f1ac1d0b57a0dc", 0x65}, {&(0x7f0000001f40)="72e16c370a62e8515cb42b8a1ea6ebf474221986f845de3e15e1adb1c5a1382f12fa46e06016b72b1689bb68735ffefed01597c015", 0x35}, {&(0x7f0000001f80)="38a2e8841c494fc46b64d8f652d6d9b6bfea50557b11b63bb6f662b5c0018dbf3d6d60ce25dc8261b6179e51b3b67013853aecc09e09cc227ccc9d5c743210b83bc30badf3dab04b045889fbb89ada9f522b372bc5e81f164bc8c9cb12f54d0d85a64fef675e5ae130e98750324971c4b427a478d1346548bd37330b2cbc15386b18f3ab18ee979bf864b3f6884bcf932fc7484ccfcfa85172ae660cd519eb48148e484fd11536e3ad0f1303bd034ead315d2165a4485297d846a70cdb2a78ea56a5fbc24f017f1e61e001576de3c24a47", 0xd1}], 0x5, &(0x7f0000003280)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r15, 0xee00, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r9]}}, @rights={{0x34, 0x1, 0x1, [r8, r13, r2, r12, r12, r0, r11, r0, r1]}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r16, 0xffffffffffffffff, 0xee01}}}], 0xb8, 0x20000105}, 0x881) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003600)={r5, 0x0, 0x7d, 0x46, &(0x7f0000003380)="73e03ebba410dfcbde6b7955a94ffa1e566767dbe8ae6749ce7a93340bb190fc5ee38c1cef2983def52cca2342a4e51e516d9a8c72214aab8692cef3e3c92e006540897b26ad5141ce1b748dea7aee773700166bd9c851bfb4123a9999758b3c740975186879338e0cab8e866581ef771507a77b8c4c9d75e9189d4c40", &(0x7f0000003400)=""/70, 0xa5, 0x0, 0x99, 0xbf, &(0x7f0000003480)="67d4d2cb28cfd8662a7447481161ce96331507bca374bfb53a29ef5c30f81dd565b2b97e8ba14e6c23f12f3e53ac3e5a1e2c8e10c92c34b62bb4e9a352211296f101395346ac08fa304f09d92462e566b1fe5aca182e59bd5ce6042c5df750ff80bb8f642a2d7ec361af6ea4ea832b61a9109b974d82398360a6168636c191b93d2eea991cc8f983a6dc578d495c605ad774c2dbc8ceeba3d6", &(0x7f0000003540)="88cd36267dc8851b281b703282df0c1b78275d890cb5e9ed0844f9f1784917d9833bc0a242e79660399218309d8c63f5d985bfa0ed52f5c71bb28b7b4cc0f39d5523cee53a507950e28582170bf9288b11b1440bd82fc4ce42f7ed9fa546cd8abda6e23b455ba788c50bff3a0a3611ffdd9905e6aa349735be80d58d76b8e4da7fc776212a30337d5d610a167afa015f4c84516e7d55121a6b2e670423dd81a71c45a993f6ca310c5fa34b924bf228939e13c1a8355054d8e4e6b0e633f81e", 0x1, 0x0, 0x7}, 0x50) openat$cgroup_int(r1, &(0x7f0000003680)='cpuset.mem_exclusive\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003a40)={0xf, 0x1e, &(0x7f00000036c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7f800}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x3}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x480}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f00000037c0)='syzkaller\x00', 0x9, 0xfb, &(0x7f0000003800)=""/251, 0x40f00, 0x14, '\x00', r6, @cgroup_device, r0, 0x8, &(0x7f0000003900)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r14, 0x9, &(0x7f0000003940)=[r5], &(0x7f0000003980)=[{0x4, 0x5, 0x8, 0x2}, {0x3, 0x5, 0xe, 0x8}, {0x0, 0x5, 0x5, 0xa}, {0x5, 0x1, 0x4}, {0x0, 0x5, 0xb, 0x8}, {0x0, 0x4, 0xb}, {0x0, 0x3, 0x8, 0xc}, {0x1, 0x1, 0x0, 0x1}, {0x1, 0x4, 0xc, 0xb}], 0x10, 0x4}, 0x94) openat$cgroup_ro(r1, &(0x7f0000003b00)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) sendmsg$tipc(r9, &(0x7f0000004080)={&(0x7f0000003b40)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x3, 0x3}}, 0x10, &(0x7f0000003f00)=[{&(0x7f0000003b80)="e267d8f6be040f3d72", 0x9}, {&(0x7f0000003bc0)="f458844281078188fe2a20f63b7ce9672fbd23411e5ae876272a940fc5ae6aead01a31c2a899095cf3fd", 0x2a}, {&(0x7f0000003c00)="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", 0xfc}, {&(0x7f0000003d00)="a55a8a246f9f21444eabc28d0a", 0xd}, {&(0x7f0000003d40)="391e32671cc330f41e2f5554ba222801290e03850ac9a5fd6e5e6ee4a393da8013f1487a86931ee4873a5e5b6f3067b59b2c4d756b83dae5d9b5b532a97054aa9a931472a9bf4a32539cb1ba44469c7737074d57809ade87717c4c18d934b097f50e25aa91919911f97948d54b4f8b2948cc3322a608f77f61c98fb7e910c2b8ea86230cbd7b222a95a474a7", 0x8c}, {&(0x7f0000003e00)}, {&(0x7f0000003e40)="b5dce22dc9a3b5180e4a57b8b56e2891242ce902d129aaad22d990c369c0284e76dd4edc7a4f7776c76083889d9335ec9a72dcdf27a68904453db63206e08fb28d0a7b2cd23ab066359a3095929b6a08f6eb7815aa8cb89f086cabbba62e439136286988508da5000ba30a53e58b7e5a4aeabac360b91e066d58e389615fd5e683bfb2fe", 0x84}], 0x7, &(0x7f0000003f80)="261359c9609a26da39f7dd8f0b2605efe66d0fc38915fcfd587837a9d43d3f70b1858503402d6406161d8f9d45837ee311a9304bf1501b9ba541a49b8e7de271e2c92f37abf55928a3be29e77f7c4c516c6e81c04247d969992bfb7a87c7abc69db1045517f090446782fd5043d016cf5f522db4b258e42ac0a89281bec051cca36932239d83f0568be341b6788607534396a82c0a728997f922bb8b9eaad707f6a46fab400e7814af6e1579caf3dff39b287138dc8c385ad81c71509bf70685e964b8bb84d576f768e3ecb6b52976fd32f6cdb608ab976f7dd1ef2ca280e3c2858ff4395452fd091c468560a2b1182b8716f6daf592d0", 0xf7, 0x4000}, 0x8180) 1.749283444s ago: executing program 0 (id=7161): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10400, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000300)) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'batadv0\x00', 0x1003}) (async) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0xffffffffffffffff) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x40) (async) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x100}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) (async) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0xfc, 0xff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xb, 0x7}, 0x8b001, 0x0, 0xfffffffd, 0x6, 0x1fc, 0x0, 0x3, 0x0, 0xffffbffe, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000100000000000000000000008500000087000000850000007d0000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe9cc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$TUNSETLINK(r0, 0x400454cd, 0x337) (async) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x2405, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x4) 1.735605846s ago: executing program 4 (id=7164): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000840)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002f0000000000000018100000", @ANYRES32=r1, @ANYBLOB="0000000000000000442e4cf7000000009500006000000000b2aa9db013a933fc3321ac97f133a38981b127f079b3553fafc5c7da3b4446d1ff5c9ce0c674f3ddabee7a253e69a1"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000180)=[0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000280), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r3, @ANYRES64=r2, @ANYRESHEX=r0, @ANYRESDEC=r4, @ANYRESOCT=r2, @ANYRESHEX, @ANYBLOB="e3b8cda71aee998593b58dfebce4bb5e6e202f764f16e0de75d643cce6a41c76d20e5d5760993d9d12dbdd291023d0e47964d068e15a3bd07799815f5f792fc66b3ca1162c827d2a6793", @ANYRES64, @ANYRES8=r4], &(0x7f0000000200)='syzkaller\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x1080}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x17, 0x8, &(0x7f00000005c0)=ANY=[@ANYRES32=r3, @ANYRES64=r2, @ANYRESHEX=r0, @ANYRESDEC=r4, @ANYRESOCT=r2, @ANYRESHEX, @ANYBLOB="e3b8cda71aee998593b58dfebce4bb5e6e202f764f16e0de75d643cce6a41c76d20e5d5760993d9d12dbdd291023d0e47964d068e15a3bd07799815f5f792fc66b3ca1162c827d2a6793", @ANYRES64, @ANYRES8=r4], &(0x7f0000000200)='syzkaller\x00', 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x1080}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) (async) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYRES32=r5, @ANYBLOB='\n\x00\x00'], 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) gettid() sendmsg$unix(r6, 0x0, 0x40800) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x4004743d, 0x110e22fff6) close(r7) (async) close(r7) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x6, 0xbaa}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940), &(0x7f0000000100), 0xa7c, r8}, 0x38) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940), &(0x7f0000000100), 0xa7c, r8}, 0x38) syz_clone(0x60112000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.712301908s ago: executing program 2 (id=7165): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x17, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="180800000000000000000000000000008510000005000000850000000f0000007e8000000000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa3}, 0x6d) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc, 0x9, 0x0, 0x1, 0x2000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.394150236s ago: executing program 1 (id=7167): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x5c31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6402}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000f40)=ANY=[], &(0x7f00000000c0)='syzkaller\x00'}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x6, 0x9, 0x0, 0x8, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x440, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x2, @perf_bp={0x0, 0x8}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0x400, 0xfffc, 0x0, 0x0, 0x0, 0x20}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xfff5) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000c0000004300000040000000c0000000", @ANYRES32=0x1, @ANYBLOB="0000003af7771be8ebe41f000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100), &(0x7f00000001c0), 0x10f0, r6}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000640), 0x16c5, r6}, 0x38) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r10, 0xffff0000, 0xe, 0x0, &(0x7f0000000980)="2b20322a4843b397737ea49da6aa", 0x0, 0xeffe, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[], 0xfdef) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r12, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r11, 0x40047451, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xba, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.361533079s ago: executing program 4 (id=7168): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 1.274474397s ago: executing program 4 (id=7169): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000002"], 0x0, 0x26}, 0x28) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000700"/38], 0x0, 0x26}, 0x20) ioctl$TUNSETQUEUE(r1, 0x5450, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x4}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x81}]}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000000100000100000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000010000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r5}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1.185810485s ago: executing program 3 (id=7170): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x72, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10}, 0x94) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000480)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004}, 0x80) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x3ada}, 0x40, 0x8, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'bridge_slave_1\x00', 0x800}) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000fcffffff0000000000000000186200000100000000000000a70c00009500000000000000808654d4b1c58af27f48faa56b4d5d3942e76d69f2cff198ddd612fa979f7175652a119e2a8279777dc51f2d1dcbef1642ba7eac6820a96adfa349e0e073c3eb729fe2b7377a770537602a00"/129], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @cgroup_sockopt=0x16, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x400, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000080)={'team_slave_0\x00', @multicast}) 1.082725344s ago: executing program 3 (id=7171): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000100000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x4, 0x8, 0xc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x10, 0xc, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r1, @ANYRESHEX=r1], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0)={r2}, 0xc) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000010000000000000000000000711809000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x74, 0x0, 0x0, 0x1}, {0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r5}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r0, @ANYBLOB="0000000002000000b705000008000000850000005e00000095", @ANYRES16], &(0x7f0000000300)='GPL\x00', 0x2, 0x100a, &(0x7f0000002500)=""/4106}, 0x94) 866.767393ms ago: executing program 3 (id=7172): socketpair(0x0, 0x3, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/134, 0x86}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000280)=""/226, 0xe2}], 0x3}, 0x142) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x8, 0x1, 0x0, 0x0, 0x4, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) 810.510268ms ago: executing program 1 (id=7173): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36}, 0x94) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x8, r0}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0x1, 0x58, &(0x7f00000001c0)}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) (async, rerun: 32) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 781.2624ms ago: executing program 2 (id=7174): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x42) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x9, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x4, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000004000000bca30000000000002403000040feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002600000008ff000e61148c00000000001d430000000000007a0a00fe00581c1f6114500000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7d06a59ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fdb6153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff46248843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae543d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80aba439772bf60a1db18c472dafc5569adc2c406f39f82928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b38f2f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945b93fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08a1a4b94cb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703fc52b6573349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f1d2156befec432e8e993c79027b7ef285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217e9519952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c370267cc51ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdc0500000000000000b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9e93348e17723ba9ab8ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb87d9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b88ae780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca780049d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e28488b0522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b2676c07bb0fd14020a66718378825d5ed789711b77d40dc31e0b8fc651b45559da463f0000000000000000000000000052d42124e9c26aba885015e69d42ecd710342ac597ebea576ae15fdf611356f622e831741ab15549e0d7a2bd0324e2b3b48a10551607492c19eaf58485feb4cab19c303b30ba2ddea0d792d77724c9fa4ed58b93668fc20484f141ee2b6a0029e88fdc853189b4dafd36ff23b11967090e508f45e3f10857038a52ef275cf9e3e4b5d30b12d138dfa70930c603b5e3f4b7be67be3dba3cbd8d4d143195af0697d779445d67dcfbd922d12a8b49f93eac7a72faacf80346b3b669615f2710eb8df39fc8c04d2c9c196fa6facfea613569a35cde6451f2edf55ce25c7d72ec7ea85a92458c0559ca3a94727d495bd4671a55a70bc544d71d8e0257707a31936f1adf224077310a86bf447ec92c650acca8c6b0721020894b06178c32f4472d17174d6eb2b067030c5d2c12583f46d2da7fba42d4083259c7cdc8bf1f4299c248865d3c809356c3ed"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 628.734744ms ago: executing program 3 (id=7175): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x4, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000180)=""/151, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000340), 0x6e, &(0x7f0000000800)=[{&(0x7f00000003c0)=""/234, 0xea}, {&(0x7f0000000540)=""/35, 0x23}, {&(0x7f0000000580)=""/86, 0x56}, {&(0x7f0000000600)=""/231, 0xe7}, {&(0x7f0000000700)=""/31, 0x1f}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000740)=""/133, 0x85}], 0x7}, 0x2000) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x2, 0x1}]}}, 0x0, 0x42}, 0x28) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8912, &(0x7f0000000080)) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) (rerun: 32) 613.729085ms ago: executing program 3 (id=7176): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010057f8ffffffb702000008000000b7030000000000008500000006000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x18, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = syz_clone(0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xd, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r5}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x14}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d80)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76ea090000000000009ba56a88ca", 0x0, 0x5, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000001c0)=ANY=[@ANYRESDEC=r3, @ANYRESOCT, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) 540.247012ms ago: executing program 1 (id=7177): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="c7d31800040000000000000000000000000004000000bb7f1a006600fe90ab308697f69b4d69089466ff00198000950000050000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x98, &(0x7f0000000040)=""/152, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x94) 358.115278ms ago: executing program 1 (id=7178): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10, &(0x7f0000000240)=[{&(0x7f00000000c0)="aa19100564e0d71f9c44798147e2bfa1386abf5fed66fd30c8cdadc415d617aac28bd34c7c94f96f10adfabbe1a9144ce0d538bdc9519bc13d63097cfda7528dafedfcaddab9b50fe38c1457339f340116b001dfac0e5233a74374110c2d2d8fc3d5d1bd56c8494eefbdc4365e296f8d0b4f22e52b8e42f8b0407581151b458aa788adfe02f8dfb76e69e5439199b836b3d0b30110c042bb48ad3d6fa4da5b6d9fc58710b52875d2a0a68121e448bdf98312ecbbc28de3562ad9788fd1c0e64fec75d0af81878ec8bfd98878171a5bd55129949cf065a3011cc57992cbf7cf67e6e08477a62311bab6c6219706d1131a61", 0xf1}, {&(0x7f00000001c0)="bf183b650556913ab808c631b389cc3a63e466f07d86e10416430d24f56aebcdea297c441a4cef3e2fdc162b760692f89ad5995934307d19c732001d7de5f8e1a2a59f5c1323f5f32ca9fcc05033138f09bcab603fb274719d93af5041dd4d438a7baef45cfa8eb1beab7b8e7f28cefa796532647050bb3047", 0x79}], 0x2}, 0x280c1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={0x1, 0x58, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r1, &(0x7f0000000a00)={&(0x7f00000002c0)={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000000740)=[{&(0x7f0000000300)="0052d0ed23060dc19bf93632cb6adbafd2087409d73fb2741f89f9f263f0bb6c528a79d558ef3450f4c59eeb85ce188a8ca0234d3cadb6e37ca9825624d016d6a1fa330d096f142b0e4608e4439e2114a09929b506b402e985e14006eb7c524bb422645baa9a00cc84098eeebbc2c93325d353ab93c458ac05e06afde22c359f5a197f3e36e1732c40c2ca3ee1ec2af50e2129db441a7755eb572f221734e447d7ebcd92aad138cb9cbd79b7dba20e08e6b4fc82c9c3414826ebc7e8ff23a48c236cc32090878a3eb2845a6a52e2b224", 0xd0}, {&(0x7f0000000400)="38d57cd6947e4cb3f93f87bb607795fb311e14d0065f5ad66e2f4cc887d525ff240483bc2f154dfa9496d73555b14f850612e69b1e78edd3d8c44bc28f860f355c027a39adf69c10e633", 0x4a}, {&(0x7f0000000480)="0205b0b87de94be0a1ae4ccec4214684b6a079379a8f4e5dbf81d1ed0e6af9a6cc845064c2bdc2d12907510a0423d20eb659699cf24d01aee444fad89844aee1575be1d6f27659dc45f280058dfb327bc187c20bdccb7e48897e8da0db768556167cfd2d242396189355cde0ce92aebd2e22d858c6aef88d871613f4d37ddd8f980f3def55d6e66e25533d10a68edb075892a193b342d809deb61eaca4546126444bb95314047c4a0e579f50b43a8788f214e94a02959dcd4cd77ac5551fcddba1a6b6972814abb2aaa9c2ba8b372290fad1ca2caf38dc03077cd7bc6611ef6d2731382219f8b0652c", 0xe9}, {&(0x7f0000000580)="a726e0f101128f387b83832ecec82fb02608d63e3d7a6b30ebb339e528841c38b42e247b1c67760074ad30fbf4", 0x2d}, {&(0x7f00000005c0)="1bb6fdfd732caa41121f904f777edfeb59128088ee6f8db90239e322f514cfeff2d9f4d36086478da3000f9da71a76c64273f480eacb64b915a4ea79653fe5e4f5496884053a5c1bfa101b72", 0x4c}, {&(0x7f0000000640)="126ef30111f73ac939dada0713c115abf2b0e4694fb76130e2c8dbda07d48ffa5692f4917d28c2c544a457c06b4f6559298cf9da9029bded4b2eb40e5c136ca5d96e6d8887fa98f64d186cb1812b7855827deadae1a172521f2b75c1de9017165bb18014dbfcca82fa", 0x69}, {&(0x7f00000006c0)="970ad9cbdaef707ff97bc76375fde70378c08133b25f7519d52123b402e65a40d651f3be9d514bb2045dc43320bf05c235b328328192d82c38da88b340adc148b832dc7d5cbf708f9c111798951544b49056caf23999e33ed3237251aec4ce4ea69c711275c38e6831d7", 0x6a}], 0x7, &(0x7f0000000880)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@noop, @timestamp_addr={0x44, 0x14, 0x4d, 0x1, 0xb, [{@empty, 0x7}, {@loopback, 0x10000}]}, @generic={0x83, 0xa, "301a1320b01683f3"}, @lsrr={0x83, 0xb, 0xd1, [@rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0xa3, 0x3, 0xe, [{@rand_addr=0x64010100, 0x80}]}, @generic={0x7, 0x3, "19"}, @timestamp_addr={0x44, 0x3c, 0xa8, 0x1, 0x2, [{@private=0xa010101, 0x7}, {@multicast1}, {@local, 0x2}, {@private=0xa010102, 0x86}, {@broadcast, 0xdd21}, {@multicast2, 0x2}, {@remote, 0x1f24}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x963}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xd6}}], 0x150}, 0x40000085) sendmsg$inet(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000a40)="243f78129c12f3a6f44ec7cffd41c2d78957efb5d996d5795dfd9bf890d35b781032fe2860", 0x25}, {&(0x7f0000000a80)="4bcfc084163a97e559d3cb6f8bfdf0893d2301a1c5dbc0a144e90313890a5653a6f1aea2233f6730d8c295ab0690c2c0b43ec4ad5ba577994443b461308e437a", 0x40}], 0x2}, 0x0) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b80)=@generic={&(0x7f0000000b40)='./file0\x00', 0x0, 0x10}, 0x18) sendmsg$sock(r0, &(0x7f0000000f80)={&(0x7f0000000bc0)=@can, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000c40)="766c425ba195796989ccc532034ed4b89c468f4896f618288f36b8e4d0c78373c15eb2ba76176b673aab763b642623899e08b53bb098618ad17bbff07ecc2dcf857813db7c50d150412fd16a083c40e0e6ce645e7289b95e7bc5e74b856e3bd8ef064ea8de2e76876df7e658804e57c1", 0x70}, {&(0x7f0000000cc0)="4bce2ea88f749145f9f5b306b3af256833e691f693b03c4463b243036c980c9fd65db39d7e855265e034566c498ffdf32fc8fdb3c2a13f1c36d169317e3ec8f38438ea8a3bb67fd245a2e8d96d07046386495a3820660de0319f4b52edb99efeac68f9486bb10b490e13ecd5bd30e40e1f9c027858293ea1a8dc5a7b32028cfc9e258068588d5e7e6776a6418397e0b353e54307673a5c6296612d612a9635e1de728d5d438135c95e0da45c5408900a2e4b8dbc33993ebbfcbac920a788ec06babff1e384365eae", 0xc8}, {&(0x7f0000000dc0)="320c622d186326ea", 0x8}, {&(0x7f0000000e00)="69894edac6b6a03850f0eb6799ace9081720b399e76a19e8a76ac37f4d008265dd69367976b2afb0c8daf3c0253cac3ccacaf566ae3bdf626b9e962b5e4e84e4cd05385bea4a0f479026f2a0c2d53f61a2850070dfca5db7215d04", 0x5b}], 0x4, &(0x7f0000000ec0)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x7fffffff}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffff89}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0xa8}, 0x40000) r6 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000fc0)='syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000001000)='blkio.bfq.empty_time\x00', 0x0, 0x0) close(r2) ioctl$TUNGETDEVNETNS(r7, 0x54e3, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000001040)={'team_slave_0\x00', @random="d3fcdba5e2c2"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000001080)='blkio.bfq.empty_time\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f00000010c0)) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000001100)={'macvtap0\x00', @local}) recvmsg$unix(r7, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000001140)=""/109, 0x6d}, {&(0x7f00000011c0)=""/30, 0x1e}, {&(0x7f0000001200)=""/12, 0xc}, {&(0x7f0000001240)=""/146, 0x92}], 0x4}, 0x2101) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x19, 0x11, &(0x7f0000001380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001440)='syzkaller\x00', 0x2, 0x32, &(0x7f0000001480)=""/50, 0x41000, 0x4, '\x00', r4, @fallback=0x2, r7, 0x8, &(0x7f00000014c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000001500)={0x3, 0x5, 0x3, 0x4}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000001540)=[r5, r7, r7], 0x0, 0x10, 0x4}, 0x94) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001640)=0xffffffffffffffff, 0x4) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001680)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7dfaedf, '\x00', r4, r9, 0x3, 0x2, 0x3}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001880)={&(0x7f0000001700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@int={0xd, 0x0, 0x0, 0x1, 0x0, 0x6d, 0x0, 0x16, 0xa}, @volatile={0x2, 0x0, 0x0, 0x9, 0x2}, @fwd={0x6}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f0000001780)=""/230, 0x44, 0xe6, 0x1, 0x9}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c00)=@bpf_tracing={0x1a, 0x3d, &(0x7f00000018c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @map_fd={0x18, 0xa, 0x1, 0x0, r10}, @alu={0x7, 0x1, 0x8, 0x4, 0x1, 0x0, 0xfffffffffffffff0}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffa}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x81}}, @alu={0x7, 0x0, 0xa, 0xb, 0x9, 0x30, 0x4}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001ac0)='syzkaller\x00', 0xc, 0x0, 0x0, 0x40f00, 0x5c, '\x00', 0x0, 0x1c, r7, 0x8, &(0x7f0000001b00)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000001b40)={0x3, 0xb, 0x3, 0x5}, 0x10, 0x1a1c3, r8, 0x3, &(0x7f0000001b80)=[r5], &(0x7f0000001bc0)=[{0x4, 0x2, 0x5, 0x3}, {0x5, 0x3, 0x7, 0xa}, {0x1, 0x5, 0x4, 0x3}], 0x10, 0x6}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000001cc0)='team_slave_0\x00') r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f80)={r3, 0x6, 0x10}, 0xc) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001fc0)={&(0x7f0000001d00)="0e8d0893cafdc2bc9f0e57fc2ba8fc28173eb9a8f3637c62fa31c6366fbedaacd444296f00031d565fd0826f3b21eb5eb8e6fcd6cf1d8a60e829e4483ef7b5c788dcff4e4c22c8ea2ba7d6c48f9016cf7c46", &(0x7f0000001d80)=""/70, &(0x7f0000001e00)="260f62a3ee43b5e0735f61ded46779729d1f78d413f51b21cd2aa20cae7cc9d054291a17c3328f4ac078fecf98e69656bbd540b2891853fcf6db89657264f183d20d1a849fa02a3e361606880d3171f2a0ec52773cb6f6092adadbe9d75cbc51862ad2b30707c01c26fb9c020f394024107c8747b5d2e05244023a777a17bf5c5dc4fdaa", &(0x7f0000001ec0)="27ee94fd983c3c2de7fb4599dddc5747bd4c48254546cb255e5a24e37fd9ef0c9e66ae4bcf8d84e50271a3de7bb27fa3e797a136e9ec03958cd5afd92c2ffb3e28799277116085d35254c8cc55230bcb804e8fa555339b0107fa75694a1ad8c8739821ac2999222eb5a284b8e6cc1ebd143d7f45a340286cd8efe0a718fd50e6607a9c", 0x0, r11, 0x4}, 0x38) openat$ppp(0xffffffffffffff9c, &(0x7f0000002000), 0x200, 0x0) ioctl$TUNSETPERSIST(r7, 0x400454cb, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x9, 0x5, &(0x7f0000002040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x45d, 0x0, 0x0, 0x0, 0xe6}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000002080)='syzkaller\x00', 0x3d, 0x5f, &(0x7f00000020c0)=""/95, 0x40f00, 0x0, '\x00', r4, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002140)={0x1, 0x9, 0x5}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000002180)=[0xffffffffffffffff, r7], &(0x7f00000021c0)=[{0x1, 0x3, 0x3}, {0x0, 0x1, 0x6, 0x8}, {0x4, 0x2, 0xe, 0x1}], 0x10, 0x1}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002340)={{r11, 0xffffffffffffffff}, &(0x7f00000022c0), &(0x7f0000002300)=r0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002a80)=@bpf_lsm={0x1d, 0xa, &(0x7f0000002380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x90b, 0x0, 0x0, 0x0, 0xdf}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r12}}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x3}, @exit]}, &(0x7f0000002400)='syzkaller\x00', 0x8, 0x8e, &(0x7f0000002440)=""/142, 0x41100, 0x20, '\x00', 0x0, 0x1b, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f00000025c0)={0x1, 0x8, 0x2, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000002a00)=[r10, r10, r7, 0xffffffffffffffff, 0xffffffffffffffff, r7, r10], &(0x7f0000002a40)=[{0x4, 0x5, 0xc, 0x6}], 0x10, 0x1818}, 0x94) 207.546082ms ago: executing program 1 (id=7179): r0 = syz_clone(0x100000, &(0x7f00000000c0)="a8f87628d182be57b5fb180c389557320cf8c25482aabfe47f515fb19b0e1b34bff08a7e1293afe8a49c382f2a23f2de86495c57a99dcf0dda9f4354f89f69f92f2542013b33287473bae943b647fe4547363a64a077ed3a4234a51dc1ab4a69bd60cb7d53b047ba850828f107ef798a1838f1437faccdba72a5550517931761c0f68851f8ffc29d973be474def9657445e23b9328453dd4f71ea26482a37f03f74e635e4a1ff3155fd718027a07ec5784e413b7cfbfc4eb10619d72daa541452258823fc5075382b2e317e4a489816eb2f7bde28ce203bb8bce1703c141f11d", 0xe0, &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000200)="3e31e4367599f0029962716e27d2e514d9e76430dbf439da41967fa30c9653ae7889397ae4ffd33838efc66d53edb0d57269761c3938018939742f03f9ec23d00b1c70d7accf14888b5861e0a786e6cb7026742079714dd5923666379478613e1d68e164ea67b0c848247dad87e936de447d5b8d196ea00e5bc3ac6fd278119759254b42b2353c01ce4577940d7fd3774eb969953e5f83bd3efc7ba2f5609961c1") r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x8, 0xf7, 0xa, 0x81, 0x0, 0x4, 0x4220, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000400), 0x2}, 0x13788, 0x9, 0x278, 0x4, 0x8010001, 0x80004, 0x2, 0x0, 0x9, 0x0, 0x1b918990}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r0, r1, 0x0, 0xa, &(0x7f00000004c0)='syzkaller\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85100000010000009500000000000000850000007600000095"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0xa6, &(0x7f0000000340)=""/166}, 0x80) 205.241342ms ago: executing program 4 (id=7180): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@cgroup=r0, 0x22, 0x0, 0x200, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0]}, 0x40) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x20, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, [@alu={0x7, 0x0, 0xc, 0x6, 0x2, 0x10, 0xffffffffffffffef}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x4}, @generic={0x3, 0xc, 0x4, 0x8, 0x10}, @alu={0x4, 0x0, 0xd, 0x1, 0x7, 0xfffffffffffffffe, 0x10}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xa}, @ldst={0x0, 0x3, 0x3, 0x0, 0x667bb36cae94dcbc, 0x30, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x6, 0x5, 0x5, 0xfffffffffffffff8, 0x10}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000280)='syzkaller\x00', 0xfff, 0x94, &(0x7f00000002c0)=""/148, 0x0, 0x51, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x4, 0x7ff, 0x3}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000400)=[0x1], &(0x7f0000000440)=[{0x3, 0x4, 0xf, 0xc}, {0x4, 0x1, 0x10, 0x8}, {0x3, 0x4, 0xc, 0x6}, {0x0, 0x5, 0xc, 0x5}, {0x2, 0x3, 0xd}, {0x5, 0x3, 0x7, 0x7}, {0x3, 0x5, 0x3, 0x1}], 0x10, 0xd}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r1, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000580)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0], 0x0, 0xa, &(0x7f0000000640)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xa7, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) 152.685247ms ago: executing program 3 (id=7181): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x24}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xae}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xf, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r1}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r1}, &(0x7f0000000540), &(0x7f0000000580)=r2}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r1, &(0x7f0000000780)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0xd1, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x82, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r6 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r5}, 0x8) close(r6) (async) close(r6) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r5, 0x0, r6}, 0x10) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r6, r5, 0x0, r6}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0x0, 0x0, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{}, &(0x7f0000000740), &(0x7f0000000780)=r0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000740), &(0x7f0000000780)=r0}, 0x20) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r11, &(0x7f0000000980), 0x20000992) (async) write$cgroup_pid(r11, &(0x7f0000000980), 0x20000992) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{0x1, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x490}, [@map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb01e}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000280)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x41000, 0x20, '\x00', r4, 0x0, r6, 0x8, &(0x7f0000000680)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0x9, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[r7, r8, r9, r10, r11, r12], 0x0, 0x10, 0x8}, 0x94) r13 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x40082406, &(0x7f00000001c0)='cpu&0&\t&&') bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="61154c00000000006113500000000000bfa00000000000000703000008004e002d35010000000000950041000000000069163a0000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf670000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ff3d4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2739670b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc401000000cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be19637302f3b41eae50509fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524a3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8b0100010000000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d545ffffffff00000000a1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf857689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684ee54c0a263c806aabac2f66cb052f847c62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961ef4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fc0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bb000000000000000000000000000000884efcecca45ea4ab2ec097668456a6ff12854997f5aed737d5205ace5c0b64f87ef10784d0479cb44ca077e0c4ce6ff880e2ce3de63853a9740e9233683bfc8636bee293aeeb680b399a296e6f44c07b5fc5d9d359af007f23004a7acb6df23664ea209620b4fe0f4df81c33bd8ca2335cb4b50881937379b45a301175c3e8eb32970564ec8e25c46ee3bae079faedaad94276cfa251be8256c4c37fc84a25c3a2feb39e94a5266a10716d4a3cef499fa176018054e9149a1c9d20a809ce3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 70.616773ms ago: executing program 4 (id=7182): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1b, 0x26, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x7, 0x0, 0x5, 0x9, 0x5, 0x10, 0x4}, @ldst={0x1, 0x0, 0x4, 0x2, 0x5, 0x8, 0xfffffffffffffff0}, @jmp={0x5, 0x0, 0x6, 0x0, 0x2, 0x40, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x5f}, @generic={0x2, 0x0, 0x1, 0x1, 0x218}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffa}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}}, &(0x7f0000000540)='syzkaller\x00', 0x5, 0xdb, &(0x7f0000000580)=""/219, 0x40f00, 0x12, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f00000006c0)=[r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000700)=[{0x1, 0x5, 0x0, 0x9}], 0x10, 0x5}, 0x94) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000800), 0x4) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000880)='tasks\x00', 0x2, 0x0) r9 = perf_event_open$cgroup(&(0x7f0000000900)={0x0, 0x80, 0x7, 0x4, 0xff, 0x6, 0x0, 0x6, 0x62801, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000008c0), 0x5}, 0x12180, 0x9bf, 0x6, 0x0, 0x5, 0x8, 0xbf4, 0x0, 0x5, 0x0, 0xdf}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x4) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)=@o_path={&(0x7f0000000980)='./file0\x00', 0x0, 0x10, r0}, 0x18) sendmsg$unix(r2, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="589c5f12abbe58a535db0159f583ddf4b283744c32a2a203c233907ddb4fd66160778e34c8ef457f65", 0x29}, {&(0x7f0000000080)="52c347e25ed263cf2768c92644d95bb4e0aa769ed0aed14e12dfe3b6e7a894731bf74bd04763fe249558b2e16bf532b72a396327278700ec0cda9795ef2ec6fa9b45d9fe607191f962f06173412dc0008a98fb1f30494f3082b3363dac3af8e366f16b120a61260416c4c4debb4c6eb5829400da375e6d2927ba240ae2eeef1244e17a3005635ef823eab5a9", 0x8c}, {&(0x7f0000000140)="674c5d50e74dabcd4cf0a9574017b0d4300e9852922336ac478445c61250d5822687353cb1d7f409cac2840bcc041213a2431646e0527c3a560ab68b030e148a1a3a09d8c47518", 0x47}, {&(0x7f0000000240)='sg', 0x2}], 0x4, &(0x7f0000000a80)=[@rights={{0x1c, 0x1, 0x1, [r0, r0, r1]}}, @rights={{0x28, 0x1, 0x1, [r3, r4, r1, r0, r5, r0]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, r1, r1, r6, r1, r7, r0, r1, r1, r8]}}, @rights={{0x24, 0x1, 0x1, [r0, r9, r10, r0, r1]}}], 0xa8}, 0x40000) 0s ago: executing program 1 (id=7183): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) (async) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x410, 0x2000000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000022010000000000974800", @ANYRES16=r0, @ANYBLOB='\x00'/20, @ANYRESOCT=r1, @ANYRES32, @ANYRES64=r2], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r3, 0x0, 0x0}, 0x20) (async) r4 = perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x1}, 0x530, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffeffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0x3) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r5, @ANYRESHEX=r1], &(0x7f0000000980)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) (async) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0), 0x9) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) sendmsg$unix(r5, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x4c24}, 0x6e, 0x0}, 0x40000) (async) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) (async) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="1e030800dd5c98012c9e63"], 0xffdd) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2a482, 0x0) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x4ca80, 0x0) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x121c02, 0x0) ioctl$TUNSETQUEUE(r10, 0x400454d9, &(0x7f0000000080)={'geneve1\x00', 0x400}) kernel console output (not intermixed with test programs): becomes ready [ 23.015385][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.023437][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.031402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.039649][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.047665][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.055882][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.064132][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.072143][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.080511][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.088725][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.096328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.108129][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.116570][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.129110][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.137430][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.147444][ T276] device veth1_macvtap entered promiscuous mode [ 23.155511][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.163484][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.172463][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.182073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.190753][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.200876][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.209548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.222982][ T277] device veth0_vlan entered promiscuous mode [ 23.234958][ T278] device veth0_vlan entered promiscuous mode [ 23.242776][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.250801][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.259353][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.267265][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.275493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.283413][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.290908][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.298387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.314310][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.322680][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.337569][ T277] device veth1_macvtap entered promiscuous mode [ 23.346095][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 23.354867][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.363918][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.372355][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.381101][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.396156][ T278] device veth1_macvtap entered promiscuous mode [ 23.404197][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.419311][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.427520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.439616][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.452089][ T279] device veth0_vlan entered promiscuous mode [ 23.469114][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.480877][ T298] cgroup: syz.2.3 (298) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 23.491723][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.508702][ T298] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 23.517159][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.529843][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.538424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.547055][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.555568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.557074][ C0] hrtimer: interrupt took 40656 ns [ 23.564828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.578040][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.587024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.595574][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.620383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.642334][ T279] device veth1_macvtap entered promiscuous mode [ 23.695705][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.704190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.724834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.737426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.773497][ T415] ÿÿÿÿÿÿ: renamed from vlan1 [ 25.811376][ T24] kauditd_printk_skb: 43 callbacks suppressed [ 25.811389][ T24] audit: type=1400 audit(1771411161.690:117): avc: denied { tracepoint } for pid=407 comm="syz.3.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.093409][ T392] device syzkaller0 entered promiscuous mode [ 26.775492][ T24] audit: type=1400 audit(1771411162.650:118): avc: denied { ioctl } for pid=466 comm="syz.3.46" path="/dev/ppp" dev="devtmpfs" ino=153 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 26.865527][ T467] syz.3.46 (467) used obsolete PPPIOCDETACH ioctl [ 27.422484][ T24] audit: type=1400 audit(1771411163.300:119): avc: denied { cpu } for pid=496 comm="syz.3.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.648900][ T24] audit: type=1400 audit(1771411163.340:120): avc: denied { create } for pid=494 comm="syz.4.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 27.714196][ T510] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.721493][ T510] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.034358][ T529] device syzkaller0 entered promiscuous mode [ 28.044001][ T24] audit: type=1400 audit(1771411163.920:121): avc: denied { read } for pid=531 comm="syz.2.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.110537][ T24] audit: type=1400 audit(1771411163.960:122): avc: denied { relabelfrom } for pid=527 comm="syz.4.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.207579][ T24] audit: type=1400 audit(1771411163.960:123): avc: denied { relabelto } for pid=527 comm="syz.4.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.798676][ T24] audit: type=1400 audit(1771411164.670:124): avc: denied { create } for pid=581 comm="syz.4.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 28.893858][ T24] audit: type=1400 audit(1771411164.720:125): avc: denied { append } for pid=581 comm="syz.4.74" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.919307][ T586] device veth1_macvtap left promiscuous mode [ 28.944941][ T586] device veth1_macvtap entered promiscuous mode [ 28.973764][ T586] device macsec0 entered promiscuous mode [ 29.135208][ T611] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.142496][ T611] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.181141][ T611] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.188250][ T611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.195659][ T611] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.202727][ T611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.271966][ T611] device bridge0 entered promiscuous mode [ 29.567025][ T623] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 29.646976][ T625] device syzkaller0 entered promiscuous mode [ 29.674312][ T24] audit: type=1400 audit(1771411165.550:126): avc: denied { ioctl } for pid=624 comm="syz.3.87" path="socket:[16201]" dev="sockfs" ino=16201 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.339569][ T656] lo: mtu less than device minimum [ 30.450521][ T661] device sit0 entered promiscuous mode [ 31.052129][ T24] audit: type=1400 audit(1771411166.930:127): avc: denied { create } for pid=729 comm="syz.2.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 31.526151][ T756] device pim6reg1 entered promiscuous mode [ 32.232013][ T793] device syzkaller0 entered promiscuous mode [ 32.311890][ T24] audit: type=1400 audit(1771411168.190:128): avc: denied { create } for pid=805 comm="syz.3.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 33.327303][ T856] cgroup: fork rejected by pids controller in /syz4 [ 35.510774][ T913] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.517988][ T913] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.525651][ T913] device bridge_slave_0 entered promiscuous mode [ 35.532755][ T913] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.539870][ T913] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.547380][ T913] device bridge_slave_1 entered promiscuous mode [ 35.981678][ T24] audit: type=1400 audit(1771411171.860:129): avc: denied { create } for pid=913 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.004676][ T24] audit: type=1400 audit(1771411171.880:130): avc: denied { write } for pid=913 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.032116][ T24] audit: type=1400 audit(1771411171.880:131): avc: denied { read } for pid=913 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 36.092257][ T951] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.099367][ T951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.106659][ T951] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.113743][ T951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.121225][ T951] device bridge0 entered promiscuous mode [ 36.131738][ T913] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.138848][ T913] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.146145][ T913] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.153224][ T913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.167571][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.175187][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.308053][ T913] device veth0_vlan entered promiscuous mode [ 36.321578][ T913] device veth1_macvtap entered promiscuous mode [ 36.341906][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 36.409850][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.441920][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.454141][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.469019][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.476743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.485103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 36.492977][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.501261][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.508330][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.515813][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.524305][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.531415][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.538924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.546967][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.747738][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 36.756348][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.765106][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 36.773702][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.794242][ T985] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 37.109814][ T7] device bridge_slave_1 left promiscuous mode [ 37.115994][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.190439][ T7] device bridge_slave_0 left promiscuous mode [ 37.227324][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.311394][ T7] device veth1_macvtap left promiscuous mode [ 37.341818][ T7] device veth0_vlan left promiscuous mode [ 38.080485][ T24] audit: type=1400 audit(1771411173.960:132): avc: denied { create } for pid=1030 comm="syz.2.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.021499][ T1054] device xfrm0 entered promiscuous mode [ 39.702541][ T1096] device syzkaller0 entered promiscuous mode [ 41.265912][ T1149] ------------[ cut here ]------------ [ 41.292841][ T1149] trace type BPF program uses run-time allocation [ 41.339024][ T1149] WARNING: CPU: 0 PID: 1149 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 41.376795][ T1149] Modules linked in: [ 41.386541][ T1149] CPU: 0 PID: 1149 Comm: syz.1.236 Not tainted syzkaller #0 [ 41.418918][ T1149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 41.505588][ T1149] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 41.552872][ T1149] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 e4 ae 4b 05 01 48 c7 c7 60 cf 25 85 e8 7a e3 04 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 41.572848][ T1149] RSP: 0018:ffffc900012a7448 EFLAGS: 00010246 [ 41.579098][ T1149] RAX: 68baf76ccd041400 RBX: 0000000000000001 RCX: 0000000000080000 [ 41.587176][ T1149] RDX: ffffc9000189c000 RSI: 0000000000001d4c RDI: 0000000000001d4d [ 41.595389][ T1149] RBP: ffffc900012a7490 R08: ffff8881f7052fbf R09: 1ffff1103ee0a5f7 [ 41.603763][ T1149] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff888115510000 [ 41.611926][ T1149] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811dd23800 [ 41.620111][ T1149] FS: 00007f914c37e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 41.629243][ T1149] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 41.635940][ T1149] CR2: 0000000100000000 CR3: 000000010f56b000 CR4: 00000000003506b0 [ 41.648881][ T1149] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 41.670637][ T1149] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 41.694291][ T1149] Call Trace: [ 41.708220][ T1149] ? __fdget+0x1a1/0x230 [ 41.715394][ T1149] resolve_pseudo_ldimm64+0x55e/0x1060 [ 41.783525][ T1149] ? bpf_check+0xdb10/0xdb10 [ 41.869729][ T1149] ? kvmalloc_node+0x88/0x130 [ 41.918180][ T1149] bpf_check+0x9058/0xdb10 [ 41.922821][ T1149] ? bpf_get_btf_vmlinux+0x60/0x60 [ 41.928014][ T1149] ? 0xffffffffa0026f58 [ 41.932498][ T1149] ? is_bpf_text_address+0x177/0x190 [ 41.937823][ T1149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 41.943594][ T1149] ? __kernel_text_address+0xa0/0x100 [ 41.949182][ T1149] ? unwind_get_return_address+0x4d/0x90 [ 41.954927][ T1149] ? stack_trace_save+0xf0/0xf0 [ 41.959981][ T1149] ? arch_stack_walk+0xee/0x140 [ 41.964870][ T1149] ? stack_trace_save+0xa6/0xf0 [ 41.972379][ T1176] device syzkaller0 entered promiscuous mode [ 41.976804][ T1149] ? stack_trace_snprint+0xf0/0xf0 [ 41.989242][ T1149] ? __kasan_slab_alloc+0x69/0xf0 [ 41.997633][ T1149] ? pcpu_block_update+0x3ec/0x900 [ 42.064457][ T1149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.074557][ T1149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.089019][ T1149] ? __kasan_kmalloc+0xec/0x110 [ 42.100177][ T1149] ? __kasan_kmalloc+0xda/0x110 [ 42.107842][ T1149] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 42.236132][ T1149] ? selinux_bpf_prog_alloc+0x51/0x140 [ 42.288899][ T1149] ? security_bpf_prog_alloc+0x62/0x90 [ 42.297014][ T1149] ? bpf_prog_load+0x9d8/0x14a0 [ 42.332166][ T1149] ? __se_sys_bpf+0x49a/0x740 [ 42.336990][ T1149] ? __x64_sys_bpf+0x7b/0x90 [ 42.347106][ T1149] ? do_syscall_64+0x31/0x40 [ 42.409001][ T1149] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.415159][ T1149] ? memset+0x35/0x40 [ 42.469088][ T1149] ? bpf_obj_name_cpy+0x193/0x1e0 [ 42.474202][ T1149] bpf_prog_load+0xfca/0x14a0 [ 42.489061][ T1149] ? map_freeze+0x320/0x320 [ 42.498976][ T1149] ? selinux_bpf+0xc7/0xf0 [ 42.503508][ T1149] ? security_bpf+0x82/0xa0 [ 42.513606][ T1149] __se_sys_bpf+0x49a/0x740 [ 42.523699][ T1149] ? __x64_sys_bpf+0x90/0x90 [ 42.528448][ T1149] ? __kasan_check_read+0x11/0x20 [ 42.538586][ T1149] __x64_sys_bpf+0x7b/0x90 [ 42.565982][ T1149] do_syscall_64+0x31/0x40 [ 42.576117][ T1149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.615001][ T1149] RIP: 0033:0x7f914d923629 [ 42.629720][ T1149] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 42.659514][ T1149] RSP: 002b:00007f914c37e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 42.668198][ T1149] RAX: ffffffffffffffda RBX: 00007f914db9cfa0 RCX: 00007f914d923629 [ 42.689074][ T1149] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 42.704934][ T1149] RBP: 00007f914d9b9b39 R08: 0000000000000000 R09: 0000000000000000 [ 42.724372][ T1149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 42.735376][ T1149] R13: 00007f914db9d038 R14: 00007f914db9cfa0 R15: 00007ffc4f6ab758 [ 42.752575][ T1149] ---[ end trace 976a092c654615e1 ]--- [ 42.772079][ T1213] device syzkaller0 entered promiscuous mode [ 43.424125][ T1276] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.433287][ T1276] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.642167][ T1276] device bridge_slave_1 left promiscuous mode [ 43.675158][ T1276] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.696868][ T1276] device bridge_slave_0 left promiscuous mode [ 43.715629][ T1276] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.870787][ T24] audit: type=1400 audit(1771411179.750:133): avc: denied { write } for pid=1302 comm="syz.4.272" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 44.848936][ T1334] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 45.105538][ T24] audit: type=1400 audit(1771411180.980:134): avc: denied { ioctl } for pid=1356 comm="syz.2.289" path="pid:[4026532283]" dev="nsfs" ino=4026532283 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.316409][ T24] audit: type=1400 audit(1771411181.130:135): avc: denied { create } for pid=1370 comm="syz.4.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 45.800054][ T1389] device veth0_vlan left promiscuous mode [ 45.831323][ T1389] device veth0_vlan entered promiscuous mode [ 46.490525][ T24] audit: type=1400 audit(1771411182.370:136): avc: denied { create } for pid=1423 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 47.208898][ T24] audit: type=1400 audit(1771411183.070:137): avc: denied { create } for pid=1458 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 48.311265][ T1518] b‹¡Y­4`Ò˜: renamed from lo [ 48.366360][ T24] audit: type=1400 audit(1771411184.240:138): avc: denied { create } for pid=1530 comm="syz.0.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 49.705151][ T24] audit: type=1400 audit(1771411185.580:139): avc: denied { create } for pid=1580 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 49.730156][ T24] audit: type=1400 audit(1771411185.610:140): avc: denied { create } for pid=1580 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 49.755652][ T24] audit: type=1400 audit(1771411185.610:141): avc: denied { create } for pid=1580 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 49.777884][ T24] audit: type=1400 audit(1771411185.610:142): avc: denied { create } for pid=1580 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 49.868512][ T1585] device syzkaller0 entered promiscuous mode [ 50.233342][ T1605] device syzkaller0 entered promiscuous mode [ 50.950067][ T1650] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.957298][ T1650] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.167303][ T1664] bridge0: port 3(veth0_to_team) entered blocking state [ 51.198004][ T1664] bridge0: port 3(veth0_to_team) entered disabled state [ 51.209360][ T1664] device veth0_to_team entered promiscuous mode [ 51.259700][ T1650] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.260902][ T24] audit: type=1400 audit(1771411187.140:143): avc: denied { create } for pid=1663 comm="syz.4.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 51.266857][ T1650] bridge0: port 2(bridge_slave_1) entered listening state [ 51.293374][ T1650] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.300458][ T1650] bridge0: port 1(bridge_slave_0) entered listening state [ 51.369190][ T1650] device bridge0 entered promiscuous mode [ 51.795674][ T24] audit: type=1400 audit(1771411187.670:144): avc: denied { create } for pid=1711 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 52.070759][ T24] audit: type=1400 audit(1771411187.920:145): avc: denied { create } for pid=1726 comm="syz.1.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 53.556514][ T1828] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.563793][ T1828] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.674424][ T1829] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.681551][ T1829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.688930][ T1829] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.695987][ T1829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.739081][ T1829] device bridge0 entered promiscuous mode [ 54.494841][ T1883] device syzkaller0 entered promiscuous mode [ 54.530666][ T1885] device wg2 entered promiscuous mode [ 54.577266][ T24] audit: type=1400 audit(1771411190.450:146): avc: denied { associate } for pid=1886 comm="syz.0.446" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 54.916556][ T1914] device syzkaller0 entered promiscuous mode [ 57.048524][ T24] audit: type=1400 audit(1771411192.900:147): avc: denied { create } for pid=2012 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 59.193892][ T2114] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.210610][ T2114] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.217746][ T2114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.679255][ T2121] device syzkaller0 entered promiscuous mode [ 60.905231][ T2195] device syzkaller0 entered promiscuous mode [ 60.986156][ T24] audit: type=1400 audit(1771411196.860:148): avc: denied { create } for pid=2203 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 61.010306][ T2201] syzkaller0: tun_net_xmit 1280 [ 61.843467][ T24] audit: type=1400 audit(1771411197.720:149): avc: denied { create } for pid=2232 comm="syz.4.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 62.508922][ T2261] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 63.116222][ T2285] device syzkaller0 entered promiscuous mode [ 64.526141][ T2368] device macsec0 left promiscuous mode [ 64.579244][ T2368] device macsec0 entered promiscuous mode [ 65.007494][ T2393] device syzkaller0 entered promiscuous mode [ 65.165971][ T2401] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.174520][ T2401] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.204856][ T2401] device bridge0 left promiscuous mode [ 65.511429][ T2424] syzkaller0: mtu greater than device maximum [ 66.105645][ T2450] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.112851][ T2450] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.140471][ T2450] device bridge0 left promiscuous mode [ 66.648824][ C0] bridge0: port 1(bridge_slave_0) entered learning state [ 66.656081][ C0] bridge0: port 2(bridge_slave_1) entered learning state [ 67.742161][ T2519] syz.0.632[2519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.742225][ T2519] syz.0.632[2519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.998963][ T24] audit: type=1400 audit(1771411204.870:150): avc: denied { create } for pid=2569 comm="syz.4.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 69.201178][ T2570] device syzkaller0 entered promiscuous mode [ 70.010774][ T2644] device syzkaller0 entered promiscuous mode [ 70.486393][ T2690] @ÿ: renamed from bond_slave_0 [ 70.755043][ T2702] device lo entered promiscuous mode [ 71.118206][ T2716] device syzkaller0 entered promiscuous mode [ 71.400326][ T2740] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 71.429371][ T2740] device syzkaller0 entered promiscuous mode [ 72.306726][ T2796] @ÿ: renamed from bond_slave_0 [ 72.753909][ T2837] device lo entered promiscuous mode [ 73.042320][ T2855] device syzkaller0 entered promiscuous mode [ 73.293981][ T24] audit: type=1400 audit(1771411209.170:151): avc: denied { create } for pid=2923 comm="syz.1.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 73.678290][ T24] audit: type=1400 audit(1771411209.550:152): avc: denied { create } for pid=2959 comm="syz.3.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 74.208498][ T2995] device syzkaller0 entered promiscuous mode [ 74.286591][ T24] audit: type=1400 audit(1771411210.160:153): avc: denied { create } for pid=3010 comm="syz.0.779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 74.855111][ T3042] device veth0_vlan left promiscuous mode [ 74.891719][ T3042] device veth0_vlan entered promiscuous mode [ 76.782986][ T3170] b‹¡Y­4`Ò˜: renamed from lo [ 76.843226][ T3189] device lo left promiscuous mode [ 76.854357][ T3189] b‹¡Y­4`Ò˜: renamed from lo [ 77.034117][ T3207] device syzkaller0 entered promiscuous mode [ 77.194822][ T3223] syz.4.846[3223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.194876][ T3223] syz.4.846[3223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 77.651925][ T3249] device syzkaller0 entered promiscuous mode [ 77.774298][ T3255] device syzkaller0 entered promiscuous mode [ 78.372386][ T3279] syz.2.863[3279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.372434][ T3279] syz.2.863[3279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.709999][ T3288] device syzkaller0 entered promiscuous mode [ 78.922423][ T24] audit: type=1400 audit(1771411214.800:154): avc: denied { create } for pid=3305 comm="syz.2.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 79.413219][ T3327] device wg2 left promiscuous mode [ 79.593871][ T3330] device wg2 entered promiscuous mode [ 80.466598][ T24] audit: type=1400 audit(1771411216.340:155): avc: denied { attach_queue } for pid=3364 comm="syz.4.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 81.119166][ T3422] tap0: tun_chr_ioctl cmd 1074812118 [ 81.132007][ T3421] tap0: tun_chr_ioctl cmd 1074025673 [ 81.755254][ T3472] device sit0 entered promiscuous mode [ 82.008823][ C0] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.016078][ C0] bridge0: topology change detected, propagating [ 82.022528][ C0] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.029762][ C0] bridge0: topology change detected, propagating [ 82.041574][ T3462] device wg2 entered promiscuous mode [ 82.102108][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.286656][ T3513] tap0: tun_chr_ioctl cmd 1074025675 [ 82.328043][ T3513] tap0: persist disabled [ 82.438856][ T3504] tap0: tun_chr_ioctl cmd 1074025675 [ 82.445694][ T3504] tap0: persist enabled [ 83.046778][ T3548] device syzkaller0 entered promiscuous mode [ 83.600404][ T3577] bridge0: port 3(veth0_to_team) entered blocking state [ 83.607539][ T3577] bridge0: port 3(veth0_to_team) entered disabled state [ 83.653889][ T3577] device veth0_to_team entered promiscuous mode [ 84.141052][ T3608] FAULT_INJECTION: forcing a failure. [ 84.141052][ T3608] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 84.158685][ T3608] CPU: 0 PID: 3608 Comm: syz.1.953 Tainted: G W syzkaller #0 [ 84.167406][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 84.177533][ T3608] Call Trace: [ 84.180866][ T3608] __dump_stack+0x21/0x24 [ 84.185228][ T3608] dump_stack_lvl+0x1a7/0x208 [ 84.189930][ T3608] ? show_regs_print_info+0x18/0x18 [ 84.195157][ T3608] ? path_openat+0x2970/0x31c0 [ 84.199949][ T3608] dump_stack+0x15/0x1c [ 84.204127][ T3608] should_fail+0x3c1/0x510 [ 84.208761][ T3608] should_fail_usercopy+0x1a/0x20 [ 84.213920][ T3608] _copy_from_user+0x20/0xd0 [ 84.218546][ T3608] __copy_msghdr_from_user+0xc9/0x630 [ 84.223947][ T3608] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 84.229258][ T3608] ? __fsnotify_parent+0x6d2/0x7c0 [ 84.234388][ T3608] ___sys_sendmsg+0x19a/0x2e0 [ 84.239229][ T3608] ? __sys_sendmsg+0x280/0x280 [ 84.244012][ T3608] ? rw_verify_area+0x1c0/0x360 [ 84.248980][ T3608] ? __fdget+0x1a1/0x230 [ 84.253249][ T3608] __x64_sys_sendmsg+0x1f9/0x2c0 [ 84.258202][ T3608] ? fput+0x1a/0x20 [ 84.262024][ T3608] ? ___sys_sendmsg+0x2e0/0x2e0 [ 84.266899][ T3608] ? debug_smp_processor_id+0x17/0x20 [ 84.272341][ T3608] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 84.278430][ T3608] ? exit_to_user_mode_prepare+0x2f/0xa0 [ 84.284083][ T3608] do_syscall_64+0x31/0x40 [ 84.288525][ T3608] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 84.294450][ T3608] RIP: 0033:0x7f914d923629 [ 84.298881][ T3608] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 84.318618][ T3608] RSP: 002b:00007f914c37e028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 84.327059][ T3608] RAX: ffffffffffffffda RBX: 00007f914db9cfa0 RCX: 00007f914d923629 [ 84.335064][ T3608] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 84.343055][ T3608] RBP: 00007f914c37e090 R08: 0000000000000000 R09: 0000000000000000 [ 84.351048][ T3608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.359041][ T3608] R13: 00007f914db9d038 R14: 00007f914db9cfa0 R15: 00007ffc4f6ab758 [ 84.776073][ T3620] device sit0 entered promiscuous mode [ 85.090637][ T3652] syz.1.968[3652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.090727][ T3652] syz.1.968[3652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.114807][ T3647] device syzkaller0 entered promiscuous mode [ 87.324042][ T3786] device veth0_vlan left promiscuous mode [ 87.365942][ T3786] device veth0_vlan entered promiscuous mode [ 87.427378][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.440256][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.455569][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 88.398939][ T3865] device sit0 entered promiscuous mode [ 90.673842][ T3995] device syzkaller0 entered promiscuous mode [ 92.037929][ T4049] device syzkaller0 entered promiscuous mode [ 97.996191][ T4385] device sit0 left promiscuous mode [ 98.020218][ T4385] device sit0 entered promiscuous mode [ 99.228491][ T4413] device syzkaller0 entered promiscuous mode [ 99.953532][ T4441] device syzkaller0 entered promiscuous mode [ 100.507062][ T4452] device veth0_vlan left promiscuous mode [ 100.561328][ T4452] device veth0_vlan entered promiscuous mode [ 101.518284][ T4504] device wg2 left promiscuous mode [ 101.622192][ T4504] device wg2 entered promiscuous mode [ 102.318228][ T4562] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.325361][ T4562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.332690][ T4562] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.339755][ T4562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.361361][ T4562] device bridge0 entered promiscuous mode [ 102.390224][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 102.690897][ T4584] @ÿ: renamed from bond_slave_0 [ 103.093645][ T4600] device syzkaller0 entered promiscuous mode [ 103.730265][ T4624] device dummy0 entered promiscuous mode [ 103.753650][ T4631] device pim6reg1 entered promiscuous mode [ 105.304819][ T24] audit: type=1400 audit(1771411241.180:156): avc: denied { create } for pid=4691 comm="syz.4.1290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 106.442359][ T4730] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.450917][ T4730] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.460133][ T4730] device bridge0 left promiscuous mode [ 106.539626][ T4732] device bridge_slave_1 left promiscuous mode [ 106.547469][ T4732] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.555381][ T4732] device bridge_slave_0 left promiscuous mode [ 106.561822][ T4732] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.885573][ T4753] device syzkaller0 entered promiscuous mode [ 108.794700][ T4788] device syzkaller0 entered promiscuous mode [ 108.861428][ T4794] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 108.920841][ T4787] -1: renamed from syzkaller0 [ 110.248436][ T4869] device lo left promiscuous mode [ 110.309122][ T4872] b‹¡Y­4`Ò˜: renamed from lo [ 110.659099][ T4912] device pim6reg1 entered promiscuous mode [ 110.891065][ T4937] device lo entered promiscuous mode [ 111.740874][ T4984] syz.0.1371[4984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.740937][ T4984] syz.0.1371[4984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.849254][ T24] audit: type=1400 audit(1771411247.730:157): avc: denied { create } for pid=4989 comm="syz.4.1374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 112.054107][ T4997] device syzkaller0 entered promiscuous mode [ 113.785230][ T5112] device syzkaller0 entered promiscuous mode [ 113.799511][ T5113] device syzkaller0 entered promiscuous mode [ 113.809641][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 115.287670][ T5210] device syzkaller0 entered promiscuous mode [ 116.001715][ T5248] syz.3.1439[5248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.001773][ T5248] syz.3.1439[5248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.887508][ T24] audit: type=1400 audit(1771411252.760:158): avc: denied { create } for pid=5277 comm="syz.3.1447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 117.005805][ T5278] device syzkaller0 entered promiscuous mode [ 118.745753][ T5366] tap0: tun_chr_ioctl cmd 1074025677 [ 118.758900][ T5366] tap0: linktype set to 769 [ 119.566740][ T5394] device syzkaller0 entered promiscuous mode [ 119.869236][ T5411] syzkaller1: tun_chr_ioctl cmd 1074025694 [ 120.375669][ T24] audit: type=1400 audit(1771411256.250:159): avc: denied { create } for pid=5424 comm="syz.0.1490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 121.496417][ T5484] device syzkaller0 entered promiscuous mode [ 121.566078][ T5490] ±ÿ: renamed from team_slave_1 [ 122.082188][ T5521] device sit0 left promiscuous mode [ 122.992185][ T5588] device syzkaller0 entered promiscuous mode [ 123.484524][ T24] audit: type=1400 audit(1771411259.360:160): avc: denied { create } for pid=5606 comm="syz.2.1544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 124.468068][ T5672] device syzkaller0 entered promiscuous mode [ 125.236261][ T5722] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.445105][ T5727] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.452260][ T5727] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.823059][ T24] audit: type=1400 audit(1771411262.690:161): avc: denied { create } for pid=5791 comm="syz.3.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 126.900819][ T5799] bridge0: port 4(gretap0) entered blocking state [ 126.908408][ T5799] bridge0: port 4(gretap0) entered disabled state [ 126.918351][ T5799] device gretap0 entered promiscuous mode [ 126.924433][ T5799] bridge0: port 4(gretap0) entered blocking state [ 126.930923][ T5799] bridge0: port 4(gretap0) entered forwarding state [ 127.212163][ T24] audit: type=1400 audit(1771411263.090:162): avc: denied { read } for pid=5838 comm="syz.3.1608" dev="nsfs" ino=4026532454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 127.270569][ T24] audit: type=1400 audit(1771411263.090:163): avc: denied { open } for pid=5838 comm="syz.3.1608" path="mnt:[4026532454]" dev="nsfs" ino=4026532454 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 127.651739][ T5886] device syzkaller0 entered promiscuous mode [ 129.458575][ T24] audit: type=1400 audit(1771411265.330:164): avc: denied { create } for pid=5966 comm="syz.3.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 131.879536][ T6115] device syzkaller0 entered promiscuous mode [ 132.194232][ T6140] bridge0: port 3(gretap0) entered blocking state [ 132.208878][ T6140] bridge0: port 3(gretap0) entered disabled state [ 132.219559][ T6140] device gretap0 entered promiscuous mode [ 132.237356][ T6140] bridge0: port 3(gretap0) entered blocking state [ 132.243881][ T6140] bridge0: port 3(gretap0) entered listening state [ 133.684413][ T6238] device syzkaller0 entered promiscuous mode [ 136.634760][ T278] cgroup: fork rejected by pids controller in /syz3 [ 136.745262][ T24] audit: type=1400 audit(1771411272.620:165): avc: denied { create } for pid=6358 comm="syz.0.1754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 137.326274][ T6385] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.358957][ T6385] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.366823][ T6385] device bridge_slave_0 entered promiscuous mode [ 137.485415][ T6385] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.494091][ T6385] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.502210][ T6385] device bridge_slave_1 entered promiscuous mode [ 137.813659][ T6385] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.820781][ T6385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.828091][ T6385] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.835183][ T6385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.994268][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.039317][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.053552][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.086398][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 138.099131][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.129138][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.136270][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.169507][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 138.190572][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.199180][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.206249][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.240032][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 138.248403][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.258106][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 138.266544][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.346567][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 138.381632][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.410384][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 138.418500][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.427384][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.435662][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.450126][ T6385] device veth0_vlan entered promiscuous mode [ 138.495855][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 138.504229][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.521475][ T6385] device veth1_macvtap entered promiscuous mode [ 138.560221][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 138.578147][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 138.599402][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.630183][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 138.648717][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.781442][ T6506] device sit0 left promiscuous mode [ 138.964346][ T296] device veth0_vlan left promiscuous mode [ 138.995535][ T24] audit: type=1400 audit(1771411274.870:166): avc: denied { create } for pid=6535 comm="syz.1.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 140.486876][ T6590] : port 1(dummy0) entered blocking state [ 140.548193][ T6590] : port 1(dummy0) entered disabled state [ 140.638100][ T6590] device dummy0 entered promiscuous mode [ 141.701120][ T6657] device syzkaller0 entered promiscuous mode [ 141.871051][ T6661] -1: renamed from syzkaller0 [ 142.101981][ T6675] bridge0: port 3(gretap0) entered disabled state [ 142.108768][ T6675] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.115891][ T6675] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.149603][ T6675] device bridge0 left promiscuous mode [ 142.683152][ T6714] ÿÿÿÿÿÿ: renamed from vlan1 [ 144.036807][ T6764] bridge0: port 4(gretap0) entered disabled state [ 144.043384][ T6764] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.050543][ T6764] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.103293][ T6764] device bridge0 left promiscuous mode [ 144.225382][ T6762] bridge0: port 4(gretap0) entered blocking state [ 144.232265][ T6762] bridge0: port 4(gretap0) entered forwarding state [ 144.240506][ T6762] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.247714][ T6762] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.255882][ T6762] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.263370][ T6762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.281817][ T6762] device bridge0 entered promiscuous mode [ 146.042873][ T6848] device sit0 entered promiscuous mode [ 146.864149][ T6871] syz.4.1899[6871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.864228][ T6871] syz.4.1899[6871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.475501][ T6980] device syzkaller0 entered promiscuous mode [ 150.475459][ T7025] device syzkaller0 entered promiscuous mode [ 150.659219][ T7033] -1: renamed from syzkaller0 [ 151.166457][ T7060] device veth1_macvtap left promiscuous mode [ 151.172667][ T7060] device macsec0 entered promiscuous mode [ 151.309334][ T7063] bridge0: port 3(gretap0) entered blocking state [ 151.316154][ T7063] bridge0: port 3(gretap0) entered listening state [ 151.323468][ T7063] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.330734][ T7063] bridge0: port 2(bridge_slave_1) entered listening state [ 151.338631][ T7063] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.345980][ T7063] bridge0: port 1(bridge_slave_0) entered listening state [ 151.371615][ T7063] device bridge0 entered promiscuous mode [ 152.475578][ T7138] bridge0: port 5(veth1) entered blocking state [ 152.482912][ T7138] bridge0: port 5(veth1) entered disabled state [ 152.491350][ T7138] device veth1 entered promiscuous mode [ 152.497227][ T7138] bridge0: port 5(veth1) entered blocking state [ 152.503537][ T7138] bridge0: port 5(veth1) entered forwarding state [ 152.596677][ T7145] device syzkaller0 entered promiscuous mode [ 153.454009][ T7200] device syzkaller0 entered promiscuous mode [ 153.717587][ T7214] device syzkaller0 entered promiscuous mode [ 154.128382][ T7225] device syzkaller0 entered promiscuous mode [ 157.248411][ T7369] device wg2 left promiscuous mode [ 157.347791][ T7368] device wg2 entered promiscuous mode [ 157.716355][ T7380] ÿÿÿÿÿÿ: renamed from vlan1 [ 160.551150][ T7539] device syzkaller0 entered promiscuous mode [ 161.568463][ T24] audit: type=1400 audit(1771411297.440:167): avc: denied { ioctl } for pid=7597 comm="syz.3.2108" path="pid:[4026532995]" dev="nsfs" ino=4026532995 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 162.230191][ T7638] device sit0 entered promiscuous mode [ 162.313604][ T7638] device syzkaller0 entered promiscuous mode [ 162.711973][ T7683] device veth1_macvtap left promiscuous mode [ 164.079072][ T7775] device syzkaller0 entered promiscuous mode [ 164.120527][ T7774] device syzkaller0 entered promiscuous mode [ 164.230506][ T7782] device syzkaller0 entered promiscuous mode [ 165.522766][ T7880] ªªªªªª™™•: renamed from vlan0 [ 166.489517][ C0] bridge0: port 1(bridge_slave_0) entered learning state [ 166.497316][ C0] bridge0: port 2(bridge_slave_1) entered learning state [ 166.504715][ C0] bridge0: port 3(gretap0) entered learning state [ 166.854778][ T7962] device syzkaller0 entered promiscuous mode [ 167.646072][ T24] audit: type=1400 audit(1771411303.520:168): avc: denied { create } for pid=7987 comm="syz.4.2222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 169.817572][ T24] audit: type=1400 audit(1771411305.690:169): avc: denied { create } for pid=8084 comm="syz.0.2247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 169.892273][ T8077] bridge0: port 5(veth1) entered disabled state [ 173.247337][ T8249] device syzkaller0 entered promiscuous mode [ 176.437710][ T8477] device syzkaller0 entered promiscuous mode [ 177.261852][ T8525] device syzkaller0 entered promiscuous mode [ 178.272737][ T8571] Â: renamed from pim6reg1 [ 178.844077][ T8606] device syzkaller0 entered promiscuous mode [ 178.929417][ T8614] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 179.202020][ T8637] device sit0 left promiscuous mode [ 179.399793][ T8653] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 179.431091][ T8653] device syzkaller0 entered promiscuous mode [ 180.025757][ T8710] device syzkaller0 entered promiscuous mode [ 180.219470][ T8719] syz.0.2421 uses obsolete (PF_INET,SOCK_PACKET) [ 180.565164][ T8742] device syzkaller0 entered promiscuous mode [ 180.575325][ T8742] IPv6: pim6reg1: Disabled Multicast RS [ 181.520953][ T8790] device veth0_vlan left promiscuous mode [ 181.527147][ T8790] device veth0_vlan entered promiscuous mode [ 181.535723][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.544469][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.558629][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 181.848796][ C0] bridge0: port 3(gretap0) entered forwarding state [ 181.855591][ C0] bridge0: topology change detected, propagating [ 181.862317][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.863454][ C0] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.877310][ C0] bridge0: topology change detected, propagating [ 181.884052][ C0] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.891500][ C0] bridge0: topology change detected, propagating [ 183.363454][ T8887] device syzkaller0 entered promiscuous mode [ 184.165009][ T8951] device sit0 entered promiscuous mode [ 184.385051][ T8976] device bond_slave_1 entered promiscuous mode [ 184.398853][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 184.410929][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.664153][ T8990] device pim6reg1 entered promiscuous mode [ 187.442812][ T9112] device syzkaller0 entered promiscuous mode [ 187.474845][ T9112] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 187.510967][ T9125] device syzkaller0 entered promiscuous mode [ 187.980097][ T9196] device syzkaller0 entered promiscuous mode [ 188.036201][ T9185] device pim6reg1 entered promiscuous mode [ 188.549394][ T9242] device syzkaller0 entered promiscuous mode [ 192.240430][ T9426] +: renamed from team_slave_1 [ 192.602052][ T24] audit: type=1400 audit(1771411328.480:170): avc: denied { create } for pid=9448 comm="syz.1.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 192.984930][ T9469] device syzkaller0 entered promiscuous mode [ 194.478145][ T9541] : port 1(ip6gretap0) entered blocking state [ 194.493259][ T9541] : port 1(ip6gretap0) entered disabled state [ 194.514757][ T9541] device ip6gretap0 entered promiscuous mode [ 194.570588][ T9545] ±ÿ: renamed from team_slave_1 [ 194.665449][ T9556] device ip6gretap0 left promiscuous mode [ 194.707166][ T9556] : port 1(ip6gretap0) entered disabled state [ 195.734246][ T24] audit: type=1400 audit(1771411331.610:171): avc: denied { mounton } for pid=9617 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 195.906254][ T9617] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.913492][ T9617] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.921396][ T9617] device bridge_slave_0 entered promiscuous mode [ 195.932619][ T9617] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.940842][ T9617] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.948465][ T9617] device bridge_slave_1 entered promiscuous mode [ 196.044169][ T9617] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.051422][ T9617] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.058726][ T9617] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.065809][ T9617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.090477][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.109802][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.254081][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.269168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.295981][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.308558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.317968][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.325074][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.341379][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.355238][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.364034][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.371413][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.501207][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.509478][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.534629][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.542996][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.620392][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 196.650253][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 196.663564][ T9617] device veth0_vlan entered promiscuous mode [ 196.670641][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 196.709032][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.778586][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.786726][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.814904][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.831870][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 197.101799][ T9676] device syzkaller0 entered promiscuous mode [ 197.110212][ T9617] device veth1_macvtap entered promiscuous mode [ 197.220030][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.229983][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.238296][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.361167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.369836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 197.514490][ T24] audit: type=1400 audit(1771411333.390:172): avc: denied { unmount } for pid=9617 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 197.769315][ T49] device veth0_to_team left promiscuous mode [ 197.786665][ T49] bridge0: port 3(veth0_to_team) entered disabled state [ 197.805216][ T49] device bridge_slave_1 left promiscuous mode [ 197.811478][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.819262][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.827909][ T49] device veth0_vlan left promiscuous mode [ 199.311236][ T9745] device syzkaller0 entered promiscuous mode [ 201.051735][ T9759] device veth1_macvtap left promiscuous mode [ 201.556089][ T9786] device syzkaller0 entered promiscuous mode [ 201.901368][ T9797] device veth0_to_bridge entered promiscuous mode [ 202.063126][ T9808] device syzkaller0 entered promiscuous mode [ 202.801149][ T9847] device syzkaller0 entered promiscuous mode [ 203.734410][ T9939] device syzkaller0 entered promiscuous mode [ 204.614774][ T9996] device sit0 left promiscuous mode [ 204.755060][ T9998] device sit0 entered promiscuous mode [ 206.482140][T10133] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.489535][T10133] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.223320][T10213] device pim6reg1 entered promiscuous mode [ 209.307455][T10216] tap0: tun_chr_ioctl cmd 1074025677 [ 209.330894][T10216] tap0: linktype set to 1 [ 209.753351][T10223] device syzkaller0 entered promiscuous mode [ 210.300709][T10236] bridge_slave_0: mtu less than device minimum [ 211.280593][T10277] device syzkaller0 entered promiscuous mode [ 213.645697][T10396] device syzkaller0 entered promiscuous mode [ 214.784295][T10442] device syzkaller0 entered promiscuous mode [ 215.670484][T10503] device syzkaller0 entered promiscuous mode [ 215.738037][T10508] device syzkaller0 entered promiscuous mode [ 216.535529][T10548] device syzkaller0 entered promiscuous mode [ 217.610338][T10596] device syzkaller0 entered promiscuous mode [ 217.668468][T10597] device syzkaller0 entered promiscuous mode [ 217.711200][T10605] device sit0 entered promiscuous mode [ 218.422026][T10630] device syzkaller0 entered promiscuous mode [ 218.488165][T10637] device syzkaller0 entered promiscuous mode [ 218.684082][T10644] device syzkaller0 entered promiscuous mode [ 219.322408][T10692] device syzkaller0 entered promiscuous mode [ 219.415721][T10706] device syzkaller0 entered promiscuous mode [ 220.079476][T10749] device syzkaller0 entered promiscuous mode [ 220.806331][T10786] device syzkaller0 entered promiscuous mode [ 221.924953][T10862] device syzkaller0 entered promiscuous mode [ 222.496077][T10892] device dummy0 entered promiscuous mode [ 222.519354][T10892] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 222.929851][T10922] device syzkaller0 entered promiscuous mode [ 225.279111][T11040] ªªªªªª™™: renamed from vlan0 [ 225.843084][T11071] device syzkaller0 entered promiscuous mode [ 227.105578][T11137] sock: sock_set_timeout: `syz.2.3139' (pid 11137) tries to set negative timeout [ 228.095343][T11156] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 228.426832][T11176] device wg2 entered promiscuous mode [ 228.552865][T11187] device syzkaller0 entered promiscuous mode [ 228.590636][T11189] device macsec0 entered promiscuous mode [ 229.709669][T11250] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.724507][T11250] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.749789][T11250] device bridge_slave_0 entered promiscuous mode [ 229.756966][T11250] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.826903][T11250] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.875431][T11250] device bridge_slave_1 entered promiscuous mode [ 230.018622][T11250] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.025787][T11250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.033166][T11250] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.040371][T11250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.115679][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.125789][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.152397][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.179156][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.190761][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.197863][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.216753][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.225883][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.233140][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.279341][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.290031][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.333600][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.342940][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.351818][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.359635][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.367673][T11250] device veth0_vlan entered promiscuous mode [ 230.422704][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.441054][T11250] device veth1_macvtap entered promiscuous mode [ 230.462542][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.564008][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.245003][T11314] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 231.254525][T11314] syzkaller0: linktype set to 804 [ 231.325774][ T49] device veth1_macvtap left promiscuous mode [ 231.477827][T11310] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.502709][T11310] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.510251][T11310] device bridge_slave_0 entered promiscuous mode [ 231.517414][T11310] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.524537][T11310] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.532163][T11310] device bridge_slave_1 entered promiscuous mode [ 231.875211][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.885109][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.933282][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.941848][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.950858][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.957998][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.966130][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.000263][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.009278][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.028149][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.035648][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.072036][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.085512][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.103919][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.143705][T11310] device veth0_vlan entered promiscuous mode [ 232.152580][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.197039][T11310] device veth1_macvtap entered promiscuous mode [ 232.206464][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.215411][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.224267][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.236431][T11476] device vlan0 entered promiscuous mode [ 232.266718][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.279296][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.364281][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.461928][T11477] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.474180][T11477] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.481873][T11477] device bridge_slave_0 entered promiscuous mode [ 232.502932][T11477] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.510123][T11477] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.517674][T11477] device bridge_slave_1 entered promiscuous mode [ 232.672269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.680435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.720027][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.736538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.750725][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.757933][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.776002][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.784009][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.793139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.802198][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.809283][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.828896][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 232.842770][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.851039][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 232.859632][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.991711][ T49] bridge0: port 4(gretap0) entered disabled state [ 233.005538][ T49] device gretap0 left promiscuous mode [ 233.011219][ T49] bridge0: port 4(gretap0) entered disabled state [ 233.027034][T11477] device veth0_vlan entered promiscuous mode [ 233.037761][T11514] device sit0 entered promiscuous mode [ 233.051417][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 233.060722][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 233.071472][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 233.080172][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 233.139393][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 233.165654][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 233.174115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 233.183564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 233.199598][T11477] device veth1_macvtap entered promiscuous mode [ 233.210075][T11516] @ÿ: renamed from bond_slave_0 [ 233.299114][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.318549][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 233.333527][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 233.422419][T11524] device macsec0 entered promiscuous mode [ 233.527889][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 233.536487][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.592089][ T49] device veth1 left promiscuous mode [ 233.600801][ T49] bridge0: port 5(veth1) entered disabled state [ 233.615911][ T49] device veth0_to_team left promiscuous mode [ 233.622846][ T49] bridge0: port 3(veth0_to_team) entered disabled state [ 233.630398][ T49] device bridge_slave_1 left promiscuous mode [ 233.636634][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.645135][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.000547][T11672] device syzkaller0 entered promiscuous mode [ 236.143347][T11680] device syzkaller0 entered promiscuous mode [ 236.390190][T11676] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.397616][T11676] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.469225][T11676] device bridge_slave_0 entered promiscuous mode [ 236.477233][T11676] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.520840][T11676] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.541975][T11676] device bridge_slave_1 entered promiscuous mode [ 236.800089][T11676] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.807271][T11676] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.814631][T11676] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.821717][T11676] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.966353][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.032210][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.072502][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.102154][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.131909][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.159123][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.166217][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.198939][T11753] device dummy0 entered promiscuous mode [ 237.205237][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.233116][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.257316][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.264542][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.295242][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.319146][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.338008][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.346419][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.376716][T11777] @0Ù: renamed from bond_slave_1 [ 237.405004][T11676] device veth0_vlan entered promiscuous mode [ 237.433330][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.450671][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.466696][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.482097][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.505179][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.517695][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.532429][ T7] bridge0: port 3(gretap0) entered disabled state [ 237.546761][ T7] device gretap0 left promiscuous mode [ 237.558823][ T7] bridge0: port 3(gretap0) entered disabled state [ 237.691573][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 237.713863][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.745005][T11676] device veth1_macvtap entered promiscuous mode [ 237.782553][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 237.809404][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.826416][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.870945][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.887428][ T353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.068079][T11823] device syzkaller0 entered promiscuous mode [ 238.151179][ T7] device bridge_slave_1 left promiscuous mode [ 238.169717][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.199083][ T7] device bridge_slave_0 left promiscuous mode [ 238.252771][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.294457][ T7] device veth1_macvtap left promiscuous mode [ 239.150578][T11880] device syzkaller0 entered promiscuous mode [ 239.184949][T11882] device syzkaller0 entered promiscuous mode [ 239.464921][T11896] device syzkaller0 entered promiscuous mode [ 239.762786][T11904] device syzkaller0 entered promiscuous mode [ 240.909021][T11970] device veth1_macvtap left promiscuous mode [ 240.926599][T11971] device veth1_macvtap entered promiscuous mode [ 240.933533][T11971] device macsec0 entered promiscuous mode [ 240.967482][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 241.137742][T11985] device syzkaller0 entered promiscuous mode [ 241.760252][T12022] device syzkaller0 entered promiscuous mode [ 242.057708][T12024] device syzkaller0 entered promiscuous mode [ 242.597269][ T24] audit: type=1400 audit(1771411378.470:173): avc: denied { create } for pid=12042 comm="syz.4.3365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 242.786407][T12047] device syzkaller0 entered promiscuous mode [ 243.822542][T12103] tap0: tun_chr_ioctl cmd 1074812118 [ 244.275147][T12114] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.285560][T12114] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.440345][T12116] device bridge_slave_1 left promiscuous mode [ 244.468952][T12116] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.486499][T12116] device bridge_slave_0 left promiscuous mode [ 244.492820][T12116] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.655877][T12133] device wg2 entered promiscuous mode [ 244.739321][T12142] device syzkaller0 entered promiscuous mode [ 245.173805][T12165] device syzkaller0 entered promiscuous mode [ 245.260544][T12178] device syzkaller0 entered promiscuous mode [ 245.405293][T12200] device wg2 entered promiscuous mode [ 245.424942][T12203] device wg2 entered promiscuous mode [ 245.611099][T12222] : port 1(ip6gretap0) entered blocking state [ 245.639589][T12222] : port 1(ip6gretap0) entered disabled state [ 245.646288][T12222] device ip6gretap0 entered promiscuous mode [ 246.993694][T12299] ÿ: renamed from team_slave_1 [ 247.301632][T12325] device syzkaller0 entered promiscuous mode [ 248.656532][T12385] device syzkaller0 entered promiscuous mode [ 249.258926][T12429] syzkaller1: tun_chr_ioctl cmd 21731 [ 249.266877][T12429] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 249.633279][T12466] device syzkaller0 entered promiscuous mode [ 250.074036][T12522] device syzkaller0 entered promiscuous mode [ 250.310903][T12528] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 250.346970][T12528] syzkaller0: persist disabled [ 250.721027][T12540] device syzkaller0 entered promiscuous mode [ 251.243413][T12572] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 253.097891][T12665] device syzkaller0 entered promiscuous mode [ 253.706902][T12687] device sit0 left promiscuous mode [ 253.863076][T12687] device sit0 entered promiscuous mode [ 254.632181][T12717] device syzkaller0 entered promiscuous mode [ 254.925958][T12716] device syzkaller0 left promiscuous mode [ 255.640199][T12763] device syzkaller0 entered promiscuous mode [ 256.304232][T12803] device syzkaller0 entered promiscuous mode [ 256.417887][ T24] audit: type=1400 audit(1771411392.290:174): avc: denied { setattr } for pid=12823 comm="syz.4.3601" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 256.546646][T12829] device syzkaller0 entered promiscuous mode [ 256.848464][T12841] device syzkaller0 entered promiscuous mode [ 257.855905][T12909] device syzkaller0 entered promiscuous mode [ 258.170826][T12933] device syzkaller0 entered promiscuous mode [ 258.895028][T12972] device syzkaller0 entered promiscuous mode [ 258.915573][ T24] audit: type=1400 audit(1771411394.790:175): avc: denied { create } for pid=12976 comm="syz.1.3649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 259.613423][T13003] ÿÿÿÿÿÿ: renamed from vlan1 [ 260.115827][T13028] device syzkaller0 entered promiscuous mode [ 260.153103][ T2899] syzkaller0: tun_net_xmit 48 [ 261.158757][T13116] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.166016][T13116] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.666381][T13151] device syzkaller0 entered promiscuous mode [ 263.121194][T13219] device wg2 left promiscuous mode [ 263.577508][T13249] tap0: tun_chr_ioctl cmd 1074025677 [ 263.623070][T13249] tap0: linktype set to 270 [ 264.285619][T13281] device syzkaller0 entered promiscuous mode [ 265.344033][T13317] ÿÿÿÿÿÿ: renamed from vlan1 [ 266.263780][T13361] device syzkaller0 entered promiscuous mode [ 266.287250][T13366] device syzkaller0 entered promiscuous mode [ 266.672346][T13401] device syzkaller0 entered promiscuous mode [ 266.886669][T13420] device syzkaller0 entered promiscuous mode [ 267.224805][T13430] device syzkaller0 entered promiscuous mode [ 268.171499][T13472] ªªªªªª™™: renamed from vlan0 [ 268.458964][T13477] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 269.635150][T13534] bridge0: port 3(veth0_to_team) entered blocking state [ 269.642867][T13534] bridge0: port 3(veth0_to_team) entered disabled state [ 269.650900][T13534] device veth0_to_team entered promiscuous mode [ 269.657676][T13540] device bridge_slave_1 left promiscuous mode [ 269.664775][T13540] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.674427][T13540] device bridge_slave_0 left promiscuous mode [ 269.680695][T13540] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.240905][T13622] device syzkaller0 entered promiscuous mode [ 272.485459][T13684] device syzkaller0 entered promiscuous mode [ 273.132828][T13717] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 273.890784][T13758] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 273.896657][T13758] syzkaller0: persist disabled [ 274.237164][T13793] device syzkaller0 entered promiscuous mode [ 275.665537][T13865] device GPL entered promiscuous mode [ 275.715346][T13876] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 275.746495][T13876] device syzkaller0 entered promiscuous mode [ 275.787785][T13890] device lo entered promiscuous mode [ 275.862672][T13894] device syzkaller0 entered promiscuous mode [ 276.508667][T13926] cgroup: fork rejected by pids controller in /syz0 [ 276.666722][T13939] device syzkaller0 entered promiscuous mode [ 277.850258][T14108] device syzkaller0 entered promiscuous mode [ 277.913898][T14083] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.923704][T14083] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.937847][T14083] device bridge_slave_0 entered promiscuous mode [ 277.963356][T14083] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.979096][T14083] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.986605][T14083] device bridge_slave_1 entered promiscuous mode [ 278.267507][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.275270][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.316289][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.331417][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.347834][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.354970][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.374526][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.392191][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.406006][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.413145][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.431585][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.445159][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.505484][T14083] device veth0_vlan entered promiscuous mode [ 278.528348][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 278.542359][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.563204][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.572246][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.591183][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.599472][T14134] lo: mtu less than device minimum [ 278.639438][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.647539][ T24] audit: type=1400 audit(1771411414.520:176): avc: denied { create } for pid=14133 comm="syz.4.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 278.670430][T14083] device veth1_macvtap entered promiscuous mode [ 278.740978][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.786382][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.038081][T14161] device syzkaller0 entered promiscuous mode [ 279.147021][T14176] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.157877][T14176] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.413509][T14203] syz.2.3978[14203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.413614][T14203] syz.2.3978[14203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.124363][ T970] device bridge_slave_1 left promiscuous mode [ 280.236487][ T970] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.273998][ T970] device bridge_slave_0 left promiscuous mode [ 280.287945][ T970] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.978146][T14281] device syzkaller0 entered promiscuous mode [ 281.009036][T14288] device syzkaller0 entered promiscuous mode [ 281.413627][T14304] device syzkaller0 entered promiscuous mode [ 281.712946][T14310] device syzkaller0 entered promiscuous mode [ 282.416065][T14332] device syzkaller0 entered promiscuous mode [ 283.099784][T14369] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.108629][T14369] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.156563][T14369] device veth0_to_team left promiscuous mode [ 283.163776][T14369] bridge0: port 3(veth0_to_team) entered disabled state [ 283.180226][T14369] device bridge_slave_1 left promiscuous mode [ 283.187494][T14369] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.203720][T14369] device bridge_slave_0 left promiscuous mode [ 283.214766][T14369] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.747298][T14394] device syzkaller0 entered promiscuous mode [ 284.543701][T14437] batadv0: tun_chr_ioctl cmd 1074812118 [ 284.697283][T14441] device syzkaller0 entered promiscuous mode [ 284.829666][T14455] device syzkaller0 entered promiscuous mode [ 284.851349][T14455] syzkaller0: tun_net_xmit 1280 [ 284.857977][T14454] syzkaller0: delete flow: hash 1214821895 index 3 [ 285.566704][T14470] device syzkaller0 entered promiscuous mode [ 285.671912][T14492] device wg2 left promiscuous mode [ 286.747103][T14547] device syzkaller0 entered promiscuous mode [ 287.121815][T14583] device wg2 entered promiscuous mode [ 288.466889][T14658] device sit0 entered promiscuous mode [ 289.972442][T14733] device syzkaller0 entered promiscuous mode [ 290.065297][T14738] device syzkaller0 entered promiscuous mode [ 290.332026][T14756] syz.3.4145[14756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.332117][T14756] syz.3.4145[14756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.693427][T14772] device pim6reg1 entered promiscuous mode [ 291.276601][T14809] žÿ: renamed from team_slave_1 [ 291.387977][T14807] device syzkaller0 entered promiscuous mode [ 291.613659][ T24] audit: type=1400 audit(1771411427.490:177): avc: denied { getattr } for pid=14820 comm="syz.2.4164" path="net:[4026532455]" dev="nsfs" ino=4026532455 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 293.357175][T14918] device syzkaller0 entered promiscuous mode [ 293.493492][T14936] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 293.987819][T14964] device syzkaller0 entered promiscuous mode [ 294.472364][T15002] ref_ctr_offset mismatch. inode: 0x44f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 295.447180][T15078] tap0: tun_chr_ioctl cmd 1074025677 [ 295.478770][T15078] tap0: linktype set to 769 [ 296.019221][T15111] device syzkaller0 entered promiscuous mode [ 296.051423][T15115] device syzkaller0 entered promiscuous mode [ 296.080231][T15113] FAULT_INJECTION: forcing a failure. [ 296.080231][T15113] name failslab, interval 1, probability 0, space 0, times 1 [ 296.123501][T15113] CPU: 1 PID: 15113 Comm: syz.1.4248 Tainted: G W syzkaller #0 [ 296.132404][T15113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 296.142497][T15113] Call Trace: [ 296.145819][T15113] __dump_stack+0x21/0x24 [ 296.150168][T15113] dump_stack_lvl+0x1a7/0x208 [ 296.154871][T15113] ? show_regs_print_info+0x18/0x18 [ 296.160110][T15113] ? __kasan_check_write+0x14/0x20 [ 296.165249][T15113] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 296.170730][T15113] dump_stack+0x15/0x1c [ 296.174903][T15113] should_fail+0x3c1/0x510 [ 296.179347][T15113] ? nf_nat_masq_schedule+0x21d/0x4a0 [ 296.184743][T15113] __should_failslab+0xa4/0xe0 [ 296.189529][T15113] should_failslab+0x9/0x20 [ 296.194048][T15113] kmem_cache_alloc_trace+0x3a/0x2e0 [ 296.199367][T15113] nf_nat_masq_schedule+0x21d/0x4a0 [ 296.204600][T15113] ? __kasan_check_write+0x14/0x20 [ 296.209744][T15113] ? nf_nat_masq_schedule+0x4a0/0x4a0 [ 296.215148][T15113] ? masq_device_event+0xd0/0xd0 [ 296.220127][T15113] ? nfqnl_rcv_dev_event+0x441/0x470 [ 296.225446][T15113] ? rtnl_is_locked+0x15/0x20 [ 296.230148][T15113] masq_device_event+0x9b/0xd0 [ 296.234979][T15113] raw_notifier_call_chain+0x90/0x100 [ 296.240370][T15113] dev_close_many+0x331/0x4d0 [ 296.245069][T15113] ? __dev_open+0x500/0x500 [ 296.249601][T15113] ? __kasan_check_read+0x11/0x20 [ 296.254657][T15113] unregister_netdevice_many+0x45e/0x1a80 [ 296.260400][T15113] ? kmem_cache_free+0x100/0x2d0 [ 296.265366][T15113] ? _raw_spin_lock+0xf0/0xf0 [ 296.270064][T15113] ? alloc_netdev_mqs+0xc80/0xc80 [ 296.275118][T15113] ? kfree_skbmem+0x10c/0x180 [ 296.279814][T15113] ? __kasan_check_write+0x14/0x20 [ 296.284944][T15113] ? __kasan_check_read+0x11/0x20 [ 296.289986][T15113] unregister_netdevice_queue+0x324/0x370 [ 296.295724][T15113] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 296.301311][T15113] ? list_netdevice+0x4c0/0x4c0 [ 296.306223][T15113] ? linkwatch_fire_event+0x2d3/0x330 [ 296.311619][T15113] __tun_detach+0xca6/0x1450 [ 296.316236][T15113] ? tun_chr_open+0x540/0x540 [ 296.320931][T15113] tun_chr_close+0x92/0x140 [ 296.325595][T15113] __fput+0x2fb/0x770 [ 296.329614][T15113] ____fput+0x15/0x20 [ 296.333630][T15113] task_work_run+0x127/0x190 [ 296.338252][T15113] exit_to_user_mode_loop+0xcb/0xe0 [ 296.343476][T15113] exit_to_user_mode_prepare+0x76/0xa0 [ 296.348958][T15113] syscall_exit_to_user_mode+0x1d/0x40 [ 296.354436][T15113] do_syscall_64+0x3d/0x40 [ 296.358884][T15113] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 296.364796][T15113] RIP: 0033:0x7fd3f5073629 [ 296.369243][T15113] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 296.388876][T15113] RSP: 002b:00007fd3f3ace028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 296.397317][T15113] RAX: 0000000000000000 RBX: 00007fd3f52ecfa0 RCX: 00007fd3f5073629 [ 296.405438][T15113] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 296.413437][T15113] RBP: 00007fd3f3ace090 R08: 0000000000000000 R09: 0000000000000000 [ 296.421431][T15113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.429425][T15113] R13: 00007fd3f52ed038 R14: 00007fd3f52ecfa0 R15: 00007ffc69ff5338 [ 296.639265][T15126] ÿÿÿÿÿÿ: renamed from vlan1 [ 297.726526][T15174] device syzkaller0 entered promiscuous mode [ 297.762351][T15172] device sit0 entered promiscuous mode [ 297.823477][T15174] FAULT_INJECTION: forcing a failure. [ 297.823477][T15174] name failslab, interval 1, probability 0, space 0, times 0 [ 297.836227][T15174] CPU: 0 PID: 15174 Comm: syz.1.4265 Tainted: G W syzkaller #0 [ 297.845098][T15174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 297.855171][T15174] Call Trace: [ 297.858486][T15174] __dump_stack+0x21/0x24 [ 297.862836][T15174] dump_stack_lvl+0x1a7/0x208 [ 297.867529][T15174] ? thaw_kernel_threads+0x220/0x220 [ 297.872829][T15174] ? show_regs_print_info+0x18/0x18 [ 297.878045][T15174] ? __kasan_check_read+0x11/0x20 [ 297.883086][T15174] ? merge_sched_in+0xe70/0xe70 [ 297.887964][T15174] dump_stack+0x15/0x1c [ 297.892133][T15174] should_fail+0x3c1/0x510 [ 297.896568][T15174] ? __alloc_skb+0x9e/0x520 [ 297.901094][T15174] __should_failslab+0xa4/0xe0 [ 297.905884][T15174] should_failslab+0x9/0x20 [ 297.910408][T15174] kmem_cache_alloc+0x3d/0x2d0 [ 297.915199][T15174] ? find_next_bit+0xc9/0x100 [ 297.919893][T15174] ? cpumask_next+0x12/0x30 [ 297.924433][T15174] __alloc_skb+0x9e/0x520 [ 297.928789][T15174] inet6_rt_notify+0x293/0x480 [ 297.933565][T15174] ? rt6_nh_dump_exceptions+0x690/0x690 [ 297.939139][T15174] fib6_del+0xc4b/0xfa0 [ 297.943350][T15174] ? fib6_locate+0x460/0x460 [ 297.947962][T15174] ? update_load_avg+0x4dc/0x14f0 [ 297.953008][T15174] ? fib6_ifdown+0x2eb/0x4e0 [ 297.957665][T15174] fib6_clean_node+0x2a4/0x540 [ 297.962451][T15174] ? node_free_rcu+0x30/0x30 [ 297.967061][T15174] fib6_walk_continue+0x4fc/0x700 [ 297.972107][T15174] fib6_walk+0x153/0x290 [ 297.976389][T15174] fib6_clean_all+0x1b3/0x290 [ 297.981093][T15174] ? rt6_sync_down_dev+0x140/0x140 [ 297.986231][T15174] ? fib6_del+0xfa0/0xfa0 [ 297.990580][T15174] ? node_free_rcu+0x30/0x30 [ 297.995204][T15174] ? rt6_sync_down_dev+0x140/0x140 [ 298.000347][T15174] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 298.006186][T15174] rt6_disable_ip+0x121/0x6b0 [ 298.010879][T15174] ? wake_up_process+0x10/0x20 [ 298.015671][T15174] ? insert_work+0x282/0x310 [ 298.020280][T15174] ? __queue_work+0x951/0xca0 [ 298.024981][T15174] ? fib6_ifdown+0x4e0/0x4e0 [ 298.029640][T15174] ? __kasan_check_read+0x11/0x20 [ 298.034737][T15174] addrconf_ifdown+0x150/0x1850 [ 298.039610][T15174] ? addrconf_cleanup+0x1c0/0x1c0 [ 298.044655][T15174] ? __kasan_check_write+0x14/0x20 [ 298.049783][T15174] ? mutex_lock+0x92/0xf0 [ 298.054134][T15174] ? mutex_trylock+0xa0/0xa0 [ 298.058750][T15174] ? __kasan_check_write+0x14/0x20 [ 298.063877][T15174] addrconf_notify+0x3bd/0xe90 [ 298.068665][T15174] raw_notifier_call_chain+0x90/0x100 [ 298.074057][T15174] dev_close_many+0x331/0x4d0 [ 298.078755][T15174] ? __dev_open+0x500/0x500 [ 298.083296][T15174] ? __kasan_check_read+0x11/0x20 [ 298.088345][T15174] unregister_netdevice_many+0x45e/0x1a80 [ 298.094094][T15174] ? alloc_netdev_mqs+0xc80/0xc80 [ 298.099144][T15174] ? __queue_delayed_work+0x173/0x200 [ 298.104551][T15174] ? __kasan_check_read+0x11/0x20 [ 298.109609][T15174] unregister_netdevice_queue+0x324/0x370 [ 298.115358][T15174] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 298.120924][T15174] ? list_netdevice+0x4c0/0x4c0 [ 298.125798][T15174] ? linkwatch_fire_event+0x2d3/0x330 [ 298.131207][T15174] __tun_detach+0xca6/0x1450 [ 298.135820][T15174] ? tun_chr_open+0x540/0x540 [ 298.140518][T15174] tun_chr_close+0x92/0x140 [ 298.145045][T15174] __fput+0x2fb/0x770 [ 298.149046][T15174] ____fput+0x15/0x20 [ 298.153047][T15174] task_work_run+0x127/0x190 [ 298.157657][T15174] exit_to_user_mode_loop+0xcb/0xe0 [ 298.162892][T15174] exit_to_user_mode_prepare+0x76/0xa0 [ 298.168375][T15174] syscall_exit_to_user_mode+0x1d/0x40 [ 298.173850][T15174] do_syscall_64+0x3d/0x40 [ 298.178290][T15174] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 298.184205][T15174] RIP: 0033:0x7fd3f5073629 [ 298.188646][T15174] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 298.209411][T15174] RSP: 002b:00007fd3f3ace028 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 298.217848][T15174] RAX: 0000000000000000 RBX: 00007fd3f52ecfa0 RCX: 00007fd3f5073629 [ 298.225844][T15174] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 298.233840][T15174] RBP: 00007fd3f3ace090 R08: 0000000000000000 R09: 0000000000000000 [ 298.241829][T15174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.249824][T15174] R13: 00007fd3f52ed038 R14: 00007fd3f52ecfa0 R15: 00007ffc69ff5338 [ 301.301873][T15305] device wg2 entered promiscuous mode [ 301.336126][T15303] device syzkaller0 entered promiscuous mode [ 302.006970][T15331] device wg2 left promiscuous mode [ 302.253727][T15339] device syzkaller0 entered promiscuous mode [ 302.292076][T15331] device wg2 entered promiscuous mode [ 303.005998][T15365] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.013282][T15365] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.113312][T15366] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.120660][T15366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.129773][T15366] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.136938][T15366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.202536][T15366] device bridge0 entered promiscuous mode [ 303.409581][T15370] device sit0 entered promiscuous mode [ 305.882342][T15503] device syzkaller0 entered promiscuous mode [ 306.862438][T15555] device syzkaller0 entered promiscuous mode [ 307.329472][T15568] device syzkaller0 entered promiscuous mode [ 307.350465][T15568] syzkaller0: create flow: hash 3430834263 index 2 [ 307.478841][T15568] syzkaller0: delete flow: hash 3430834263 index 2 [ 308.070513][T15628] device lo entered promiscuous mode [ 308.308498][T15649] device veth0_to_hsr entered promiscuous mode [ 309.275136][T15720] device syzkaller0 entered promiscuous mode [ 310.487042][T15850] device syzkaller0 entered promiscuous mode [ 311.744132][T15901] 7B’ç÷ï: renamed from syzkaller0 [ 312.038366][T15911] device wg2 entered promiscuous mode [ 312.125226][T15929] device syzkaller0 entered promiscuous mode [ 312.151152][T15929] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 312.654465][T15994] device syzkaller0 entered promiscuous mode [ 312.707103][T15996] device syzkaller0 entered promiscuous mode [ 313.588946][T16046] +: renamed from team_slave_1 [ 315.044369][T16148] device syzkaller0 entered promiscuous mode [ 315.135438][T16155] device macsec0 entered promiscuous mode [ 315.218822][T16162] device pim6reg1 entered promiscuous mode [ 315.810312][T16206] device  entered promiscuous mode [ 316.527752][T16255] device syzkaller0 entered promiscuous mode [ 316.878723][ T24] audit: type=1400 audit(1771411452.750:178): avc: denied { ioctl } for pid=16288 comm="syz.0.4591" path="" dev="cgroup2" ino=465 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 317.736693][T16339] device syzkaller0 entered promiscuous mode [ 318.442101][T16356] device syzkaller0 entered promiscuous mode [ 319.629010][T16416] device syzkaller0 entered promiscuous mode [ 320.476468][T16459] device veth0_vlan left promiscuous mode [ 320.493015][T16459] device veth0_vlan entered promiscuous mode [ 320.543556][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.554236][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.563616][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.607111][T16466] device bond_slave_1 entered promiscuous mode [ 320.618298][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 320.637883][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.754623][T16499] device syzkaller0 entered promiscuous mode [ 321.364665][T16561] device syzkaller0 entered promiscuous mode [ 322.070335][T16639] device syzkaller0 entered promiscuous mode [ 322.548242][T16661] device sit0 left promiscuous mode [ 322.875813][T16670] device syzkaller0 entered promiscuous mode [ 323.044737][T16679] device syzkaller0 entered promiscuous mode [ 323.244152][T16700] device syzkaller0 entered promiscuous mode [ 323.404010][T16713] device  entered promiscuous mode [ 323.599044][T16725] tap0: tun_chr_ioctl cmd 1074025675 [ 323.604421][T16725] tap0: persist enabled [ 323.619635][T16725] tap0: tun_chr_ioctl cmd 1074025675 [ 323.625323][T16725] tap0: persist disabled [ 323.930062][T16735] sock: sock_set_timeout: `syz.3.4729' (pid 16735) tries to set negative timeout [ 325.531736][T16840] device syzkaller0 entered promiscuous mode [ 326.164983][T16889] device syzkaller0 entered promiscuous mode [ 326.187936][ T24] audit: type=1400 audit(1771411462.060:179): avc: denied { create } for pid=16900 comm="syz.0.4784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 327.670658][T17010] €Â0: renamed from pim6reg1 [ 329.238589][T17083] device syzkaller0 entered promiscuous mode [ 331.346101][T17180] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.361935][T17180] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.377288][T17180] device bridge_slave_0 entered promiscuous mode [ 331.394754][T17180] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.402700][T17180] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.417551][T17180] device bridge_slave_1 entered promiscuous mode [ 331.574699][T17180] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.581842][T17180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.589166][T17180] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.596251][T17180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.628200][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.637954][ T970] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.653433][ T970] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.700063][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.708554][ T970] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.715744][ T970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.769486][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.788048][ T970] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.795202][ T970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.829343][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.837911][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.854391][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.880374][T17180] device veth0_vlan entered promiscuous mode [ 331.890232][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.918339][T17180] device veth1_macvtap entered promiscuous mode [ 331.931356][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.944711][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.956710][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.980744][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 331.999443][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.011087][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.024510][ T970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.038627][T17234] device wg2 entered promiscuous mode [ 332.070447][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.079979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.106393][T17246] device veth0_vlan left promiscuous mode [ 332.118093][T17246] device veth0_vlan entered promiscuous mode [ 332.132394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.140865][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.148510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 332.470231][T17296] device syzkaller0 entered promiscuous mode [ 332.990631][ T296] device veth1_macvtap left promiscuous mode [ 333.001192][ T296] device veth0_vlan left promiscuous mode [ 333.372265][T17317] device syzkaller0 entered promiscuous mode [ 333.895046][T17345] : renamed from bond_slave_0 [ 334.001683][T17350] device veth0_vlan left promiscuous mode [ 334.046944][T17350] device veth0_vlan entered promiscuous mode [ 334.122095][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 334.149556][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 334.167542][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.388599][T17494] device wg2 left promiscuous mode [ 336.583619][T17494] device wg2 entered promiscuous mode [ 337.233509][T17552] device sit0 entered promiscuous mode [ 340.024547][T17701] device syzkaller0 entered promiscuous mode [ 340.121992][T17715] device wg2 left promiscuous mode [ 340.423335][T17734] device syzkaller0 entered promiscuous mode [ 340.433949][T17734] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 340.440352][T17734] syzkaller0: Linktype set failed because interface is up [ 340.963098][T17765] syz.0.5025[17765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.963194][T17765] syz.0.5025[17765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.608730][T17900] syz.1.5069[17900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.687015][T17900] syz.1.5069[17900] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.837882][T17908] device veth1_macvtap left promiscuous mode [ 342.857144][T17908] device macsec0 left promiscuous mode [ 342.910830][T17908] device veth1_macvtap entered promiscuous mode [ 342.918103][T17908] device macsec0 entered promiscuous mode [ 344.519202][T18016] device veth0_vlan left promiscuous mode [ 344.546371][T18016] device veth0_vlan entered promiscuous mode [ 344.620413][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 344.630859][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 344.646405][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 344.701491][T18019] device syzkaller0 entered promiscuous mode [ 347.636176][T18150] device syzkaller0 entered promiscuous mode [ 348.936412][T18198] device syzkaller0 entered promiscuous mode [ 350.274867][T18265] device syzkaller0 entered promiscuous mode [ 350.440155][T18270] device syzkaller0 entered promiscuous mode [ 350.693768][T18285] device syzkaller0 entered promiscuous mode [ 350.832791][T18292] ref_ctr_offset mismatch. inode: 0x48d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 350.984728][T18296] device syzkaller0 entered promiscuous mode [ 353.101215][T18446] device syzkaller0 entered promiscuous mode [ 353.117926][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 353.870643][T18469] device syzkaller0 entered promiscuous mode [ 354.793323][T18494] device veth0_vlan left promiscuous mode [ 354.852345][T18494] device veth0_vlan entered promiscuous mode [ 355.222491][T18508] device syzkaller0 entered promiscuous mode [ 355.618367][T18521] device syzkaller0 entered promiscuous mode [ 355.679208][T18525] batadv0: tun_chr_ioctl cmd 1074025677 [ 355.700086][T18525] batadv0: linktype set to 776 [ 356.611810][T18582] device wg2 left promiscuous mode [ 357.297549][T18607] @ÿ: renamed from bond_slave_0 [ 357.990629][T18663] device dummy0 entered promiscuous mode [ 359.423063][T18739] device syzkaller0 entered promiscuous mode [ 359.552010][T18760] device veth0_vlan left promiscuous mode [ 359.575319][T18760] device veth0_vlan entered promiscuous mode [ 359.617012][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.627182][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 359.635617][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 360.047146][T18790] device syzkaller0 entered promiscuous mode [ 361.363074][T18907] device bridge_slave_0 entered promiscuous mode [ 362.281907][T19006] device syzkaller0 entered promiscuous mode [ 363.663844][T19123] syz.3.5423[19123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.663909][T19123] syz.3.5423[19123] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.596278][T19198] €Â0: renamed from pim6reg1 [ 365.076689][T19227] device syzkaller0 entered promiscuous mode [ 365.392042][T19248] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 365.782586][T19265] device syzkaller0 entered promiscuous mode [ 368.790331][T19372] device syzkaller0 entered promiscuous mode [ 368.862980][T19407] tap0: tun_chr_ioctl cmd 1074025681 [ 368.920269][T19407] tap0: tun_chr_ioctl cmd 1074025673 [ 369.559161][T19427] device syzkaller0 entered promiscuous mode [ 370.026270][T19435] device syzkaller0 entered promiscuous mode [ 370.113818][T19435] IPv6: pim6reg1: Disabled Multicast RS [ 370.883084][T19483] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.890222][T19483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.897656][T19483] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.904745][T19483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.948853][T19483] device bridge0 entered promiscuous mode [ 371.253235][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.403956][T19503] device syzkaller0 entered promiscuous mode [ 372.597218][T19588] syz.2.5552[19588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.597319][T19588] syz.2.5552[19588] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.323043][T19607] device wg2 left promiscuous mode [ 373.589863][T19639] device syzkaller0 entered promiscuous mode [ 374.821177][T19700] device syzkaller0 entered promiscuous mode [ 375.603755][T19771] device syzkaller0 entered promiscuous mode [ 375.714557][T19781] device syzkaller0 entered promiscuous mode [ 377.228743][T19865] device syzkaller0 entered promiscuous mode [ 378.520576][T19942] device pim6reg1 entered promiscuous mode [ 380.635879][T20050] device syzkaller0 entered promiscuous mode [ 380.747244][T20071] device syzkaller0 entered promiscuous mode [ 381.594483][T20124] 7B’ç÷ï: renamed from syzkaller0 [ 381.780932][T20141] syz.4.5719[20141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.780999][T20141] syz.4.5719[20141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.258177][T20231] device syzkaller0 entered promiscuous mode [ 387.662015][T20433] device pim6reg1 entered promiscuous mode [ 388.188037][T20458] : port 1(dummy0) entered blocking state [ 388.200029][T20458] : port 1(dummy0) entered disabled state [ 388.222100][T20458] device dummy0 entered promiscuous mode [ 389.292837][T20493] device syzkaller0 entered promiscuous mode [ 389.730041][T20538] device vlan0 entered promiscuous mode [ 392.004891][T20649] device pim6reg1 entered promiscuous mode [ 392.693525][T20671] device syzkaller0 entered promiscuous mode [ 393.466380][T20726] device syzkaller0 entered promiscuous mode [ 394.117518][T20771] device syzkaller0 entered promiscuous mode [ 394.206103][T20784] device wg2 entered promiscuous mode [ 394.438454][T20788] device syzkaller0 entered promiscuous mode [ 394.701571][T20808] device syzkaller0 entered promiscuous mode [ 394.783987][ T1245] syzkaller0: tun_net_xmit 48 [ 395.166092][T20828] device veth1_macvtap left promiscuous mode [ 395.178759][T20828] device macsec0 left promiscuous mode [ 395.796060][T20872] device syzkaller0 entered promiscuous mode [ 396.186055][T20901] device syzkaller0 entered promiscuous mode [ 396.242024][T20901] syzkaller0: tun_net_xmit 1280 [ 396.641500][T20948] cgroup: fork rejected by pids controller in /syz1 [ 396.756817][T20959] device syzkaller0 entered promiscuous mode [ 396.899109][T20970] device veth0_to_hsr entered promiscuous mode [ 397.022428][T20976] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.029897][T20976] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.037416][T20976] device bridge_slave_0 entered promiscuous mode [ 397.044892][T20976] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.052466][T20976] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.060211][T20976] device bridge_slave_1 entered promiscuous mode [ 397.150431][T20990] device syzkaller0 entered promiscuous mode [ 397.358869][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 397.371774][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.404036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 397.420336][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 397.453986][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.461147][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.534521][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 397.675115][T21012] device syzkaller0 entered promiscuous mode [ 397.698936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 397.714538][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 397.729220][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.736447][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.763307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 397.776395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.883531][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 397.901541][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 398.020428][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 398.033921][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 398.045176][T20976] device veth0_vlan entered promiscuous mode [ 398.072274][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.088222][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.129444][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.219427][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 398.243035][T20976] device veth1_macvtap entered promiscuous mode [ 398.270494][T21037] device wg2 entered promiscuous mode [ 398.379264][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 398.394007][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 398.433735][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 398.496521][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 399.072858][T21062] device syzkaller0 entered promiscuous mode [ 399.339750][ T970] device dummy0 left promiscuous mode [ 399.345345][ T970] : port 1(dummy0) entered disabled state [ 399.392928][ T970] device veth1_macvtap left promiscuous mode [ 399.405760][ T970] device veth0_vlan left promiscuous mode [ 399.976958][T21109] device syzkaller0 entered promiscuous mode [ 400.148617][T21108] device syzkaller0 entered promiscuous mode [ 401.124982][T21217] device syzkaller0 entered promiscuous mode [ 401.251719][T21224] device veth1_macvtap entered promiscuous mode [ 401.294695][T21224] device macsec0 entered promiscuous mode [ 401.309614][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 403.006618][T21318] IPv6: GPL: Disabled Multicast RS [ 403.069258][T21331] syz.0.6063[21331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.069355][T21331] syz.0.6063[21331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.619417][T21369] device syzkaller0 entered promiscuous mode [ 403.737086][T21379] syzkaller0: tun_chr_ioctl cmd 1074025680 [ 405.993789][T21524] device syzkaller0 entered promiscuous mode [ 407.000843][T21577] device veth1_macvtap left promiscuous mode [ 407.713729][T21581] bridge0: port 1(bridge_slave_0) entered blocking state [ 407.764601][T21581] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.819355][T21581] device bridge_slave_0 entered promiscuous mode [ 407.844158][T21581] bridge0: port 2(bridge_slave_1) entered blocking state [ 407.857475][T21581] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.884721][T21581] device bridge_slave_1 entered promiscuous mode [ 408.209402][T21581] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.216541][T21581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.223862][T21581] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.230925][T21581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.426357][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.450989][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.495258][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 408.503038][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.535642][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 408.589005][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.597293][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.604381][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.613707][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 408.627264][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.649058][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.656144][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.714085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 408.741968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.797062][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 408.899513][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.007770][T21581] device veth0_vlan entered promiscuous mode [ 409.040559][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 409.054744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 409.089102][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 409.133258][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.166409][T21581] device veth1_macvtap entered promiscuous mode [ 409.200417][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.219836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.278884][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 409.288499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 409.296841][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 409.355567][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 409.366291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 409.418048][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 409.426726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 410.274891][T21694] device aaaaaaaaaaaaaaa entered promiscuous mode [ 410.546560][ T970] device bridge_slave_1 left promiscuous mode [ 410.558805][ T970] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.599361][ T970] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.007507][T21742] device syzkaller0 entered promiscuous mode [ 411.440700][T21776] device syzkaller0 entered promiscuous mode [ 412.714430][T21866] device veth1_macvtap left promiscuous mode [ 412.776921][T21870] device veth1_macvtap entered promiscuous mode [ 412.783412][T21870] device macsec0 entered promiscuous mode [ 413.107338][T21892] device sit0 left promiscuous mode [ 413.323035][T21912] device sit0 entered promiscuous mode [ 413.613470][T21903] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.638466][T21903] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.659173][T21903] device bridge_slave_0 entered promiscuous mode [ 413.679925][T21903] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.691407][T21903] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.703363][T21903] device bridge_slave_1 entered promiscuous mode [ 414.013777][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.022103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.040369][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 414.047963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 414.064963][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 414.074014][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 414.082583][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.089691][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.107578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 414.116110][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 414.129071][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.136185][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.159703][ T970] device ip6gretap0 left promiscuous mode [ 414.165588][ T970] : port 1(ip6gretap0) entered disabled state [ 414.201731][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 414.211001][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 414.273905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.282213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.290032][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.318582][T21903] device veth0_vlan entered promiscuous mode [ 414.344670][T21903] device veth1_macvtap entered promiscuous mode [ 414.378957][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.493373][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.501982][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.535031][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 414.843115][ T970] device veth1_macvtap left promiscuous mode [ 414.894790][ T970] device veth0_vlan left promiscuous mode [ 415.747635][T22055] device syzkaller0 entered promiscuous mode [ 418.577053][T22233] device syzkaller0 entered promiscuous mode [ 419.767466][T22378] device syzkaller0 entered promiscuous mode [ 420.765750][T22435] device pim6reg1 entered promiscuous mode [ 420.940542][T22442] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 420.980005][T22442] device syzkaller0 entered promiscuous mode [ 423.623608][ T24] audit: type=1400 audit(1771411559.500:180): avc: denied { create } for pid=22671 comm="syz.2.6441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 424.403881][T22737] device syzkaller0 entered promiscuous mode [ 426.165396][T22849] device veth1_macvtap left promiscuous mode [ 426.179733][T22850] device veth1_macvtap entered promiscuous mode [ 426.206427][T22850] device macsec0 entered promiscuous mode [ 426.215066][T22850] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 426.236884][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 426.284637][T22854] nr0: port 1(macsec0) entered blocking state [ 426.294127][T22854] nr0: port 1(macsec0) entered disabled state [ 426.306588][T22854] device macsec0 entered promiscuous mode [ 427.183176][T22916] device pim6reg1 entered promiscuous mode [ 427.560984][T22941] device veth1_macvtap left promiscuous mode [ 427.567327][T22941] device macsec0 left promiscuous mode [ 429.357459][T23053] device syzkaller0 entered promiscuous mode [ 429.405129][T23040] device syzkaller0 entered promiscuous mode [ 429.532302][T23067] tap0: tun_chr_ioctl cmd 1074025677 [ 429.548095][T23067] tap0: linktype set to 772 [ 430.124462][T23105] device syzkaller0 entered promiscuous mode [ 430.792079][T23159] device syzkaller0 entered promiscuous mode [ 430.799130][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 431.349783][T23177] device syzkaller0 entered promiscuous mode [ 431.649915][T23204] -1: renamed from syzkaller0 [ 431.949576][T23214] device syzkaller0 entered promiscuous mode [ 432.357529][T23241] device syzkaller0 entered promiscuous mode [ 432.864976][T23264] ÿÿÿÿÿÿ: renamed from vlan1 [ 433.203069][T23275] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.210314][T23275] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.251083][T23275] device bridge0 left promiscuous mode [ 433.313287][T23276] device bridge_slave_1 left promiscuous mode [ 433.368798][T23276] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.379245][T23276] device bridge_slave_0 left promiscuous mode [ 433.385450][T23276] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.418104][ T24] audit: type=1400 audit(1771411569.290:181): avc: denied { create } for pid=23284 comm="syz.3.6625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 433.676743][T23282] device syzkaller0 entered promiscuous mode [ 434.214628][T23317] @ÿ: renamed from bond_slave_0 [ 434.759456][T23339] device syzkaller0 entered promiscuous mode [ 435.555349][T23375] device macsec0 entered promiscuous mode [ 436.582042][T23422] device syzkaller0 entered promiscuous mode [ 440.003302][T23555] device sit0 entered promiscuous mode [ 440.824315][T23586] device sit0 entered promiscuous mode [ 440.979703][T23591] device veth0_vlan left promiscuous mode [ 440.987380][T23591] device veth0_vlan entered promiscuous mode [ 441.485457][T23616] device syzkaller0 entered promiscuous mode [ 441.863863][T23631] device syzkaller0 entered promiscuous mode [ 442.688448][T23686] ÿ: renamed from team_slave_1 [ 442.951228][T23701] device syzkaller0 entered promiscuous mode [ 443.423887][T23735] device syzkaller0 entered promiscuous mode [ 444.661370][T23798] device syzkaller0 entered promiscuous mode [ 444.974979][T23816] device syzkaller0 entered promiscuous mode [ 445.185807][T23842] syz.0.6792[23842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.185908][T23842] syz.0.6792[23842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.361894][T23846] ªªªªªª™™: renamed from vlan0 [ 445.466574][T23849] device syzkaller0 entered promiscuous mode [ 446.663990][T23927] device syzkaller0 entered promiscuous mode [ 447.152357][T23955] device syzkaller0 entered promiscuous mode [ 447.240618][T23963] device wg2 left promiscuous mode [ 447.326359][T23963] device wg2 entered promiscuous mode [ 447.348075][T23963] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 448.133059][T24014] device syzkaller0 entered promiscuous mode [ 448.561021][T24053] device lo entered promiscuous mode [ 450.661248][T24143] wg1: mtu less than device minimum [ 451.112094][T24172] device syzkaller0 entered promiscuous mode [ 451.425506][T24194] +: renamed from team_slave_1 [ 452.982929][T24304] device syzkaller0 entered promiscuous mode [ 453.719891][T24357] device syzkaller0 entered promiscuous mode [ 454.021496][T24373] device wg2 left promiscuous mode [ 454.040890][T24377] device bond_slave_1 entered promiscuous mode [ 454.057426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 454.107177][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 455.346869][T24474] tap0: tun_chr_ioctl cmd 1074025677 [ 455.358773][T24474] tap0: linktype set to 270 [ 455.895908][T24495] device sit0 entered promiscuous mode [ 458.119590][T24629] device syzkaller0 entered promiscuous mode [ 458.264863][T24632] device syzkaller0 entered promiscuous mode [ 459.286136][T24714] device pim6reg1 entered promiscuous mode [ 459.321110][T24698] bridge0: port 3(veth0_to_team) entered blocking state [ 459.328741][T24698] bridge0: port 3(veth0_to_team) entered disabled state [ 459.336209][T24698] device veth0_to_team entered promiscuous mode [ 460.554014][T24750] device sit0 left promiscuous mode [ 460.611218][T24751] device sit0 entered promiscuous mode [ 461.145643][T24787] device syzkaller0 entered promiscuous mode [ 461.426389][T24810] device syzkaller0 entered promiscuous mode [ 461.716828][T24824] device syzkaller0 entered promiscuous mode [ 463.564170][T24968] tun0: tun_chr_ioctl cmd 1074025676 [ 463.581037][T24968] tun0: owner set to 0 [ 463.704894][T24994] ip6_vti0: mtu less than device minimum [ 466.285716][T25123] device syzkaller0 entered promiscuous mode [ 466.769545][T25154] device syzkaller0 entered promiscuous mode [ 467.034973][T25161] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.096590][T25161] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.127134][T25161] device bridge_slave_0 entered promiscuous mode [ 467.176711][T25161] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.206854][T25161] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.234527][T25161] device bridge_slave_1 entered promiscuous mode [ 467.793167][T25197] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.807451][T25197] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.084643][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 468.103752][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 468.160046][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 468.192449][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 468.200729][T25213] ------------[ cut here ]------------ [ 468.217282][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.224409][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 468.234079][T25213] kernel BUG at kernel/bpf/arraymap.c:980! [ 468.274812][T25213] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 468.281065][T25213] CPU: 1 PID: 25213 Comm: syz.3.7181 Tainted: G W syzkaller #0 [ 468.289967][T25213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 468.300062][T25213] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 468.306372][T25213] Code: 63 e9 ff eb 05 e8 4c 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 38 63 e9 ff 0f 0b e9 78 f9 ff ff e8 2c 63 e9 ff <0f> 0b e8 25 63 e9 ff 0f 0b e8 1e 63 e9 ff 0f 0b e8 17 63 e9 ff 0f [ 468.326004][T25213] RSP: 0018:ffffc90000dcfc10 EFLAGS: 00010293 [ 468.332094][T25213] RAX: ffffffff817b5324 RBX: ffff88810dfd8f90 RCX: ffff88810f7413c0 [ 468.340089][T25213] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 468.348097][T25213] RBP: ffffc90000dcfc90 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 468.356107][T25213] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: ffffffffa0046300 [ 468.364109][T25213] R13: ffff88810f456580 R14: 0000000000000001 R15: 00000000fffffff0 [ 468.372110][T25213] FS: 00007f50916486c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 468.381064][T25213] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 468.387671][T25213] CR2: 00007fe95f772060 CR3: 000000010fbd0000 CR4: 00000000003506a0 [ 468.395669][T25213] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 468.403685][T25213] DR3: 0000200000000300 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 468.411676][T25213] Call Trace: [ 468.414995][T25213] ? bpf_prog_178c55262a54958c+0xb/0xc84 [ 468.420653][T25213] bpf_fd_array_map_update_elem+0x21f/0x330 [ 468.426580][T25213] bpf_map_update_value+0xb4/0x430 [ 468.431708][T25213] map_update_elem+0x4a1/0x5e0 [ 468.436497][T25213] __se_sys_bpf+0x3e0/0x740 [ 468.441023][T25213] ? __x64_sys_bpf+0x90/0x90 [ 468.445632][T25213] ? __se_sys_rt_sigprocmask+0x22c/0x290 [ 468.451294][T25213] ? debug_smp_processor_id+0x17/0x20 [ 468.456683][T25213] __x64_sys_bpf+0x7b/0x90 [ 468.461131][T25213] do_syscall_64+0x31/0x40 [ 468.465569][T25213] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 468.471476][T25213] RIP: 0033:0x7f5092c2f629 [ 468.475921][T25213] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 468.495647][T25213] RSP: 002b:00007f5091648028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 468.504095][T25213] RAX: ffffffffffffffda RBX: 00007f5092ea9180 RCX: 00007f5092c2f629 [ 468.512089][T25213] RDX: 0000000000000020 RSI: 00002000000005c0 RDI: 0000000000000002 [ 468.520084][T25213] RBP: 00007f5092cc5b39 R08: 0000000000000000 R09: 0000000000000000 [ 468.528089][T25213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 468.536095][T25213] R13: 00007f5092ea9218 R14: 00007f5092ea9180 R15: 00007ffd9524b228 [ 468.544113][T25213] Modules linked in: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 468.566940][ T24] audit: type=1400 audit(1771411604.430:182): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[14413]" dev="pipefs" ino=14413 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 468.589117][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 468.599056][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 468.607305][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.614421][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 468.638852][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 468.655250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 468.683741][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 468.703970][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 468.718779][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 468.751461][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 468.769007][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 468.793230][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 468.819157][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 468.840618][T25161] device veth0_vlan entered promiscuous mode [ 468.905701][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 468.919022][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 469.069382][T25213] ---[ end trace 976a092c654615e2 ]--- [ 469.074924][T25213] RIP: 0010:prog_array_map_poke_run+0x6f4/0x710 [ 469.082109][T25213] Code: 63 e9 ff eb 05 e8 4c 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 38 63 e9 ff 0f 0b e9 78 f9 ff ff e8 2c 63 e9 ff <0f> 0b e8 25 63 e9 ff 0f 0b e8 1e 63 e9 ff 0f 0b e8 17 63 e9 ff 0f [ 469.102925][T25213] RSP: 0018:ffffc90000dcfc10 EFLAGS: 00010293 [ 469.109388][T25213] RAX: ffffffff817b5324 RBX: ffff88810dfd8f90 RCX: ffff88810f7413c0 [ 469.117414][T25213] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 469.125537][T25213] RBP: ffffc90000dcfc90 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 469.134045][T25213] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: ffffffffa0046300 [ 469.142129][T25213] R13: ffff88810f456580 R14: 0000000000000001 R15: 00000000fffffff0 [ 469.150164][T25213] FS: 00007f50916486c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 469.159165][T25213] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 469.165773][T25213] CR2: 00007fe95ec122f8 CR3: 000000010fbd0000 CR4: 00000000003506b0 [ 469.173836][T25213] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 469.181882][T25213] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 469.189954][T25213] Kernel panic - not syncing: Fatal exception [ 469.193709][ T24] audit: type=1400 audit(1771411605.070:183): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 469.218023][T25213] Kernel Offset: disabled [ 469.222365][T25213] Rebooting in 86400 seconds..