last executing test programs: 3.616658434s ago: executing program 1 (id=6271): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xfffffff6}, [@jmp={0x5, 0x1, 0x4, 0x7, 0x6, 0xfffffffffffffff8, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf703}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f00000000c0)='syzkaller\x00', 0xff, 0x0, &(0x7f0000000100), 0x40f00, 0x69, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xb, 0x6, 0x5}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000001c0)=[0x1, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000200)=[{0x1, 0x4, 0xb, 0xc}, {0x3, 0x5, 0x10, 0x5}, {0x5, 0x2, 0x3, 0x2}, {0x2, 0x5, 0x9, 0xa}, {0x5, 0x2, 0xd, 0x3}]}, 0x94) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000340)=r1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'ip_vti0\x00', 0x2000}) r2 = syz_clone(0x0, &(0x7f0000000480)="e50d2a8a39232fd0635791a5ab4b6a17e583c9727dfd00b708e615ef0ea71a23bfa872c9cef2b2a1d73c02dd5f6478d87463060cf8c79a6765cebbd4f45c73ac15717298fab9fde97648683b533d4b6ef3b7feed0c8a87578b295a695bedb8cf841b2cb118ac7b1d30b3e96083b3587c5510731a9d159cd1729783adb56c126d3493cc76d2e90e972a0337d0302619684860e0fd1d9bacdb4fca238ba160f7117ecbf50521398e9c15edc27f8a8cf6107307c905880fca40dbc4d1c9f6880b8870969ff9bfe8db1c0cdd59a3fbe0830c6479704eb5dc2a86e781a854666542", 0xdf, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)="ec825a0dc39f3d18a80edb64de59644922ce57cc21e6f650683db92cc1c671c963713f0b8590a567dbacc2a03fb9a0f544de472aba6aa62711ec813260e2") r3 = perf_event_open(&(0x7f0000000680)={0x4, 0x80, 0x0, 0x1, 0x0, 0x1e, 0x0, 0xf, 0x40, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000640), 0xa}, 0x10082, 0x2, 0x7, 0x7, 0x45e1ba9f, 0x5, 0x60, 0x0, 0xff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) r4 = perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0xd, 0x8, 0x6, 0x4, 0x0, 0x400, 0x4000, 0xc, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000003c0), 0x6}, 0x1050a0, 0x6, 0xf7, 0x4, 0x2, 0x5, 0xa8d, 0x0, 0x2, 0x0, 0x4}, r2, 0x6, r3, 0x2) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000700)) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f00000007c0)={r1, r5}, 0xc) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000800)={'xfrm0\x00', @random="1c2029447935"}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000840)='\x00') r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000880)='./file0\x00', 0x0, 0x8, r1}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r3) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000900)={0x3, 0x80, 0x69, 0xf3, 0x10, 0x1, 0x0, 0x0, 0x408, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1, 0x7}, 0x10c010, 0x4, 0x4, 0x6, 0xa8, 0x5, 0x3, 0x0, 0x1, 0x0, 0x1}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000980)=r1, 0x4) close(r6) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000009c0)=0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000a40)={0x3, 0x80, 0x7, 0x6, 0x3, 0xf0, 0x0, 0x101, 0x2c404, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xbbb1, 0x2, @perf_bp={&(0x7f0000000a00), 0x1}, 0x81, 0x0, 0x4, 0x5, 0x1, 0xffffffff, 0x9, 0x0, 0x8000, 0x0, 0xa}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c40)={0xffffffffffffffff, &(0x7f0000000ac0)="96819d5b864b56619fe77c830ad8b98e70ac2974ad0cbf6b4a31b85d758c71c6da60f7fe0db49854998069b54618cc588d943a9edc94bd7c895361f6523ef401b222d72ec6a07d777ef9ab965856de6fb4ba11723549e075d87d25c1b37732c67bdba55fbc9871a3256b5264cae73d9fd654f825dbfd0b6a8d0adafe17512bd2a9d0895a3d67776a037d92268ff20c891941654a17cec3e93045a7a5586e16550317ffb55b75e9507e585ca0acd216a1ebfa8c6aa631115039723b4b7eca2637", &(0x7f0000000b80)=""/154, 0x4}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000c80)={0x0, r6}, 0x8) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000cc0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000d00)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001140)={r8, 0xe0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000e80)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, &(0x7f0000000ec0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000f00)=[0x0, 0x0], 0x0, 0x9c, &(0x7f0000000f40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000f80), &(0x7f0000000fc0), 0x8, 0x3c, 0x8, 0x8, &(0x7f0000001000)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@ifindex=r10, 0x2f, 0x0, 0x9, &(0x7f0000000d40)=[0x0], 0x1, 0x0, &(0x7f0000000d80)=[0x0, 0x0], &(0x7f0000000dc0)=[0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001180)={@fallback=r5, r8, 0x4, 0x20, 0x0, @void, @void, @void, @value=r9, r11}, 0x20) syz_clone(0x800000, &(0x7f00000011c0)="c2a0d4af38854c2fb45a689463608c099f289c988af8c7e395701c374ffb59884c", 0x21, &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280)="75bed0a9266add5f38c7470f2f787bfa8e2b1dfe9852b74aca4c072fa794266077e2702f1155f5965dbcab682c17aea1baccc348a8280d400ff82fbb125c02ab6c222a68a3733dfd37670015e1b81e5aa5dacbad8d4241a9723fc9b8a6eb3bc795f32f76b79b313cc773fb7ab28d1c6c821382f2d29aa66c58f30040cd6f51205c1013e52679900475ff818747d6cb14bc8d0fd347279c413bb5212abaf85e9e6d5b82e312efce5a1877c4af46c387702e359a8a35d0bc4dcad9a5789eba15b6da7970ab21e50e84249fb3fd692b8d12c452b1d10ad77d82329cc5e5bca3c33b0244f559e9a61b2815d573") ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000013c0)={0x1, &(0x7f0000001380)=[{0x9, 0x1, 0xb}]}) write$cgroup_type(r8, &(0x7f0000001400), 0x9) socketpair(0x27, 0x4, 0x2, &(0x7f0000001440)) 3.377466614s ago: executing program 4 (id=6276): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x4, 0x8, 0x10, 0x0, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000300000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) (async) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x4f}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xd, 0x5, 0x4, 0x7, 0x0, r4, 0x10000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r6, &(0x7f0000000080), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x88, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000340)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800200000000040000000000000000004000000bb7f1a006600feff000000109500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x4c) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="1c000000000000000000000000000000850000002a00000018110000cfd7a73bf86f0b835ee03b3276a956f0f6cb5a4ccd29932e6e5850f13eecb3d08791a4fffc6308b32c98fe3b3a79757c0000a352624ebd1c9c1f5ad8415ad6a64c7f9b29fd33d84c0907182b5409c6ee5545a52cc47ef5a303ba4a24b93d2935570ae7d45ee49836ee9f26b7b9f5ecc9e740b13c9f96d043", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.314162855s ago: executing program 1 (id=6277): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYRES64=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6a, '\x00', 0x0, 0x2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001000000000000000000000071120d000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791208000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000abad8945adb69e0647b7765bd97d7afbb605b2a6a6c45c54b0b4ceee6792ad525c4e42d5a13e1dff3205db48a8c995f0b379b7df43ebd0ed4f87d1523bbe1e9f0e7c9570abdaaa90dc4170f55b9887324e0fed095df200015a6be415ef65a6bdfe7662f463b30d542f964d6e32843ceb708e1c6ca3dfe256397420953ef70ee6d7f7da92b2e150b1700538b92d3f5c532fe2dfa281f698ba203b870bb3651d13c67a4a641b912820bb17e5cd89ccbf38ed", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}], 0x50}, 0x10020) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x1f6, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x2a, r4}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000380)=0xfffffffe) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_subtree(r6, &(0x7f0000000140), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000007000000000000000030000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000bf02000014000000b7030000ce490000000085000000830000000900000000000055090100000000009500000000000000185800000c0000000000000000000000bf90e60085000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x10000, 0xc4, &(0x7f0000000500)=""/196, 0x41100, 0x10, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000600)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000640)=[{0x5, 0x2, 0xf, 0x9}, {0x3, 0x5, 0x5, 0xc}, {0x5, 0x1, 0x6, 0x3}, {0x1, 0x4, 0x3, 0x4}, {0x5, 0x5, 0x1, 0xc}, {0x5, 0x2, 0x1, 0x5}, {0x2, 0x3, 0xb, 0x9}, {0x1, 0x5, 0x7, 0x5}, {0x3, 0x5, 0x6, 0xf}, {0x1, 0x2, 0x5, 0x5}], 0x10, 0xffffe6e2}, 0x94) 3.170892859s ago: executing program 1 (id=6285): r0 = syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x420}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x822a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', r2, 0x4000, r1}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x8, 0x1, 0x0, 0x0, 0x4, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sched_cls}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) syz_clone(0x4000300, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) syz_clone(0x48400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x420}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x822a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, 0x0, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@o_path={&(0x7f0000000240)='./file0\x00', r2, 0x4000, r1}, 0x18) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4d, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x8, 0x1, 0x0, 0x0, 0x4, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) (async) ioctl$TUNGETVNETLE(r5, 0x800454dd, &(0x7f0000000200)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sched_cls}, 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) syz_clone(0x4000300, 0x0, 0x0, 0x0, 0x0, 0x0) (async) close(0x3) (async) 3.170169759s ago: executing program 4 (id=6286): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001b40)={&(0x7f0000001980)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000003000000010000000200000f390000000500000037000000390000020000000000000000390000004d3655100000000000000f01000000b5005f00"], 0x0, 0x4f, 0x0, 0x1, 0x5}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000e30000000500000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r1, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r1, &(0x7f00000007c0), &(0x7f0000000340)=""/183, 0x2}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x10, '\x00', 0x0, r0, 0x1, 0x4, 0x4}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x6, 0x0, r3, 0x80000001, '\x00', r4, r0, 0x3}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) close(0x3) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.017853464s ago: executing program 4 (id=6289): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000000000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f00000013c0), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x7f, 0xef0, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000b00)="b9c83d5f40f72ab5", &(0x7f0000000ec0)="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", 0x402, r2}, 0x38) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000000)={0x0, &(0x7f00000004c0)=""/233, &(0x7f00000001c0), &(0x7f0000000240), 0x6, r2}, 0x38) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 2.843337374s ago: executing program 4 (id=6292): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0, r2}, 0xc) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4000400, 0x0, 0x1f, 0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0, r2}, 0xc) (async) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x4000400, 0x0, 0x1f, 0x0, 0x0, 0x0) (async) 2.800788641s ago: executing program 4 (id=6293): perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffffffffffffffc7) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xffffffffffffffc7) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB="00008cff07887e7cf83500000000000045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x800, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r3, &(0x7f0000000240)="b887ff708e211283a9", &(0x7f0000000140), 0x4}, 0x20) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000001}, 0x1cad, 0x0, 0x0, 0x0, 0x7, 0x0, 0xbd}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000001}, 0x1cad, 0x0, 0x0, 0x0, 0x7, 0x0, 0xbd}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000835336bc03020000000000000900000000000000000000000d020000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x20000, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.718871844s ago: executing program 3 (id=6295): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x10}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffff6b}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xf, 0x4, 0x8, 0x2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000000000006a0a00ff00000000850000000a000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2f01806fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c7c77f0979b34e1ad837ff0d10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8d0d26b5069f8a98f7dc8f76b74635fc9f9de9ca3c0ec0cb9bf4e418d076df4c7df0a70f2bdf4000000000000b0c2940dd8e263aa743f7555193161f45346b1004006000000e1ffff8816326d7d25c32aac1c7d5b5be399f6609876b5887437a172fbc02a74135b29194e533583412dff048f0000000000000000b2728a0481e9f0da43bb6cfb851cd364ff19ffcafe3e64be033c9d2f002cc93c1c13caec04a347383420336bec88c24a9fb6a6991ddb737d527d6acb15426415b6e8b14fdfa2c6e94bd0339454c13ad3e328a100000000b515a1000000000000000eb2e9c15b6c8f6198282df27badac8500bc7d202e0990"], &(0x7f0000000340)='GPL\x00'}, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0xffff0000, 0xf0, 0xe200, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, 0x0, &(0x7f0000000780)=""/255}, 0x20) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@cgroup=r4, 0x1e, 0x0, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0]}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) 2.527325667s ago: executing program 4 (id=6296): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x58) r2 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000300)='@\'{-!:&.^\x00') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r4, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000002c0), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xd, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="61154c000000000061138c0000000000bfa00000000000001503000008004e002d35010000000000950041000000000069163a0000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ff3d4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2739670b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc401000000cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be19637302f3b41eae50509fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524a3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8b0100010000000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d545ffffffff00000000a1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf857689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684ee54c0a263c806aabac2f66cb052f847c62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961ef4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fc0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bb000000000000000000000000000000884efcecca45ea4ab2ec097668456a6ff12854997f5aed737d5205ace5c0b64f87ef10784d0479cb44ca077e0c4ce6ff880e2ce3de63853a9740e9233683bfc8636bee293aeeb680b399a296e6f44c07b5fc5d9d359af007f23004a7acb6df23664ea209620b4fe0f4df81c33bd8ca2335cb4b50881937379b45a301175c3e8eb32970564ec8e25c46ee3bae079faedaad94276cfa251be8256c4c37fc84a25c3a2feb39e94a5266a10716d4a3cef499fa176018054e9149a1c9d20a809ce3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 2.452964979s ago: executing program 1 (id=6297): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x7fffffff, 0x0, 0x9}, 0x50) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1}, 0x2020}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791200000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r8, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r9, 0x1f00, 0x18, 0x19, &(0x7f00000007c0)="9f44948721919580684010a40566", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000380)="8c5911c525f5cf4c4ecf207ad2ec", 0x0, 0x0, 0xffffffff}, 0x23) close(r5) 1.722685611s ago: executing program 3 (id=6303): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000740)='ns/uts\x00') perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x9a}, [@call={0x85, 0x0, 0x0, 0x5}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000000000d00000000000000000000000a01000000000000000000000a02000000000000000000000b0000"], 0x0, 0x56}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, r1, 0x4, 0x1}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000200000000000000000000030000000002000000020000000000e800000000000000000105000000080000000000000001000085000000000000000001"], 0x0, 0x5a}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="01000000050000000200"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@var={0x2, 0x0, 0x0, 0xe, 0x2}, @volatile={0x0, 0x0, 0x0, 0x2}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x38}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="09000000080000000800000090"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x80}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="5eeced8e46dc3f0adf33c9f7b986", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') 1.388322638s ago: executing program 1 (id=6306): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x11, 0x4, 0x4, 0x5}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000900)=ANY=[@ANYRES64=r0, @ANYRES32=r0, @ANYBLOB="0000000200000000b70800820000008cbd00a6020000f8ff3f66161bce2caa6d08000000b703000000000000850000003300002e6e6536ab652736a70d7e000000000000000000000000001e2945f98e9ed1219b0ec9128ffc2b597ab1027f3edd2edc90e55da5178a484b190628014c0443a4d4e7d11a5cd86aef93f1259ab657662e47e69e0d27e007b0129174e3d9751fdd749cb1e1b400f14bfd233a9a95b980c11982b6404f6a6221ce757613c693497b991e5709a494e68c06468fc602986aaaa0065e752190fb379bae", @ANYBLOB="ad512cea1a8b4025c2b903a9a9bf6b3ee24d7ff8d5abe191d3ba39cfa7a8ff47e7dd0bef591f18bdc1740400cf0bf5633ea701daa7db44846eb7c2dd0bed9895ae490173a678e4c17ec412d437388c6482aed750e580e5c744a6e04df18f3b250d241c", @ANYRESHEX=r0], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r1}, 0x57) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r5, 0x8, 0x0, 0x0, 0x18, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000680)={0x1, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xe, 0x4, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8ea0}, [@generic={0x2, 0x6, 0x6, 0x5, 0x80}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xb1, &(0x7f0000000380)=""/177, 0x41000, 0x39, '\x00', r4, @sk_skb=0x4, r5, 0x8, &(0x7f0000000580)={0x6, 0x4}, 0x8, 0x10, 0x0, 0x0, r6, r3, 0x4, &(0x7f00000006c0)=[r0, r0, r0, r0], &(0x7f0000000700)=[{0x2, 0x5, 0x2, 0xa}, {0x2, 0x3, 0x2, 0x4}, {0x5, 0x5, 0xb, 0x5}, {0x0, 0x2, 0x6, 0x5}]}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000001c0)={r7, 0xffffffffffffffff, 0x2}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x7, [@enum={0x3, 0x1, 0x0, 0xf, 0x4000000, [{0x7}]}, @struct={0xe}]}, {0x0, [0x0, 0x0, 0x2e, 0x5f, 0x5f]}}, &(0x7f0000002200)=""/4110, 0x3f, 0x100e, 0x1}, 0x28) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000080)={'veth0\x00', 0x8000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x19a6cd877c230fb8) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 1.269431157s ago: executing program 3 (id=6310): r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000280)=0x10, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x0, 0x0, 0x1, 0x0, 0xb}]}, &(0x7f00000003c0)='syzkaller\x00', 0x2, 0x1005, &(0x7f0000001840)=""/4101}, 0x80) 1.268888787s ago: executing program 0 (id=6311): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0x1, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xe0, 0x3, 0x0, 0x0, 0x0, 0x4000000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000000, 0x2}}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000000000f37538e486dd630080fc5c082c00db5bffffffffff000000060300000023000000000000000000000000ac1414aa3b"], 0xfdef) r3 = getpid() (async) r4 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xd, 0x8, 0x7, 0x8, 0x0, 0x7, 0x82400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xdf0f, 0x8}, 0x4, 0xca10000000000000, 0xc5d, 0x4, 0x8, 0x472d, 0x2, 0x0, 0x4, 0x0, 0x1}, r3, 0xb, r4, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 1.207698317s ago: executing program 3 (id=6313): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x6, 0x8, 0x8, 0x40}, 0x50) (async) close(0x3) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) (async, rerun: 64) syz_clone(0x40900200, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 1.143709609s ago: executing program 0 (id=6314): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000001900000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'macvtap0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x112048}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000007000000000000feffffff711206000000000095"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="0000000000c94800000000000000000000000000007999976ab800cb3d40ead71939f12b61e16a4268299406a5cc516b775964326ebb53a252ee8fd5dae53c554f4adb475443b8a3b64c0e1a40a4f88c861e8e439573c3ce45de359536e0bab00034e313bdb700bba6401d3d38c8d8915bd77dcfbab541b06b9ddfed67e545bb9c626731bb3473c7283d0b7f59cef5889dc9a9abe14029af560232f8d1e26e9e718df2b1a65c2801c7c95f0ba4ea66c4c3265ea4501c8dfa01eefc093cc1eaf22787fe7c272f64400bcd2c1551d3faf3f517f0d2a8bb361488619e9035e4fa57f50a76b4375aaad7752457114212530338ce706f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 1.039157816s ago: executing program 2 (id=6315): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x9c, 0x0, 0x0, 0x0, 0x0, 0x5, 0x604, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, @perf_config_ext={0xfffffffffffffffd, 0xffffffffffffffff}, 0x4000000010c020, 0x0, 0x0, 0x0, 0x40001ff, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r2, 0x40047452, 0xf0ff1f00000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.025815598s ago: executing program 0 (id=6316): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x7602, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x8, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x5) 917.860306ms ago: executing program 0 (id=6317): bpf$MAP_CREATE(0x300000000000000, 0x0, 0x48) r0 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x102d3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x5}}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x13c2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x103e40, 0x1, 0x0, 0x0, 0x0, 0x40, 0xfc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0x4, 0x0, &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x541b, 0x200000000000) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x14, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0x1, 0x12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 648.414592ms ago: executing program 2 (id=6318): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000fcffffff000000000000210085000000360000009500070000000000b83f3584230b8f5ec8921327291cf4880dd3a91af830f8a476ba1b51d4eb67103b000000000000000000000000000000640f9922d207e93470686f20ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @fallback=0x14}, 0x39) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x2300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f0, &(0x7f0000000900)={'sit0\x00', @random="0060230c1100"}) 512.414034ms ago: executing program 2 (id=6319): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x6}, 0x94) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) close(0x3) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="0b00000008000000020000000900000001"], 0x50) (rerun: 64) bpf$PROG_LOAD(0x2, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) perf_event_open$cgroup(&(0x7f00000006c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, @perf_bp={0x0, 0xb}, 0x8825, 0x0, 0xfffffffc, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) (async) sendmsg$unix(r3, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 345.580872ms ago: executing program 2 (id=6320): perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x22092, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000540)}, 0x10205, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x520f5742}, 0x0, 0x4, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x4800, 0x2, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006b013600000000009500e40000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 344.851352ms ago: executing program 0 (id=6321): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000dc0)={&(0x7f0000000500)=@name={0x1e, 0x2, 0x0, {{0x42, 0x5}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x20000800) socketpair$unix(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10117, 0x0, 0xa0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05000000010000004000000005000000418110283ea96f4178000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000700), 0x5003, r4}, 0x38) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r5, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000340)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r6}, &(0x7f0000000040)=0x18, &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000580)={r4, &(0x7f0000000380), &(0x7f00000004c0)=""/172}, 0x20) recvmsg(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000300)) 305.502459ms ago: executing program 1 (id=6322): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x10, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {0x7, 0x0, 0xb, 0x7}}, @printk]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000001000000850000000c000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000200), &(0x7f00000003c0)=r2}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1a}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f00000009c0)="36b3118a"}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={@cgroup=r2, 0xb, 0x0, 0xfffeffff, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000380)='\x00', 0x0}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@map=0x1, r2, 0xd, 0x24, 0x0, @void, @void, @void, @value=r8, r7}, 0x20) 264.769976ms ago: executing program 3 (id=6323): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{0x1}, 0x0, &(0x7f00000005c0)}, 0x20) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x2, 0x6, 0x0, 0x0, 0x0, 0x10, 0x800, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_config_ext={0xffff, 0x800}, 0x1208, 0x7, 0x80, 0xc, 0x8, 0x7ff, 0x9, 0x0, 0xf, 0x0, 0x2417}, 0x0, 0xb, 0xffffffffffffffff, 0x9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_clone(0x100000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(r1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xdd, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffc9}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f37538e486dd6317ce623900fe800000002000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="1c00000000000300000000000000010045"], 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0ffffffffff0300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r2, 0xf, 0x1, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0]}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 264.508435ms ago: executing program 2 (id=6324): socketpair(0xa, 0x1, 0x6, &(0x7f0000000780)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8200, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2) 126.081409ms ago: executing program 3 (id=6325): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000380)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRES16=r0, @ANYRES64=r2, @ANYRES64=0x0], 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe738}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x7, 0xfffff008}, {0x6, 0x8, 0xfd}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000380)={0x0, r0}, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRES16=r0, @ANYRES64=r2, @ANYRES64=0x0], 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffe738}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x3800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) (async) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x7, 0xfffff008}, {0x6, 0x8, 0xfd}]}) (async) 543.35µs ago: executing program 0 (id=6326): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x6, 0xe, 0x5, 0x0, 0xaf, 0x80, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81b89573, 0x4, @perf_config_ext={0x1, 0xd30}, 0x64abfcba937175f1, 0x848, 0x9eb7, 0x5, 0x8, 0x1, 0x3ff, 0x0, 0x6, 0x0, 0x5}, 0xffffffffffffffff, 0x2, r0, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=6327): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'batadv_slave_0\x00', 0x400}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x9, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$TUNGETVNETLE(r1, 0x40047451, &(0x7f0000000180)) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xd, 0x8, 0x4, 0x1, 0x0, r5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r6, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)=r5}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r7, &(0x7f00000000c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.10' (ED25519) to the list of known hosts. [ 20.559782][ T24] audit: type=1400 audit(1776205908.540:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.563208][ T267] cgroup: Unknown subsys name 'net' [ 20.582708][ T24] audit: type=1400 audit(1776205908.540:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.609882][ T24] audit: type=1400 audit(1776205908.570:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.610408][ T267] cgroup: Unknown subsys name 'devices' [ 20.749583][ T267] cgroup: Unknown subsys name 'hugetlb' [ 20.755215][ T267] cgroup: Unknown subsys name 'rlimit' [ 20.953807][ T24] audit: type=1400 audit(1776205908.930:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.976991][ T24] audit: type=1400 audit(1776205908.930:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.000627][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.002415][ T24] audit: type=1400 audit(1776205908.930:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.033411][ T24] audit: type=1400 audit(1776205908.990:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.058933][ T24] audit: type=1400 audit(1776205908.990:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.058943][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.093296][ T24] audit: type=1400 audit(1776205909.010:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.118801][ T24] audit: type=1400 audit(1776205909.010:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.583273][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.590376][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.597855][ T276] device bridge_slave_0 entered promiscuous mode [ 21.605527][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.612703][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.620116][ T276] device bridge_slave_1 entered promiscuous mode [ 21.639561][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.646633][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.654110][ T275] device bridge_slave_0 entered promiscuous mode [ 21.661801][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.668957][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.676384][ T275] device bridge_slave_1 entered promiscuous mode [ 21.755542][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.762725][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.770158][ T277] device bridge_slave_0 entered promiscuous mode [ 21.779210][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.786266][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.793643][ T277] device bridge_slave_1 entered promiscuous mode [ 21.878555][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.885623][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.893048][ T278] device bridge_slave_0 entered promiscuous mode [ 21.901989][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.909064][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.916432][ T278] device bridge_slave_1 entered promiscuous mode [ 21.928056][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.935105][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.942682][ T279] device bridge_slave_0 entered promiscuous mode [ 21.951719][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.958825][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.966111][ T279] device bridge_slave_1 entered promiscuous mode [ 21.980634][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.987690][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.995133][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.002203][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.010181][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.017235][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.024468][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.031540][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.077752][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.084823][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.092104][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.099142][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.149963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.158125][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.165295][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.172528][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.180061][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.187737][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.194938][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.218648][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.226809][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.233865][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.241480][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.249903][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.257093][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.264871][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.272410][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.284038][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.301651][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.310083][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.317106][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.326212][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.346981][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.361811][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.370735][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.377802][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.385156][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.393597][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.400642][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.408063][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.416175][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.423232][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.432247][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.440042][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.453705][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.463546][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.479692][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.487683][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.513805][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.521801][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.530151][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.537185][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.545318][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.553464][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.560507][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.567893][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.575784][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.583737][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.591933][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.598983][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.606464][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.614709][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.621769][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.629446][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.644657][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.653083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.661772][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.670740][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.679255][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.687959][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.698689][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.706556][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.721200][ T275] device veth0_vlan entered promiscuous mode [ 22.728164][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.735623][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.743487][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.751536][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.759424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.767525][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.775489][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.784056][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.792600][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.800095][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.810569][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.818891][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.831703][ T278] device veth0_vlan entered promiscuous mode [ 22.838569][ T276] device veth0_vlan entered promiscuous mode [ 22.845378][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.853593][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.861946][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.869593][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.882581][ T275] device veth1_macvtap entered promiscuous mode [ 22.892231][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.900352][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.908514][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.916611][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.925359][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.934118][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.942645][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.954681][ T279] device veth0_vlan entered promiscuous mode [ 22.962986][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.971101][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.979438][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.987994][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.996282][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.003705][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.015473][ T277] device veth0_vlan entered promiscuous mode [ 23.023168][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.031484][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.040033][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.048486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.060385][ T279] device veth1_macvtap entered promiscuous mode [ 23.072264][ T276] device veth1_macvtap entered promiscuous mode [ 23.079074][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.086541][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.094237][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.102394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.110689][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.118411][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.126476][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.134893][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.144641][ T278] device veth1_macvtap entered promiscuous mode [ 23.157992][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 23.162269][ T277] device veth1_macvtap entered promiscuous mode [ 23.176532][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.194189][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.203378][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.211749][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.220312][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.228279][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.236507][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.244977][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.253408][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.261972][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.270299][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.278711][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.286932][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.295498][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.303839][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.312292][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.320572][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.361349][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.372327][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.383253][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.391617][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.414343][ T298] tap0: tun_chr_ioctl cmd 2147767520 [ 23.468820][ C1] hrtimer: interrupt took 16430 ns [ 24.251255][ T398] device syzkaller0 entered promiscuous mode [ 24.279283][ T400] device syzkaller0 entered promiscuous mode [ 24.501703][ T437] device syzkaller0 entered promiscuous mode [ 24.753756][ T467] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 24.806956][ T471] cgroup: syz.2.47 (471) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 24.867666][ T471] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.637895][ T24] kauditd_printk_skb: 41 callbacks suppressed [ 25.637905][ T24] audit: type=1400 audit(1776205913.610:115): avc: denied { create } for pid=500 comm="syz.3.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 26.364892][ T24] audit: type=1400 audit(1776205914.340:116): avc: denied { write } for pid=543 comm="syz.3.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.400442][ T544] ------------[ cut here ]------------ [ 26.416475][ T544] trace type BPF program uses run-time allocation [ 26.461600][ T24] audit: type=1400 audit(1776205914.440:117): avc: denied { cpu } for pid=550 comm="syz.2.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.491368][ T544] WARNING: CPU: 1 PID: 544 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 26.553456][ T544] Modules linked in: [ 26.562860][ T544] CPU: 1 PID: 544 Comm: syz.3.65 Not tainted syzkaller #0 [ 26.589380][ T544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 26.607297][ T544] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 26.614062][ T544] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 80 cf 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 26.647425][ T544] RSP: 0018:ffffc90007a87448 EFLAGS: 00010246 [ 26.656018][ T544] RAX: ef21a525ed159900 RBX: 0000000000000001 RCX: ffff888116803b40 [ 26.664614][ T544] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 26.681752][ T544] RBP: ffffc90007a87490 R08: ffff8881f7152fbf R09: 1ffff1103ee2a5f7 [ 26.690341][ T544] R10: dffffc0000000000 R11: ffffed103ee2a5f8 R12: ffff888113644000 [ 26.699185][ T544] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88811661a000 [ 26.707699][ T544] FS: 00007f24fca8a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 26.716718][ T544] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.723679][ T544] CR2: 00007fd78d63eff8 CR3: 000000011e7af000 CR4: 00000000003506b0 [ 26.732291][ T544] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.740850][ T544] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 26.749100][ T544] Call Trace: [ 26.752407][ T544] ? __fdget+0x1a1/0x230 [ 26.756866][ T544] resolve_pseudo_ldimm64+0x55e/0x1060 [ 26.763575][ T544] ? bpf_check+0xdb10/0xdb10 [ 26.768775][ T544] ? kvmalloc_node+0x88/0x130 [ 26.773779][ T544] bpf_check+0x9058/0xdb10 [ 26.778490][ T544] ? bpf_get_btf_vmlinux+0x60/0x60 [ 26.783827][ T544] ? is_bpf_text_address+0x177/0x190 [ 26.789340][ T544] ? selinux_bpf_prog_alloc+0x51/0x140 [ 26.794854][ T544] ? __kernel_text_address+0xa0/0x100 [ 26.800537][ T544] ? unwind_get_return_address+0x4d/0x90 [ 26.806237][ T544] ? stack_trace_save+0xf0/0xf0 [ 26.811205][ T544] ? arch_stack_walk+0xee/0x140 [ 26.816115][ T544] ? stack_trace_save+0xa6/0xf0 [ 26.825864][ T544] ? stack_trace_snprint+0xf0/0xf0 [ 26.831430][ T544] ? __kasan_slab_alloc+0x69/0xf0 [ 26.836538][ T544] ? selinux_bpf_prog_alloc+0x51/0x140 [ 26.842183][ T544] ? selinux_bpf_prog_alloc+0x51/0x140 [ 26.857296][ T544] ? __kasan_kmalloc+0xec/0x110 [ 26.862299][ T544] ? __kasan_kmalloc+0xda/0x110 [ 26.867169][ T544] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 26.873165][ T544] ? selinux_bpf_prog_alloc+0x51/0x140 [ 26.879204][ T544] ? security_bpf_prog_alloc+0x62/0x90 [ 26.884734][ T544] ? bpf_prog_load+0x9d8/0x14a0 [ 26.891201][ T544] ? __se_sys_bpf+0x49a/0x740 [ 26.895945][ T544] ? __x64_sys_bpf+0x7b/0x90 [ 26.900685][ T544] ? do_syscall_64+0x31/0x40 [ 26.917854][ T544] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 26.924077][ T544] ? memset+0x35/0x40 [ 26.940954][ T544] ? bpf_obj_name_cpy+0x193/0x1e0 [ 26.946016][ T544] bpf_prog_load+0xfca/0x14a0 [ 26.953377][ T544] ? map_freeze+0x320/0x320 [ 26.968869][ T544] ? selinux_bpf+0xc7/0xf0 [ 26.973311][ T544] ? security_bpf+0x82/0xa0 [ 26.997318][ T544] __se_sys_bpf+0x49a/0x740 [ 27.077545][ T544] ? __x64_sys_bpf+0x90/0x90 [ 27.082223][ T544] ? __fdget+0x1b3/0x230 [ 27.137342][ T544] ? __kasan_check_read+0x11/0x20 [ 27.158064][ T544] __x64_sys_bpf+0x7b/0x90 [ 27.162533][ T544] do_syscall_64+0x31/0x40 [ 27.207288][ T544] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.213220][ T544] RIP: 0033:0x7f24fe02f819 [ 27.227379][ T544] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 27.334248][ T544] RSP: 002b:00007f24fca8a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.392760][ T544] RAX: ffffffffffffffda RBX: 00007f24fe2a8fa0 RCX: 00007f24fe02f819 [ 27.447831][ T544] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 27.474330][ T544] RBP: 00007f24fe0c5c91 R08: 0000000000000000 R09: 0000000000000000 [ 27.482535][ T544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 27.549461][ T544] R13: 00007f24fe2a9038 R14: 00007f24fe2a8fa0 R15: 00007ffc826f7f58 [ 27.573031][ T544] ---[ end trace 8859d8f306001354 ]--- [ 27.936155][ T24] audit: type=1400 audit(1776205915.910:118): avc: denied { create } for pid=631 comm="syz.4.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 27.996965][ T24] audit: type=1400 audit(1776205915.940:119): avc: denied { tracepoint } for pid=631 comm="syz.4.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 28.167294][ T638] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.174561][ T638] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.388445][ T655] device syz_tun entered promiscuous mode [ 28.464055][ T24] audit: type=1400 audit(1776205916.440:120): avc: denied { read } for pid=656 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.685800][ T24] audit: type=1400 audit(1776205916.660:121): avc: denied { create } for pid=678 comm="syz.4.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 28.797898][ T691] device syzkaller0 entered promiscuous mode [ 28.819611][ T24] audit: type=1400 audit(1776205916.800:122): avc: denied { write } for pid=692 comm="syz.1.100" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.501562][ T24] audit: type=1400 audit(1776205917.480:123): avc: denied { create } for pid=711 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 29.799566][ T738] device syzkaller0 entered promiscuous mode [ 29.833482][ T24] audit: type=1400 audit(1776205917.810:124): avc: denied { create } for pid=739 comm="syz.3.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 30.483141][ T786] bridge0: port 3(veth1) entered blocking state [ 30.518784][ T786] bridge0: port 3(veth1) entered disabled state [ 30.583097][ T786] device veth1 entered promiscuous mode [ 30.637586][ T786] bridge0: port 3(veth1) entered blocking state [ 30.643911][ T786] bridge0: port 3(veth1) entered forwarding state [ 31.176620][ T24] kauditd_printk_skb: 1 callbacks suppressed [ 31.176631][ T24] audit: type=1400 audit(1776205919.150:126): avc: denied { create } for pid=805 comm="syz.3.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 31.399185][ T24] audit: type=1400 audit(1776205919.380:127): avc: denied { create } for pid=826 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 31.469906][ T24] audit: type=1400 audit(1776205919.410:128): avc: denied { create } for pid=826 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 31.615910][ T24] audit: type=1400 audit(1776205919.590:129): avc: denied { create } for pid=826 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 31.721202][ T824] device syzkaller0 entered promiscuous mode [ 32.460828][ T866] device syzkaller0 entered promiscuous mode [ 32.792418][ T24] audit: type=1400 audit(1776205920.770:130): avc: denied { create } for pid=875 comm="syz.4.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 33.378196][ T24] audit: type=1400 audit(1776205921.360:131): avc: denied { create } for pid=899 comm="syz.2.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 33.774105][ T24] audit: type=1400 audit(1776205921.750:132): avc: denied { ioctl } for pid=920 comm="syz.4.165" path="socket:[17041]" dev="sockfs" ino=17041 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 35.562267][ T971] geneve0: tun_chr_ioctl cmd 1074025677 [ 35.572418][ T971] geneve0: linktype set to 1 [ 35.756759][ T982] device syzkaller0 entered promiscuous mode [ 35.786107][ T24] audit: type=1400 audit(1776205923.760:133): avc: denied { create } for pid=984 comm="syz.0.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 36.844406][ T1024] ref_ctr_offset mismatch. inode: 0xc9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 37.233519][ T1050] device syzkaller0 entered promiscuous mode [ 37.737477][ T24] audit: type=1400 audit(1776205925.720:134): avc: denied { create } for pid=1098 comm="syz.2.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 38.796638][ T1150] Â: renamed from pim6reg1 [ 39.437845][ T1188] device syzkaller0 entered promiscuous mode [ 39.496774][ T24] audit: type=1400 audit(1776205927.470:135): avc: denied { create } for pid=1192 comm="syz.0.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 39.735275][ T1214] device syzkaller0 entered promiscuous mode [ 39.759161][ T24] audit: type=1400 audit(1776205927.740:136): avc: denied { create } for pid=1216 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.787746][ T1221] device veth1_macvtap left promiscuous mode [ 40.203642][ T24] audit: type=1400 audit(1776205928.180:137): avc: denied { setattr } for pid=1260 comm="syz.3.261" path="pipe:[14125]" dev="pipefs" ino=14125 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 40.352996][ T24] audit: type=1400 audit(1776205928.330:138): avc: denied { create } for pid=1268 comm="syz.2.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 40.948191][ T24] audit: type=1400 audit(1776205928.930:139): avc: denied { create } for pid=1301 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 42.250498][ T1348] tun0: tun_chr_ioctl cmd 2147767506 [ 43.015468][ T24] audit: type=1400 audit(1776205930.990:140): avc: denied { create } for pid=1361 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 43.155197][ T1366] syz.1.292[1366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.155282][ T1366] syz.1.292[1366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.688123][ T1395] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 43.712444][ T1395] device syzkaller0 entered promiscuous mode [ 43.795680][ T1411] device pim6reg1 entered promiscuous mode [ 43.808971][ T1411] device veth0_vlan left promiscuous mode [ 43.815449][ T1411] device veth0_vlan entered promiscuous mode [ 44.094755][ T1435] device syzkaller0 entered promiscuous mode [ 44.703397][ T1467] tap0: tun_chr_ioctl cmd 1074025673 [ 44.854609][ T24] audit: type=1400 audit(1776205932.830:141): avc: denied { create } for pid=1464 comm="syz.2.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 46.419750][ T1562] device syzkaller0 entered promiscuous mode [ 46.513094][ T1562] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.649003][ T24] audit: type=1400 audit(1776205934.630:142): avc: denied { create } for pid=1572 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 46.703556][ T1582] device syzkaller0 entered promiscuous mode [ 47.993599][ T1651] : port 1(ip6gretap0) entered blocking state [ 48.017448][ T1651] : port 1(ip6gretap0) entered disabled state [ 48.062746][ T1651] device ip6gretap0 entered promiscuous mode [ 48.092085][ T1648] device ip6gretap0 left promiscuous mode [ 48.120777][ T1648] : port 1(ip6gretap0) entered disabled state [ 48.426530][ T1672] device syzkaller0 entered promiscuous mode [ 49.052015][ T1699] device syzkaller0 entered promiscuous mode [ 51.056428][ T1834] : port 1(ip6gretap0) entered blocking state [ 51.087835][ T1834] : port 1(ip6gretap0) entered disabled state [ 51.154769][ T1834] device ip6gretap0 entered promiscuous mode [ 51.308760][ T1836] : renamed from bond_slave_0 [ 51.354632][ T1834] device ip6gretap0 left promiscuous mode [ 51.380625][ T1834] : port 1(ip6gretap0) entered disabled state [ 51.539600][ T24] audit: type=1400 audit(1776205939.520:143): avc: denied { ioctl } for pid=1854 comm="syz.3.427" path="net:[4026532365]" dev="nsfs" ino=4026532365 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 51.565868][ T1847] device syzkaller0 entered promiscuous mode [ 51.808474][ T1876] device wg2 entered promiscuous mode [ 52.657503][ T1952] syz.0.445 uses obsolete (PF_INET,SOCK_PACKET) [ 52.947709][ T1907] cgroup: fork rejected by pids controller in /syz4 [ 53.581686][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 53.591074][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.350481][ T2151] device syzkaller0 entered promiscuous mode [ 55.702028][ T24] audit: type=1400 audit(1776205943.680:144): avc: denied { create } for pid=2167 comm="syz.3.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 56.812543][ T2232] device syzkaller0 entered promiscuous mode [ 59.917567][ T2389] device syzkaller0 entered promiscuous mode [ 60.490085][ T24] audit: type=1400 audit(1776205948.470:145): avc: denied { create } for pid=2441 comm="syz.2.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 60.798856][ T2452] tap0: tun_chr_ioctl cmd 1074025677 [ 60.804241][ T2452] tap0: linktype set to 805 [ 60.859414][ T2446] tap0: tun_chr_ioctl cmd 1074025698 [ 62.647845][ T2559] tap0: tun_chr_ioctl cmd 1074812118 [ 64.967917][ T2640] device syzkaller0 entered promiscuous mode [ 65.949722][ T2669] : renamed from bond_slave_0 [ 68.372737][ T2833] tap0: tun_chr_ioctl cmd 35108 [ 69.308043][ T2968] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.317150][ T2968] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.628642][ T2975] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.635766][ T2975] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.643425][ T2975] device bridge_slave_0 entered promiscuous mode [ 69.650553][ T2975] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.667312][ T2975] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.675029][ T2975] device bridge_slave_1 entered promiscuous mode [ 69.760586][ T24] audit: type=1400 audit(1776205957.740:146): avc: denied { create } for pid=2975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.805482][ T24] audit: type=1400 audit(1776205957.760:147): avc: denied { write } for pid=2975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.826248][ T24] audit: type=1400 audit(1776205957.760:148): avc: denied { read } for pid=2975 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 69.826610][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.877170][ T24] audit: type=1400 audit(1776205957.850:149): avc: denied { create } for pid=3008 comm="syz.1.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 69.941575][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.018335][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.066682][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.120924][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.128040][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.185905][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.244183][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.299083][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.306197][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.313785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.322389][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.343579][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 70.351996][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.900327][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 70.908944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 70.916767][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 71.206585][ T2975] device veth0_vlan entered promiscuous mode [ 71.253888][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 71.277042][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 71.301997][ T2975] device veth1_macvtap entered promiscuous mode [ 71.314152][ T24] audit: type=1400 audit(1776205959.290:150): avc: denied { append } for pid=3035 comm="syz.1.722" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 71.345041][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 71.353751][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.362672][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.389284][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.399982][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 71.435184][ T3046] device syzkaller0 entered promiscuous mode [ 71.504722][ T3052] device syzkaller0 entered promiscuous mode [ 72.688084][ T9] device bridge_slave_1 left promiscuous mode [ 72.712937][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.770758][ T9] device bridge_slave_0 left promiscuous mode [ 72.804820][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.819508][ T9] device veth1_macvtap left promiscuous mode [ 72.825555][ T9] device veth0_vlan left promiscuous mode [ 72.976228][ T3125] @0Ù: renamed from bond_slave_1 [ 73.285874][ T3159] device syzkaller0 entered promiscuous mode [ 74.441582][ T3229] device wg2 entered promiscuous mode [ 74.513890][ T3227] device syzkaller0 entered promiscuous mode [ 74.583182][ T3243] syz.4.773[3243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.637815][ T3257] device syzkaller0 entered promiscuous mode [ 75.053940][ T3297] tap0: tun_chr_ioctl cmd 1074812118 [ 75.234781][ T3304] tun0: tun_chr_ioctl cmd 2147767506 [ 75.241994][ T3305] tun0: tun_chr_ioctl cmd 1074025684 [ 75.434909][ T24] audit: type=1400 audit(1776205963.410:151): avc: denied { create } for pid=3316 comm="syz.3.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 76.549102][ T3361] syz.2.807[3361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.549156][ T3361] syz.2.807[3361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.563185][ T24] audit: type=1400 audit(1776205966.540:152): avc: denied { create } for pid=3463 comm="syz.2.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 80.680083][ T3583] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.690207][ T3583] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.889213][ T3607] device wg2 left promiscuous mode [ 81.157599][ T3607] device wg2 entered promiscuous mode [ 81.770360][ T3661] device syzkaller0 entered promiscuous mode [ 81.848609][ T3661] syzkaller0: tun_net_xmit 1280 [ 81.896636][ T3661] device pim6reg1 entered promiscuous mode [ 82.000314][ T3680] device syzkaller0 entered promiscuous mode [ 83.602459][ T3783] device wg2 entered promiscuous mode [ 85.099593][ T3912] device syzkaller0 entered promiscuous mode [ 85.202160][ T3927] device syzkaller0 entered promiscuous mode [ 85.720912][ T3940] device sit0 entered promiscuous mode [ 86.478134][ T3977] syz.3.988[3977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.478185][ T3977] syz.3.988[3977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.718010][ T3987] device syzkaller0 entered promiscuous mode [ 88.708981][ T4083] device wg2 left promiscuous mode [ 88.785849][ T4076] device wg2 entered promiscuous mode [ 90.176517][ T4155] device syzkaller0 entered promiscuous mode [ 90.193789][ T4159] syzkaller0: create flow: hash 3613220786 index 0 [ 90.234869][ T1893] syzkaller0: tun_net_xmit 48 [ 90.387366][ T4155] syzkaller0 (unregistered): delete flow: hash 3613220786 index 0 [ 90.659976][ T4185] device syzkaller0 entered promiscuous mode [ 91.098259][ T4216] tap0: tun_chr_ioctl cmd 1074025677 [ 91.149619][ T4216] tap0: linktype set to 778 [ 91.293861][ T4215] cgroup: fork rejected by pids controller in /syz1 [ 92.007951][ T24] audit: type=1400 audit(1776205979.990:153): avc: denied { create } for pid=4346 comm="syz.3.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 92.061542][ T24] audit: type=1400 audit(1776205980.020:154): avc: denied { create } for pid=4346 comm="syz.3.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 92.803136][ T24] audit: type=1400 audit(1776205980.770:155): avc: denied { create } for pid=4381 comm="syz.0.1076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 93.764142][ T4393] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.867371][ T4393] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.875019][ T4393] device bridge_slave_0 entered promiscuous mode [ 93.912818][ T4393] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.939645][ T4393] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.947444][ T4393] device bridge_slave_1 entered promiscuous mode [ 94.272106][ T9] device bridge_slave_1 left promiscuous mode [ 94.281803][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.358645][ T9] device bridge_slave_0 left promiscuous mode [ 94.364809][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.402168][ T24] audit: type=1400 audit(1776205982.380:156): avc: denied { create } for pid=4434 comm="syz.4.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 94.423081][ T9] device veth1_macvtap left promiscuous mode [ 94.457463][ T9] device veth0_vlan left promiscuous mode [ 94.883201][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.899047][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.951106][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 94.995853][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 95.057436][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.064508][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.142449][ T24] audit: type=1400 audit(1776205983.120:157): avc: denied { create } for pid=4449 comm="syz.0.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 95.178021][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 95.225445][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 95.271629][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 95.317607][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.324681][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.381568][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 95.395824][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 95.409368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 95.418051][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 95.459431][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 95.468372][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 95.483653][ T4393] device veth0_vlan entered promiscuous mode [ 95.490675][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 95.499114][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.507409][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.514917][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.524051][ T4466] device syzkaller0 left promiscuous mode [ 95.537753][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 95.548758][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 95.558140][ T4393] device veth1_macvtap entered promiscuous mode [ 95.572111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 95.580995][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 95.590225][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 95.613835][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 95.641589][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.661469][ T24] audit: type=1400 audit(1776205983.640:158): avc: denied { read } for pid=4483 comm="syz.3.1104" dev="nsfs" ino=4026532365 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 95.688328][ T24] audit: type=1400 audit(1776205983.640:159): avc: denied { open } for pid=4483 comm="syz.3.1104" path="net:[4026532365]" dev="nsfs" ino=4026532365 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 95.739723][ T4484] bridge0: port 4(veth0_to_team) entered blocking state [ 95.774515][ T4484] bridge0: port 4(veth0_to_team) entered disabled state [ 95.788700][ T4484] device veth0_to_team entered promiscuous mode [ 95.820209][ T4485] device syzkaller0 entered promiscuous mode [ 96.818173][ T4529] device wg2 entered promiscuous mode [ 96.953834][ T4527] device syzkaller0 entered promiscuous mode [ 97.405814][ T4549] device syzkaller0 entered promiscuous mode [ 97.533028][ T4555] tap0: tun_chr_ioctl cmd 2147767520 [ 97.682609][ T4559] device wg2 left promiscuous mode [ 97.727636][ T4564] device wg2 entered promiscuous mode [ 98.358181][ T4615] device syzkaller0 left promiscuous mode [ 98.742780][ T4627] device syzkaller0 entered promiscuous mode [ 99.385699][ T4663] device syzkaller0 entered promiscuous mode [ 99.985429][ T24] audit: type=1400 audit(1776205987.960:160): avc: denied { write } for pid=4705 comm="syz.0.1169" name="cgroup.subtree_control" dev="cgroup2" ino=272 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.111000][ T24] audit: type=1400 audit(1776205987.970:161): avc: denied { open } for pid=4705 comm="syz.0.1169" path="" dev="cgroup2" ino=272 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 100.879813][ T4797] syzkaller0: mtu greater than device maximum [ 103.006613][ T4902] device wg2 left promiscuous mode [ 103.043143][ T4902] device wg2 entered promiscuous mode [ 103.135831][ T4906] device syzkaller0 entered promiscuous mode [ 103.502065][ T4921] device syzkaller0 entered promiscuous mode [ 104.119617][ T4968] device syzkaller0 entered promiscuous mode [ 104.689185][ T24] audit: type=1400 audit(1776205992.670:162): avc: denied { create } for pid=4987 comm="syz.2.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 104.916617][ T5009] syz.2.1260[5009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.916700][ T5009] syz.2.1260[5009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.071183][ T24] audit: type=1400 audit(1776205993.050:163): avc: denied { ioctl } for pid=5013 comm="syz.0.1261" path="net:[4026532447]" dev="nsfs" ino=4026532447 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 105.241609][ T5006] tap0: tun_chr_ioctl cmd 1074025677 [ 105.247064][ T5006] tap0: linktype set to 805 [ 106.464878][ T5097] device veth1 left promiscuous mode [ 106.475486][ T5097] bridge0: port 3(veth1) entered disabled state [ 107.611120][ T5163] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 108.528087][ T5261] device team_slave_1 entered promiscuous mode [ 108.549343][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 108.568402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 108.786782][ T5286] device dummy0 entered promiscuous mode [ 108.879571][ T24] audit: type=1400 audit(1776205996.860:164): avc: denied { create } for pid=5295 comm="syz.0.1357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 109.646377][ T5365] device veth1_macvtap left promiscuous mode [ 109.658550][ T5365] device veth1_macvtap entered promiscuous mode [ 109.664894][ T5365] device macsec0 entered promiscuous mode [ 110.412513][ T5436] device wg2 entered promiscuous mode [ 111.686682][ T5502] device syzkaller0 entered promiscuous mode [ 111.881249][ T5522] device syzkaller0 entered promiscuous mode [ 112.886254][ T5575] device syzkaller0 entered promiscuous mode [ 113.280607][ T5591] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.287834][ T5591] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.389811][ T5591] device bridge_slave_1 left promiscuous mode [ 113.415002][ T5591] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.467544][ T5591] device bridge_slave_0 left promiscuous mode [ 113.485142][ T5591] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.808961][ T5608] device sit0 entered promiscuous mode [ 114.201062][ T5633] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.208287][ T5633] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.271781][ T5633] device bridge_slave_1 left promiscuous mode [ 114.280434][ T5633] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.316460][ T5633] device bridge_slave_0 left promiscuous mode [ 114.328038][ T5633] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.564471][ T5673] -: renamed from syzkaller0 [ 114.836431][ T5701] device syzkaller0 entered promiscuous mode [ 115.480459][ T5725] device syzkaller0 entered promiscuous mode [ 115.549033][ T5732] device syzkaller0 left promiscuous mode [ 115.662102][ T5723] device bridge_slave_1 left promiscuous mode [ 115.690669][ T5723] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.746634][ T5723] device bridge_slave_0 left promiscuous mode [ 115.771323][ T5723] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.122575][ T5749] device syzkaller0 entered promiscuous mode [ 116.504915][ T5782] device syzkaller0 entered promiscuous mode [ 117.377953][ T5856] device syzkaller0 left promiscuous mode [ 117.888450][ T5898] syz.3.1532[5898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 117.888514][ T5898] syz.3.1532[5898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 118.141931][ T5916] device syzkaller0 entered promiscuous mode [ 118.906014][ T5950] device bridge_slave_1 left promiscuous mode [ 118.913713][ T5950] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.923314][ T5950] device bridge_slave_0 left promiscuous mode [ 118.929678][ T5950] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.965794][ T6055] device syzkaller0 entered promiscuous mode [ 121.675143][ T6090] device syzkaller0 entered promiscuous mode [ 122.105121][ T6135] device wg2 left promiscuous mode [ 122.339941][ T6144] device syzkaller0 entered promiscuous mode [ 123.845124][ T6274] device wg2 left promiscuous mode [ 124.236068][ T6310] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 125.793370][ T6412] device syzkaller0 entered promiscuous mode [ 126.313609][ T6437] device wg2 left promiscuous mode [ 128.249451][ T6545] device syzkaller0 entered promiscuous mode [ 130.013266][ T6645] device syzkaller0 entered promiscuous mode [ 130.274661][ T6654] tap0: tun_chr_ioctl cmd 1074025675 [ 130.320657][ T6654] tap0: persist enabled [ 130.402370][ T6645] tap0: tun_chr_ioctl cmd 1074025675 [ 130.411710][ T6645] tap0: persist disabled [ 130.760434][ T6712] device syzkaller0 entered promiscuous mode [ 131.431437][ T6759] device wg2 left promiscuous mode [ 131.475268][ T6761] device wg2 entered promiscuous mode [ 131.543340][ T6760] device pim6reg1 entered promiscuous mode [ 133.567863][ T6893] device syzkaller0 entered promiscuous mode [ 134.271408][ T6928] device sit0 left promiscuous mode [ 134.756891][ T6946] device sit0 left promiscuous mode [ 134.768953][ T6947] ªªªªªª™™: renamed from vlan0 [ 134.895038][ T6959] device syzkaller0 entered promiscuous mode [ 135.444302][ T7010] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.466818][ T7010] device bridge0 entered promiscuous mode [ 135.534391][ T7016] device vlan0 entered promiscuous mode [ 136.699408][ T24] audit: type=1400 audit(1776206024.680:165): avc: denied { create } for pid=7071 comm="syz.4.1864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 136.764655][ T7075] device syzkaller0 entered promiscuous mode [ 137.543062][ T7137] device wg2 entered promiscuous mode [ 141.075814][ T7405] device syzkaller0 entered promiscuous mode [ 141.684699][ T7441] device syzkaller0 entered promiscuous mode [ 145.162315][ T7624] batadv0: tun_chr_ioctl cmd 2148553947 [ 145.743738][ T7639] device wg2 left promiscuous mode [ 145.820711][ T7639] device wg2 entered promiscuous mode [ 147.362417][ T7697] device syzkaller0 entered promiscuous mode [ 147.715725][ T7705] device veth1 entered promiscuous mode [ 151.332673][ T7853] device veth0_vlan left promiscuous mode [ 151.351081][ T7853] device veth0_vlan entered promiscuous mode [ 151.385171][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 151.393944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 151.401944][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.934829][ T8003] syz.1.2128[8003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.936315][ T8003] syz.1.2128[8003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.688438][ T8015] device syzkaller0 entered promiscuous mode [ 156.146951][ T8043] device syzkaller0 entered promiscuous mode [ 158.761751][ T8177] device syzkaller0 left promiscuous mode [ 159.354426][ T8232] device syzkaller0 entered promiscuous mode [ 159.987940][ T8299] device syzkaller0 entered promiscuous mode [ 160.705424][ T8352] IPv6: pim6reg1: Disabled Multicast RS [ 160.806403][ T8364] device syzkaller0 entered promiscuous mode [ 162.605723][ T8446] device syzkaller0 entered promiscuous mode [ 165.230460][ T8605] device syzkaller0 entered promiscuous mode [ 165.645059][ T8644] device syzkaller0 entered promiscuous mode [ 166.899406][ T8697] device syzkaller0 entered promiscuous mode [ 168.159558][ T8757] device wg2 entered promiscuous mode [ 168.213358][ T8772] -1: renamed from syzkaller0 [ 168.345557][ T8786] device syzkaller0 entered promiscuous mode [ 168.444759][ T8784] device syzkaller0 entered promiscuous mode [ 168.788471][ T8830] device syzkaller0 entered promiscuous mode [ 170.140915][ T8883] device syzkaller0 entered promiscuous mode [ 171.154206][ T8901] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 171.252812][ T8901] device syzkaller0 entered promiscuous mode [ 172.004883][ T8943] device syzkaller0 entered promiscuous mode [ 172.589627][ T8999] -1: renamed from syzkaller0 [ 174.407214][ T9126] : port 1(ip6gretap0) entered blocking state [ 174.413422][ T9126] : port 1(ip6gretap0) entered disabled state [ 174.490798][ T9126] device ip6gretap0 entered promiscuous mode [ 175.364296][ T9177] device syzkaller0 entered promiscuous mode [ 176.966251][ T9265] device bridge0 left promiscuous mode [ 177.731776][ T9318] device syzkaller0 entered promiscuous mode [ 178.579361][ T9394] device syzkaller0 entered promiscuous mode [ 178.827616][ T9407] device syzkaller0 entered promiscuous mode [ 179.607020][ T9455] device syzkaller0 entered promiscuous mode [ 180.407802][ T9490] device syzkaller0 entered promiscuous mode [ 181.899856][ T24] audit: type=1400 audit(1776206069.880:166): avc: denied { create } for pid=9635 comm="syz.4.2599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 182.978090][ T9688] device syzkaller0 entered promiscuous mode [ 183.038908][ T9692] tun0: tun_chr_ioctl cmd 2147767506 [ 183.210937][ T9712] device syzkaller0 entered promiscuous mode [ 183.261882][ T9717] device dummy0 entered promiscuous mode [ 183.276670][ T9717] IPv6: ADDRCONF(NETDEV_CHANGE): dummy0: link becomes ready [ 183.721925][ T9739] gretap0: mtu less than device minimum [ 183.805612][ T9748] device macsec0 entered promiscuous mode [ 184.084877][ T9776] device syzkaller0 entered promiscuous mode [ 184.308047][ T9799] device syzkaller0 entered promiscuous mode [ 184.431474][ T9796] device sit0 entered promiscuous mode [ 184.860193][ T9810] device syzkaller0 entered promiscuous mode [ 185.500209][ T9847] device sit0 entered promiscuous mode [ 185.608485][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.630229][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.643923][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.813631][ T9923] syz.3.2686[9923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.813689][ T9923] syz.3.2686[9923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.188086][ T9932] : port 1(ip6gretap0) entered blocking state [ 187.254424][ T9932] : port 1(ip6gretap0) entered disabled state [ 187.275437][ T9932] device ip6gretap0 entered promiscuous mode [ 187.284039][ T9938] ªªªªª»: renamed from bond_slave_0 [ 187.326727][ T9926] device ip6gretap0 left promiscuous mode [ 187.355523][ T9926] : port 1(ip6gretap0) entered disabled state [ 187.821250][ T9965] device syzkaller0 entered promiscuous mode [ 188.726255][T10017] : port 1(ip6gretap0) entered blocking state [ 188.733094][T10017] : port 1(ip6gretap0) entered disabled state [ 188.749654][T10017] device ip6gretap0 entered promiscuous mode [ 189.011724][T10030] device syzkaller0 entered promiscuous mode [ 189.089261][T10028] device syzkaller0 left promiscuous mode [ 189.842589][ T24] audit: type=1400 audit(1776206077.820:167): avc: denied { create } for pid=10097 comm="syz.0.2735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 189.960938][T10083] device syzkaller0 entered promiscuous mode [ 190.603105][T10131] device syzkaller0 entered promiscuous mode [ 190.609700][ T24] audit: type=1400 audit(1776206078.590:168): avc: denied { mounton } for pid=10133 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 190.958398][T10133] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.965507][T10133] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.973376][T10133] device bridge_slave_0 entered promiscuous mode [ 190.980541][T10133] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.988005][T10133] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.006454][T10133] device bridge_slave_1 entered promiscuous mode [ 191.067213][ T24] audit: type=1400 audit(1776206079.030:169): avc: denied { attach_queue } for pid=10152 comm="syz.0.2751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 191.523864][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.533127][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.568947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.591435][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.602772][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.609876][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.618424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.626818][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.635316][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.642385][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.697398][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.722324][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.744327][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.788520][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.831253][T10133] device veth0_vlan entered promiscuous mode [ 191.842580][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.851904][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.859502][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.905203][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.914743][T10133] device veth1_macvtap entered promiscuous mode [ 191.940233][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.954081][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.994887][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.003779][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.024364][T10218] device wg2 left promiscuous mode [ 192.049377][ T24] audit: type=1400 audit(1776206080.030:170): avc: denied { unmount } for pid=10133 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 192.214344][T10233] device syzkaller0 left promiscuous mode [ 192.357618][T10251] device vlan0 entered promiscuous mode [ 192.369352][T10241] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.376497][T10241] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.438347][T10241] device bridge_slave_0 entered promiscuous mode [ 192.446330][T10241] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.453454][T10241] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.461234][T10241] device bridge_slave_1 entered promiscuous mode [ 192.728217][T10306] device syzkaller0 entered promiscuous mode [ 192.756780][T10241] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.763872][T10241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.771173][T10241] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.778244][T10241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.831454][ T394] device veth1_macvtap left promiscuous mode [ 192.847472][ T394] device veth0_vlan left promiscuous mode [ 193.156839][T10296] device syzkaller0 entered promiscuous mode [ 193.200410][T10343] device syzkaller0 entered promiscuous mode [ 193.217899][ T1456] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.227473][ T1456] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.255154][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.267015][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.274957][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.283431][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.298117][ T1456] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.305187][ T1456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.312747][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.321951][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.330444][ T1456] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.337504][ T1456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.375778][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.384027][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.392314][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.400806][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.436953][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.447954][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.470883][T10241] device veth0_vlan entered promiscuous mode [ 193.477128][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.497704][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.508420][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.515889][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.537125][T10241] device veth1_macvtap entered promiscuous mode [ 193.591751][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.610762][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.623389][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.631331][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 193.639828][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.659027][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.668670][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.156531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 194.219055][ T24] audit: type=1400 audit(1776206082.200:171): avc: denied { create } for pid=10426 comm="syz.3.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 194.853318][T10451] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.860477][T10451] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.868488][T10451] device bridge_slave_0 entered promiscuous mode [ 194.876856][T10451] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.884608][T10451] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.892704][T10451] device bridge_slave_1 entered promiscuous mode [ 195.064484][T10451] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.071588][T10451] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.078908][T10451] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.085952][T10451] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.163166][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.177301][ T313] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.184801][ T313] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.229980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.240121][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.247197][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.291934][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.300484][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.307564][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.353807][T10486] syz.0.2833[10486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.353861][T10486] syz.0.2833[10486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.518875][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.540656][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.555071][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.572060][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.587532][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 195.604731][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.666694][T10451] device veth0_vlan entered promiscuous mode [ 195.703075][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 195.713299][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.740674][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.748563][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.073742][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.105169][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.122925][T10451] device veth1_macvtap entered promiscuous mode [ 196.191192][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.199991][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.230159][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.243431][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.251763][ T1456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.472536][ T394] device veth1_macvtap left promiscuous mode [ 196.480480][ T394] device veth0_vlan left promiscuous mode [ 196.537764][T10537] syz.3.2848[10537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.537847][T10537] syz.3.2848[10537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.883475][T10565] device wg2 entered promiscuous mode [ 199.272384][T10719] device ip6gretap0 left promiscuous mode [ 199.302559][T10719] : port 1(ip6gretap0) entered disabled state [ 204.410777][T11050] device syzkaller0 entered promiscuous mode [ 205.214756][ T24] audit: type=1400 audit(1776206093.190:172): avc: denied { associate } for pid=11070 comm="syz.3.2997" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 205.419824][T11074] -1: renamed from syzkaller0 [ 207.453938][T11152] nr0: port 1(macsec0) entered blocking state [ 207.507824][T11152] nr0: port 1(macsec0) entered disabled state [ 207.527657][T11152] device macsec0 entered promiscuous mode [ 207.674618][T11162] device syzkaller0 entered promiscuous mode [ 208.034042][T11190] â6±ÿ: renamed from team_slave_1 [ 208.534098][T11222] device syzkaller0 entered promiscuous mode [ 208.866191][T11251] : renamed from bond_slave_0 [ 211.125728][T11351] device syzkaller0 entered promiscuous mode [ 212.172632][T11396] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 212.211104][T11396] device syzkaller0 entered promiscuous mode [ 213.082260][T11412] device syzkaller0 entered promiscuous mode [ 215.134418][T11546] syz.3.3131[11546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.134464][T11546] syz.3.3131[11546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.642650][T11571] device syzkaller0 entered promiscuous mode [ 216.830403][T11643] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 216.848579][T11643] syzkaller0: linktype set to 773 [ 219.112439][T11787] device veth1_macvtap left promiscuous mode [ 219.123191][T11787] device macsec0 left promiscuous mode [ 220.474808][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.482308][T11867] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.489854][T11867] device bridge_slave_0 entered promiscuous mode [ 220.496883][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.504436][T11867] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.512116][T11867] device bridge_slave_1 entered promiscuous mode [ 220.579986][T11867] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.587079][T11867] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.594383][T11867] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.601486][T11867] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.646326][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.655939][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.664040][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.699791][T11881] tap0: tun_chr_ioctl cmd 35111 [ 220.704839][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.734163][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.741233][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.839794][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.867761][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.874867][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.926820][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.946911][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.991352][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.012568][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.035126][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.042834][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.051847][T11867] device veth0_vlan entered promiscuous mode [ 221.105132][T11898] device veth0_vlan left promiscuous mode [ 221.111607][T11898] device veth0_vlan entered promiscuous mode [ 221.124066][T11867] device veth1_macvtap entered promiscuous mode [ 221.136299][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.171391][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.188940][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.306245][T11920] device syzkaller0 entered promiscuous mode [ 221.449386][T11925] device syzkaller0 entered promiscuous mode [ 222.831900][T11996] device wg2 entered promiscuous mode [ 223.150932][ T24] audit: type=1400 audit(1776206111.130:173): avc: denied { create } for pid=12029 comm="syz.3.3274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 224.207834][T12067] device wg2 left promiscuous mode [ 226.885253][T12210] device wg2 entered promiscuous mode [ 227.259182][T12213] device syzkaller0 entered promiscuous mode [ 227.420927][T12219] device syzkaller0 entered promiscuous mode [ 227.457623][T12230] syz.1.3333[12230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.457701][T12230] syz.1.3333[12230] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.750130][T12257] nr0: port 1(macsec0) entered blocking state [ 227.787072][T12257] nr0: port 1(macsec0) entered disabled state [ 227.988400][T12257] device macsec0 entered promiscuous mode [ 229.456606][T12341] device syzkaller0 entered promiscuous mode [ 230.038199][T12387] batadv0: tun_chr_ioctl cmd 1074025692 [ 230.114725][T12395] batadv0: tun_chr_ioctl cmd 21731 [ 230.552278][T12407] batadv0: tun_chr_ioctl cmd 21731 [ 232.580345][T12479] device veth1_macvtap left promiscuous mode [ 232.612028][T12479] device veth1_macvtap entered promiscuous mode [ 232.628056][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 233.319117][T12515] device syzkaller0 entered promiscuous mode [ 233.696020][T12533] device veth1_macvtap left promiscuous mode [ 233.974238][T10241] cgroup: fork rejected by pids controller in /syz2 [ 234.016630][T12574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.026476][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 234.034859][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 234.042305][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 234.247942][T12596] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.256030][T12596] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.264094][T12596] device bridge_slave_0 entered promiscuous mode [ 234.323852][T12596] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.417292][T12596] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.424777][T12596] device bridge_slave_1 entered promiscuous mode [ 234.722803][T12616] device veth1_macvtap left promiscuous mode [ 234.769816][T12616] device veth1_macvtap entered promiscuous mode [ 234.791902][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 234.986051][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.999668][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.123637][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.133295][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.147004][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.154100][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.170633][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.191689][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.204494][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.221488][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.228592][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.254770][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.265179][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.287252][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.307990][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.345301][T12596] device veth0_vlan entered promiscuous mode [ 235.360366][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.407853][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.472535][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 235.513830][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.555979][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.616432][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.901011][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.957586][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 236.129029][T12596] device veth1_macvtap entered promiscuous mode [ 236.277108][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 236.299224][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 236.347540][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 236.376447][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.397363][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.720002][T12656] device wg2 entered promiscuous mode [ 237.156277][ T1456] nr0: port 1(macsec0) entered disabled state [ 237.177463][ T1456] device bridge_slave_1 left promiscuous mode [ 237.226634][ T1456] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.272652][ T1456] device bridge_slave_0 left promiscuous mode [ 237.323386][ T1456] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.379480][ T1456] device veth1_macvtap left promiscuous mode [ 237.385621][ T1456] device veth0_vlan left promiscuous mode [ 239.073233][T12782] device syzkaller0 entered promiscuous mode [ 239.647481][T12822] device syzkaller0 entered promiscuous mode [ 239.945123][T12834] device syzkaller0 entered promiscuous mode [ 241.252162][T12909] device syzkaller0 entered promiscuous mode [ 241.897376][T12941] device aaaaaaaaaaaaaaa entered promiscuous mode [ 242.601209][T12971] device syzkaller0 entered promiscuous mode [ 243.620452][T13008] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 243.646597][T13008] pim6reg0: linktype set to 768 [ 244.826163][T13088] device syzkaller0 entered promiscuous mode [ 244.882607][T13084] ref_ctr_offset mismatch. inode: 0x189 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 244.895746][T13090] device syzkaller0 entered promiscuous mode [ 248.945088][T13247] device syzkaller0 entered promiscuous mode [ 249.720024][T13289] syz.3.3640[13289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.724600][T13289] syz.3.3640[13289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.435359][ T24] audit: type=1400 audit(1776206139.410:174): avc: denied { setattr } for pid=13351 comm="syz.3.3657" path="/dev/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 253.066832][T13412] device syzkaller0 entered promiscuous mode [ 253.369858][T13419] device wg2 entered promiscuous mode [ 253.879122][T13442] device sit0 entered promiscuous mode [ 254.144259][T13454] device syzkaller0 entered promiscuous mode [ 255.447719][T13537] device syzkaller0 entered promiscuous mode [ 255.455154][T13537] device syzkaller0 left promiscuous mode [ 255.533069][T13545] device veth1_macvtap left promiscuous mode [ 256.493166][T13579] device sit0 entered promiscuous mode [ 257.327794][T13619] device wg2 left promiscuous mode [ 257.397538][T13624] device wg2 entered promiscuous mode [ 257.989391][T13674] batadv0: tun_chr_ioctl cmd 1074025677 [ 258.007267][T13674] batadv0: linktype set to 776 [ 258.389051][T13699] device syzkaller0 entered promiscuous mode [ 258.416907][T13699] syzkaller0: create flow: hash 3613220786 index 0 [ 258.427737][T13701] device veth1_macvtap left promiscuous mode [ 258.435269][ T8265] syzkaller0: tun_net_xmit 48 [ 258.540374][T13699] syzkaller0 (unregistered): delete flow: hash 3613220786 index 0 [ 259.649162][ T24] audit: type=1400 audit(1776206147.630:175): avc: denied { create } for pid=13760 comm="syz.1.3782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 259.705279][T13762] device syzkaller0 entered promiscuous mode [ 259.772093][T13762] syzkaller0: create flow: hash 4020662376 index 2 [ 259.848338][T13760] syzkaller0: delete flow: hash 4020662376 index 2 [ 260.791916][T13808] device sit0 left promiscuous mode [ 260.813976][T13812] nr0: port 1(macsec0) entered blocking state [ 260.820794][T13812] nr0: port 1(macsec0) entered disabled state [ 260.827438][T13812] device macsec0 entered promiscuous mode [ 260.840578][T13810] syz.1.3796[13810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.840629][T13810] syz.1.3796[13810] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.988779][T13825] device sit0 left promiscuous mode [ 261.040942][T13839] device veth1 left promiscuous mode [ 262.136286][T13946] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 262.162501][T13946] syzkaller0: linktype set to 773 [ 262.542642][T13953] device syzkaller0 entered promiscuous mode [ 263.070868][T13958] device syzkaller0 entered promiscuous mode [ 265.467031][T14091] tap0: tun_chr_ioctl cmd 1074025677 [ 265.474965][T14091] tap0: linktype set to 270 [ 267.253158][T14193] device syzkaller0 entered promiscuous mode [ 267.687447][T14224] syz.0.3922[14224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.687519][T14224] syz.0.3922[14224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.777699][T14237] device syzkaller0 entered promiscuous mode [ 268.030265][T14265] syz.3.3934[14265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.030314][T14265] syz.3.3934[14265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.359761][T14300] : port 1(ip6gretap0) entered blocking state [ 268.417181][T14300] : port 1(ip6gretap0) entered disabled state [ 268.423911][T14300] device ip6gretap0 entered promiscuous mode [ 268.453584][T14296] device ip6gretap0 left promiscuous mode [ 268.468078][T14296] : port 1(ip6gretap0) entered disabled state [ 268.526262][T14305] device syzkaller0 entered promiscuous mode [ 268.533045][T14306] device veth1_macvtap entered promiscuous mode [ 268.540349][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.406472][T14357] syz.2.3960[14357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.406548][T14357] syz.2.3960[14357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 270.474782][T14386] device syzkaller0 entered promiscuous mode [ 270.568727][T14373] device syzkaller0 entered promiscuous mode [ 275.693388][T14602] device syzkaller0 entered promiscuous mode [ 275.976614][T14612] device syzkaller0 entered promiscuous mode [ 277.280452][T14665] device syzkaller0 entered promiscuous mode [ 277.725864][T14689] device syzkaller0 entered promiscuous mode [ 278.007578][T14718] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.141850][T14727] device veth1_macvtap left promiscuous mode [ 278.450852][T14740] device syzkaller0 entered promiscuous mode [ 279.270743][T14806] tap0: tun_chr_ioctl cmd 1074025677 [ 279.281032][T14806] tap0: linktype set to 805 [ 279.500086][T14813] device syzkaller0 entered promiscuous mode [ 281.624187][T14858] sit0: mtu greater than device maximum [ 282.567338][T14898] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.585815][T14898] device bridge0 entered promiscuous mode [ 282.634655][T14899] device syzkaller0 entered promiscuous mode [ 282.702323][T14907] device syzkaller0 entered promiscuous mode [ 283.827544][T14973] device syzkaller0 entered promiscuous mode [ 284.963063][T15053] device syzkaller0 entered promiscuous mode [ 286.475244][T15130] device syzkaller0 entered promiscuous mode [ 286.980898][T15161] device syzkaller0 entered promiscuous mode [ 289.736599][T15306] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.743708][T15306] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.757324][T15306] device bridge_slave_0 entered promiscuous mode [ 289.878198][T15306] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.885300][T15306] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.911978][T15306] device bridge_slave_1 entered promiscuous mode [ 290.195861][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.214386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.260687][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.284223][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.323087][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.330237][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.370252][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.397368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.422972][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.430216][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.502848][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.521212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.551777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.578744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.606163][T15306] device veth0_vlan entered promiscuous mode [ 290.621058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.663271][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.690103][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.711450][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.743529][T15306] device veth1_macvtap entered promiscuous mode [ 290.769541][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.785888][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.105556][T15389] geneve1: tun_chr_ioctl cmd 1074025672 [ 291.111447][T15389] geneve1: ignored: set checksum enabled [ 291.413509][T15416] syz.0.4272[15416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.413563][T15416] syz.0.4272[15416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.092018][T15479] device syzkaller0 entered promiscuous mode [ 293.648073][T15541] device syzkaller0 entered promiscuous mode [ 294.040750][T15559] device syzkaller0 entered promiscuous mode [ 294.272423][T15570] sit0: mtu greater than device maximum [ 295.256530][T15621] device wg2 left promiscuous mode [ 295.375097][T15633] device syzkaller0 entered promiscuous mode [ 295.532069][T15650] device wg2 entered promiscuous mode [ 295.563018][T15650] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 295.806730][T15671] device wg2 entered promiscuous mode [ 296.047520][T15685] device syzkaller0 entered promiscuous mode [ 296.152829][T15688] device wg2 left promiscuous mode [ 296.211136][T15690] device syzkaller0 entered promiscuous mode [ 296.232952][T15688] device wg2 entered promiscuous mode [ 296.242606][T15688] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 301.042156][T15919] device syzkaller0 entered promiscuous mode [ 301.677218][T15954] sit0: mtu greater than device maximum [ 302.533705][T16001] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 302.803324][T16017] Â: renamed from pim6reg1 [ 303.090625][T16029] device syzkaller0 entered promiscuous mode [ 303.698451][T16049] device sit0 entered promiscuous mode [ 304.525867][T16076] device wg2 entered promiscuous mode [ 304.885621][T16099] device syzkaller0 entered promiscuous mode [ 306.382747][T16167] ±ÿ: renamed from team_slave_1 [ 307.604831][T16218] device wg2 left promiscuous mode [ 307.688212][T16218] device wg2 entered promiscuous mode [ 309.298790][T16347] device syzkaller0 entered promiscuous mode [ 309.881050][T16374] syz.0.4558[16374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.881131][T16374] syz.0.4558[16374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.075296][T16485] device bridge0 entered promiscuous mode [ 313.284886][T16592] device syzkaller0 entered promiscuous mode [ 313.380743][T16598] device syzkaller0 entered promiscuous mode [ 313.491487][T16606] device syzkaller0 entered promiscuous mode [ 315.556303][T16719] device syzkaller0 entered promiscuous mode [ 315.680943][T16734] device syzkaller0 entered promiscuous mode [ 315.726597][T16736] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.733744][T16736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.437017][T16793] device syzkaller0 entered promiscuous mode [ 316.700614][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.762426][T16828] device syzkaller0 entered promiscuous mode [ 317.071388][T16859] syz.4.4704[16859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.071442][T16859] syz.4.4704[16859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.419162][T16978] device syzkaller0 entered promiscuous mode [ 318.447531][T16978] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 319.385422][T17033] device wg2 left promiscuous mode [ 319.422387][T17030] device syzkaller0 entered promiscuous mode [ 319.540184][T17055] device syzkaller0 entered promiscuous mode [ 319.829341][T17089] device wg2 left promiscuous mode [ 320.093834][T17102] device syzkaller0 entered promiscuous mode [ 320.460228][T17120] bridge0: port 3(ip6gretap0) entered blocking state [ 320.466954][T17120] bridge0: port 3(ip6gretap0) entered disabled state [ 320.500912][T17120] device ip6gretap0 entered promiscuous mode [ 320.507085][T17120] bridge0: port 3(ip6gretap0) entered blocking state [ 320.513825][T17120] bridge0: port 3(ip6gretap0) entered forwarding state [ 320.535525][T17122] device syzkaller0 entered promiscuous mode [ 320.542535][T17127] device ip6gretap0 left promiscuous mode [ 320.553723][T17122] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 320.562228][T17127] bridge0: port 3(ip6gretap0) entered disabled state [ 320.589168][T17131] device syzkaller0 entered promiscuous mode [ 320.996238][T17164] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 321.005127][T17164] syzkaller0: linktype set to 825 [ 321.246110][T17184] device syzkaller0 entered promiscuous mode [ 322.316166][T17284] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 322.327151][T17284] device syzkaller0 entered promiscuous mode [ 322.519723][T17294] device syzkaller0 entered promiscuous mode [ 324.376644][T17374] device syzkaller0 entered promiscuous mode [ 324.385379][T17374] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 324.853575][T17402] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 324.899487][T17402] device syzkaller0 entered promiscuous mode [ 325.680525][T17427] device syzkaller0 entered promiscuous mode [ 325.897871][T17439] device syz_tun entered promiscuous mode [ 327.416103][T17503] device syzkaller0 entered promiscuous mode [ 327.429263][ T20] syzkaller0: tun_net_xmit 48 [ 327.441514][T17503] syzkaller0: create flow: hash 3613220786 index 0 [ 327.898684][T17504] syzkaller0 (unregistered): delete flow: hash 3613220786 index 0 [ 330.013135][T17610] device syzkaller0 entered promiscuous mode [ 330.075698][T17621] device syzkaller0 entered promiscuous mode [ 331.472283][T17686] device syzkaller0 entered promiscuous mode [ 331.925382][T17683] device GPL entered promiscuous mode [ 332.292772][T17725] IPv6: pim6reg1: Disabled Multicast RS [ 332.951959][T17789] device dummy0 entered promiscuous mode [ 333.674521][T17825] device syzkaller0 entered promiscuous mode [ 334.295717][T17854] device syzkaller0 entered promiscuous mode [ 334.853407][T17932] device syzkaller0 entered promiscuous mode [ 339.130501][T18156] device sit0 entered promiscuous mode [ 339.901443][T18173] device syzkaller0 entered promiscuous mode [ 343.519583][T18345] IPv6: pim6reg1: Disabled Multicast RS [ 343.624957][T18355] device syzkaller0 entered promiscuous mode [ 343.635747][T18357] device veth0_vlan left promiscuous mode [ 343.642413][T18357] device veth0_vlan entered promiscuous mode [ 344.612173][T18403] device syzkaller0 entered promiscuous mode [ 345.431724][T18445] device aaaaaaaaaaaaaaa entered promiscuous mode [ 345.622549][T18465] device pim6reg1 entered promiscuous mode [ 346.328058][T18500] device syzkaller0 entered promiscuous mode [ 347.091149][T18534] device syzkaller0 entered promiscuous mode [ 347.552936][T18547] device syzkaller0 entered promiscuous mode [ 347.860710][T18575] device wg2 left promiscuous mode [ 347.906224][T18563] device wg2 entered promiscuous mode [ 347.983488][ T24] audit: type=1400 audit(1776206235.960:176): avc: denied { create } for pid=18590 comm="syz.4.5222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 348.086798][T18596] device syzkaller0 entered promiscuous mode [ 348.404857][T18612] device syzkaller0 entered promiscuous mode [ 348.509324][T18612] syzkaller0: tun_net_xmit 1280 [ 349.269824][T18654] device syzkaller0 entered promiscuous mode [ 350.388442][T18719] device syzkaller0 entered promiscuous mode [ 351.430159][T18785] device syzkaller0 entered promiscuous mode [ 353.478608][T18884] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 353.575629][T18885] device veth0_vlan left promiscuous mode [ 353.645927][T18885] device veth0_vlan entered promiscuous mode [ 354.332131][T18967] device syzkaller0 entered promiscuous mode [ 354.343930][T18967] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 354.496294][T18973] device syzkaller0 entered promiscuous mode [ 357.196786][T19161] device syzkaller0 entered promiscuous mode [ 357.595246][T19188] device syzkaller0 entered promiscuous mode [ 359.057762][T19273] tap0: tun_chr_ioctl cmd 2147767520 [ 359.323513][T19300] device syzkaller0 entered promiscuous mode [ 359.341131][ T3178] syzkaller0: tun_net_xmit 48 [ 359.532623][T19330] bridge0: port 3(ip6gretap0) entered blocking state [ 359.553365][T19330] bridge0: port 3(ip6gretap0) entered disabled state [ 359.574792][T19330] device ip6gretap0 entered promiscuous mode [ 359.603058][T19330] bridge0: port 3(ip6gretap0) entered blocking state [ 359.609819][T19330] bridge0: port 3(ip6gretap0) entered forwarding state [ 359.669966][T19350] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 363.618433][T19566] device syzkaller0 entered promiscuous mode [ 363.677641][ T2002] syzkaller0: tun_net_xmit 48 [ 364.684109][T19638] device syzkaller0 entered promiscuous mode [ 366.048894][T19718] device syzkaller0 entered promiscuous mode [ 366.632451][T19787] syz.2.5573[19787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.676781][T19788] batadv0: tun_chr_ioctl cmd 1074025677 [ 366.710180][T19788] batadv0: linktype set to 776 [ 368.650344][T19896] device syzkaller0 entered promiscuous mode [ 368.876042][T19913] device lo entered promiscuous mode [ 368.913934][T19913] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 369.105674][T19938] device syzkaller0 entered promiscuous mode [ 369.833773][T19974] device syzkaller0 entered promiscuous mode [ 370.071487][T19979] device wg2 left promiscuous mode [ 370.146812][T19979] device wg2 entered promiscuous mode [ 370.382819][T19991] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.424304][T19991] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.438281][T19991] device bridge_slave_0 entered promiscuous mode [ 370.455456][T19991] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.484195][T19991] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.507978][T19991] device bridge_slave_1 entered promiscuous mode [ 370.724256][T20007] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 370.757550][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.769424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.835814][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.877718][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.917443][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.924502][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.993072][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.001550][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.009853][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.016905][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.036253][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.054991][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.065058][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.117039][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.166221][T19991] device veth0_vlan entered promiscuous mode [ 371.180192][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.192663][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.201711][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.216011][T19991] device veth1_macvtap entered promiscuous mode [ 371.238828][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.253133][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 371.274539][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.685692][T20104] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.701808][T20104] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.738168][T20104] device bridge_slave_0 entered promiscuous mode [ 372.820214][T20104] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.830880][T20104] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.847790][T20104] device bridge_slave_1 entered promiscuous mode [ 373.092902][T20104] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.100005][T20104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.107325][T20104] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.114453][T20104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.157802][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 373.166125][ T1454] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.191488][ T1454] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.204205][ T7] bridge0: port 3(ip6gretap0) entered disabled state [ 373.215783][ T7] device ip6gretap0 left promiscuous mode [ 373.224528][ T7] bridge0: port 3(ip6gretap0) entered disabled state [ 373.256060][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.270317][ T1454] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.277420][ T1454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.309761][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.319151][ T1454] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.326326][ T1454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.367751][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.377726][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.396947][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.496230][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 373.504917][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 373.514717][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 373.524104][T20104] device veth0_vlan entered promiscuous mode [ 373.766740][T20163] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 373.790324][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 373.801034][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 373.823073][T20104] device veth1_macvtap entered promiscuous mode [ 373.838830][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 373.861676][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 373.875681][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 373.889085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 373.898608][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 373.925144][T20179] tap0: tun_chr_ioctl cmd 1074025673 [ 375.538501][ T7] nr0: port 1(macsec0) entered disabled state [ 375.571806][ T7] device bridge_slave_1 left promiscuous mode [ 375.581090][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.590473][ T7] device bridge_slave_0 left promiscuous mode [ 375.596702][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.607337][ T7] device veth1_macvtap left promiscuous mode [ 375.613425][ T7] device veth0_vlan left promiscuous mode [ 375.952662][T20260] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.338106][T20288] device syzkaller0 entered promiscuous mode [ 376.344631][ T1454] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 377.666070][T20396] device syzkaller0 entered promiscuous mode [ 378.831633][T20416] device syzkaller0 entered promiscuous mode [ 379.028992][T20442] device syzkaller0 entered promiscuous mode [ 379.047550][T20442] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.054762][T20442] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.064676][T20442] device bridge0 left promiscuous mode [ 379.209225][T20457] device syzkaller0 entered promiscuous mode [ 381.898729][T20600] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 382.790911][T20654] device syzkaller0 entered promiscuous mode [ 383.055782][T20674] cgroup: fork rejected by pids controller in /syz3 [ 383.350675][T20808] tap0: tun_chr_ioctl cmd 1074025677 [ 383.356032][T20808] tap0: linktype set to 778 [ 383.525869][T20820] device syzkaller0 entered promiscuous mode [ 383.875449][T20832] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.882548][T20832] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.897800][T20832] device bridge_slave_0 entered promiscuous mode [ 383.947496][T20832] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.954562][T20832] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.978657][T20832] device bridge_slave_1 entered promiscuous mode [ 384.306989][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 384.318266][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 384.350871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 384.392493][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 384.414329][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.421618][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 384.456418][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.464892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 384.473557][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.480628][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.488663][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 384.541765][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 384.562834][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 384.571238][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 384.579541][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 384.594576][T20832] device veth0_vlan entered promiscuous mode [ 384.611381][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 384.628095][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 384.637760][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 384.645728][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.655183][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.663009][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 384.688603][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 384.697026][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 384.719275][T20832] device veth1_macvtap entered promiscuous mode [ 384.746747][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 384.755741][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 384.782142][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 384.816472][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 385.025035][T20913] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.077774][T20913] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.085344][T20913] device bridge_slave_0 entered promiscuous mode [ 385.093023][T20913] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.100459][T20913] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.125470][T20913] device bridge_slave_1 entered promiscuous mode [ 385.157948][ T7] device bridge_slave_1 left promiscuous mode [ 385.164126][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.239131][ T7] device bridge_slave_0 left promiscuous mode [ 385.245373][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.293039][ T7] device veth1_macvtap left promiscuous mode [ 385.303041][ T7] device veth0_vlan left promiscuous mode [ 385.742389][T20970] device syzkaller0 entered promiscuous mode [ 385.785032][T20970] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 385.978689][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 385.998772][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 386.029675][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 386.047406][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 386.057467][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.064515][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.114562][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 386.132470][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 386.157661][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 386.176142][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.183232][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.386331][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 386.397478][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 386.433270][T20913] device veth0_vlan entered promiscuous mode [ 386.469224][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 386.481208][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 386.498370][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 386.515980][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 386.562379][T20913] device veth1_macvtap entered promiscuous mode [ 386.573847][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 386.610474][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 386.624284][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 386.749836][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 386.799996][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 386.950942][T21018] ÿÿÿÿÿÿ: renamed from vlan1 [ 386.996665][T21032] device vlan0 entered promiscuous mode [ 387.005303][T21032] device dummy0 entered promiscuous mode [ 387.611583][ T7] device bridge_slave_1 left promiscuous mode [ 387.620066][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.678062][ T7] device bridge_slave_0 left promiscuous mode [ 387.690122][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.719765][ T7] device veth1_macvtap left promiscuous mode [ 387.745514][ T7] device veth0_vlan left promiscuous mode [ 388.032570][T21076] device syzkaller0 entered promiscuous mode [ 388.061462][T21082] device veth1_macvtap left promiscuous mode [ 391.503101][T21238] device syzkaller0 entered promiscuous mode [ 391.680434][T21238] : port 1(ip6gretap0) entered blocking state [ 391.689779][T21238] : port 1(ip6gretap0) entered disabled state [ 391.731136][T21238] device ip6gretap0 entered promiscuous mode [ 392.929576][T21284] Â: renamed from pim6reg1 [ 394.906456][T21380] ref_ctr_offset mismatch. inode: 0xb9d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 395.853634][T21420] device syzkaller0 entered promiscuous mode [ 397.736738][T21505] device syzkaller0 entered promiscuous mode [ 398.006753][T21528] device syzkaller0 entered promiscuous mode [ 399.535357][T21609] device syzkaller0 entered promiscuous mode [ 400.147050][T21649] device wg2 left promiscuous mode [ 400.503447][T21649] device wg2 entered promiscuous mode [ 401.334756][T21692] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 401.422150][T21692] device syzkaller0 entered promiscuous mode [ 402.042880][ T24] audit: type=1400 audit(1776206290.020:177): avc: denied { create } for pid=21731 comm="syz.2.6129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 403.663619][T21837] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 403.670597][T21837] syzkaller0: persist disabled [ 403.902623][T21866] device syzkaller0 entered promiscuous mode [ 404.200702][T21879] device syzkaller0 entered promiscuous mode [ 404.875971][T21924] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.884468][T21924] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.892649][T21924] device bridge_slave_0 entered promiscuous mode [ 404.932988][T21924] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.947145][T21924] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.954727][T21924] device bridge_slave_1 entered promiscuous mode [ 405.097145][T21956] device sit0 left promiscuous mode [ 405.132895][T21956] device sit0 entered promiscuous mode [ 405.355451][T21924] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.362574][T21924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.369898][T21924] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.376933][T21924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.472563][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 405.482502][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 405.493648][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.521787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 405.530116][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.537179][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.548514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 405.568309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 405.580917][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 405.594454][T21924] device veth0_vlan entered promiscuous mode [ 405.610888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.630446][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.654333][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.668413][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 405.693688][T21924] device veth1_macvtap entered promiscuous mode [ 405.814760][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 405.824318][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 405.842246][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 405.934508][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 406.405346][T22009] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.431065][T22009] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.442561][T22009] device bridge_slave_0 entered promiscuous mode [ 406.463043][T22009] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.470137][T22009] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.478147][T22009] device bridge_slave_1 entered promiscuous mode [ 406.549120][ T1454] device bridge_slave_1 left promiscuous mode [ 406.555620][ T1454] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.565715][ T1454] device bridge_slave_0 left promiscuous mode [ 406.572236][ T1454] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.583061][ T1454] device veth0_vlan left promiscuous mode [ 406.835666][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 406.845823][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.862688][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 406.871170][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 406.883767][ T313] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.890923][ T313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.899529][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 406.912960][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 406.921686][ T313] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.928764][ T313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.970449][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 406.980365][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 406.989901][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 406.998486][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 407.006595][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 407.032052][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 407.042323][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 407.053068][T22009] device veth0_vlan entered promiscuous mode [ 407.079943][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 407.097375][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.113806][T22009] device veth1_macvtap entered promiscuous mode [ 407.186127][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 407.204766][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 407.221109][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 407.246943][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 407.256441][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 407.265548][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 407.274504][ T313] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 407.301188][T22102] device syzkaller0 entered promiscuous mode [ 407.307947][T22106] syzkaller0: create flow: hash 3613220786 index 0 [ 407.316766][ T8270] syzkaller0: tun_net_xmit 48 [ 407.458412][T22102] syzkaller0 (unregistered): delete flow: hash 3613220786 index 0 [ 407.570586][T22134] syz.2.6245[22134] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.953955][T22158] device syzkaller0 entered promiscuous mode [ 408.657631][T22189] device syzkaller0 entered promiscuous mode [ 409.096492][T22220] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.105234][T22220] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.128179][T22295] IPv6: pim6reg1: Disabled Multicast RS [ 410.403559][T22311] device wg2 entered promiscuous mode [ 410.798770][T22327] device syzkaller0 entered promiscuous mode [ 410.825001][ T24] audit: type=1400 audit(1776206298.800:178): avc: denied { create } for pid=22326 comm="syz.2.6300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 412.769997][ T3886] ------------[ cut here ]------------ [ 412.776765][ T3886] kernel BUG at kernel/bpf/arraymap.c:993! [ 412.785713][ T3886] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 412.791817][ T3886] CPU: 0 PID: 3886 Comm: kworker/0:43 Tainted: G W syzkaller #0 [ 412.800761][ T3886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 412.810856][ T3886] Workqueue: events prog_array_map_clear_deferred [ 412.817303][ T3886] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 412.823561][ T3886] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 412.843186][ T3886] RSP: 0018:ffffc90003e67c18 EFLAGS: 00010293 [ 412.849264][ T3886] RAX: ffffffff817b4f8b RBX: ffff888113edac10 RCX: ffff8881315ca780 [ 412.857256][ T3886] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 412.865246][ T3886] RBP: ffffc90003e67c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 412.873445][ T3886] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 412.881453][ T3886] R13: ffff888115c37600 R14: 0000000000000001 R15: ffff888115c37600 [ 412.889456][ T3886] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 412.898419][ T3886] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.905013][ T3886] CR2: 00007f89b1ea3f00 CR3: 000000012237f000 CR4: 00000000003506b0 [ 412.913013][ T3886] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.921006][ T3886] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 412.928992][ T3886] Call Trace: [ 412.932324][ T3886] ? bpf_prog_47cf57ee41afe8de+0xb/0xd88 [ 412.937975][ T3886] fd_array_map_delete_elem+0x14c/0x250 [ 412.943542][ T3886] prog_array_map_clear_deferred+0x9e/0x140 [ 412.949448][ T3886] process_one_work+0x6e1/0xba0 [ 412.954316][ T3886] worker_thread+0xa6a/0x13c0 [ 412.959019][ T3886] kthread+0x346/0x3d0 [ 412.963192][ T3886] ? worker_clr_flags+0x190/0x190 [ 412.968233][ T3886] ? kthread_blkcg+0xd0/0xd0 [ 412.972830][ T3886] ret_from_fork+0x1f/0x30 [ 412.977273][ T3886] Modules linked in: [ 413.178187][ T3886] ---[ end trace 8859d8f306001355 ]--- [ 413.187216][ T3886] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 413.197598][ T3886] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 413.225055][ T3886] RSP: 0018:ffffc90003e67c18 EFLAGS: 00010293 [ 413.233471][ T3886] RAX: ffffffff817b4f8b RBX: ffff888113edac10 RCX: ffff8881315ca780 [ 413.244899][ T3886] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 413.255134][ T3886] RBP: ffffc90003e67c98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 413.266426][ T3886] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 413.276727][ T3886] R13: ffff888115c37600 R14: 0000000000000001 R15: ffff888115c37600 [ 413.288265][ T3886] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 413.297398][ T3886] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 413.304041][ T3886] CR2: 0000555590b8e908 CR3: 000000011dffa000 CR4: 00000000003506b0 [ 413.312396][ T3886] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 413.320694][ T3886] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 413.328871][ T3886] Kernel panic - not syncing: Fatal exception [ 413.335218][ T3886] Kernel Offset: disabled [ 413.339546][ T3886] Rebooting in 86400 seconds..