last executing test programs: 7.244383877s ago: executing program 4 (id=11453): syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/cgroup\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r0, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x404, 0x9}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x3, 0x4, 0x801, 0x1, r1, 0x15b4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r2}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r2, &(0x7f0000000900)}, 0x20) syz_clone(0x1080000, &(0x7f0000000600)="e9d82fd66b85c1a56c78a8df64d11dc38363a90ca607deaf2b0adc0acb1c7e5ae6a9b4a9ad69fd2f6407faab24c2c9b332ccefe758cafaebf441adf7f97c43c4d1afa208d9445ee7f8475267bc3c02aa66ddfee5d5322c119bb9695c976b3d08d6a38a7c3990972f916feb59e9936478068aed2f8ee6c0d98e120e83d08b5ba4d3f2467bfca727eac04c4c8ecb892049b7f922f0138315df29031e9d42bd4913db236de26a5dbe735e33678425421b9730532b99715a76ccea286063c8c9cc0845df13ff46d75f49c39a2921e40f6d6422068c600d7ccfb7b0201984d2a8f64c0775cc72bf97327fc1387e69a923e48ff9705d3b204b", 0xf6, &(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)="53687a421f68a12714b101362afbdc3ad17df0428a706c4c23ea917474916b812ef83b906b4e018b7d37052c227b82f0dba69ab52c3a4b7be92d34d9ee4745e52ed52958cf08f5522146120722f39a53b9419549c2c10a8aed") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x4, &(0x7f00000002c0)=@framed={{}, [@generic={0x5, 0x6, 0x9, 0x3d, 0xfffffff7}]}, &(0x7f0000000100)='GPL\x00'}, 0x94) 7.155595973s ago: executing program 4 (id=11455): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x945, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7902009875f37538e486dd6317ce62667f2c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa88"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNGETVNETBE(r2, 0x800454df, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9d}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) 7.037340922s ago: executing program 4 (id=11457): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x93, 0x0, 0xf3, 0xa, 0x0, 0x0, 0xd006e1258c4875cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0xc20, 0xc8, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000ff0000f37538e486dd630080fc5c082c00da5bffffffffff00000006030000008ffcef"], 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair(0x1, 0x4, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1e000300008c71ef28ff4b"], 0xffdd) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) (async) close(r1) (async) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x93, 0x0, 0xf3, 0xa, 0x0, 0x0, 0xd006e1258c4875cc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0xc20, 0xc8, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000000ff0000f37538e486dd630080fc5c082c00da5bffffffffff00000006030000008ffcef"], 0xfdef) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) (async) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) close(r4) (async) socketpair(0x1, 0x4, 0x0, &(0x7f0000000200)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="1e000300008c71ef28ff4b"], 0xffdd) (async) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) (async) 6.875281209s ago: executing program 4 (id=11460): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000040)={0x3, 0x80, 0x7, 0x6, 0x40, 0x10, 0x0, 0x5, 0x8000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0xf}, 0xc220, 0x7ff, 0x401, 0x0, 0x1, 0x4, 0x0, 0x0, 0x400, 0x0, 0x2}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000180)={'veth0_to_bridge\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x4800) bpf$BPF_PROG_TEST_RUN(0x21, &(0x7f0000000240)={0xffffffffffffffff, 0x1f2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r3, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x41, &(0x7f0000000040)=r5, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r6, 0xb4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002880)={0x18, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3538}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}]}, &(0x7f0000000780)='syzkaller\x00', 0xff, 0x1000, &(0x7f00000015c0)=""/4096, 0x40f00, 0x4a, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002700)={0x5, 0xe, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000027c0)=[r6, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000002800)=[{0x2, 0x2, 0x4, 0x6}, {0x4, 0x5, 0x2, 0x6}, {0x2, 0x3, 0xf, 0x8}, {0x3, 0x5, 0xc, 0x7}, {0x4, 0x2, 0x5, 0xc}], 0x10, 0xb}, 0x94) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"/624], &(0x7f0000000900)=""/91, 0x270, 0x5b, 0x1, 0x40b, 0x10000, @value=r1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0xe, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @exit, @jmp={0x5, 0x0, 0xa, 0x4, 0x2, 0xffffffffffffffe0, 0xffffffffffffffff}]}, &(0x7f0000000280)='GPL\x00', 0x2, 0x83, &(0x7f00000002c0)=""/131, 0x41000, 0x32, '\x00', r7, 0x25, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000a00)=[{0x5, 0x2, 0x4, 0x5}, {0x3, 0x1, 0x5, 0x5}, {0x0, 0x5, 0xb}], 0x10, 0xc6b}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.639720499s ago: executing program 4 (id=11462): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1, 0xffffffffffffffff, 0xfff}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cgroup.controllers\x00', 0x26e1, 0x0) close(r1) ioctl$SIOCSIFHWADDR(r1, 0x8b0f, &(0x7f0000000000)={'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x0, 0x67, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0xfffffff5, '\x00', r2, 0xffffffffffffffff, 0x4, 0x5, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000000000000000060000001811000028a75b6ddccae5a30c75b85c8c58740b9aae365c23fd3a5777b85132b97ecc4ee7f40695bbe1be", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="3100000000000000000000000000000061920000000000009500000000000000"], 0x0, 0x5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.583259289s ago: executing program 4 (id=11463): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x3ff, 0x2e30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x101821, 0x3, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/188, 0xbc}, {&(0x7f0000000180)=""/77, 0x4d}], 0x2, &(0x7f0000000580)=""/69, 0x45}, 0x40000000) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x1b, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000bf91000000000000b7020000000000008500000085000000b7000000000000009500"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r4, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x40, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xa9, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffffffffffff, 0x6, 0x10}, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@bloom_filter={0x1e, 0x6, 0xa005, 0xfffffffe, 0x8800, 0xffffffffffffffff, 0x2, '\x00', r6, r5, 0x1, 0x3, 0x2, 0xb, @value=r5}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r7, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f00000001c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffb}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r9}, 0xc) close(0x4) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000040)=@framed={{0x18, 0x5, 0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0xfffffffe}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r10}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.661992685s ago: executing program 0 (id=11519): socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) close(0xffffffffffffffff) (async, rerun: 32) r1 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x10eda2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x0, 0x4, 0x3, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230041) (async) close(r2) (async) syz_clone(0x0, 0x0, 0x37, 0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x200}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xcb13119f635c50e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000e6ffffff000000000000000000"], 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xca2a) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000711828000000000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) ioctl$TUNSETLINK(r5, 0x400454cd, 0x30d) (rerun: 64) setsockopt$sock_attach_bpf(r6, 0x1, 0xa, &(0x7f00000002c0)=r5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000080)) 2.504374981s ago: executing program 0 (id=11522): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x1000, 0x0, r1}, 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000002c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000000000000002156691bc33e9e24f2e71c2584f900000000009500000006ffffff113731693b468591704e463e0460a2cffc162c6be583d21db9e64401a50e05a0fb830a8492c66ab755359d9f10bf580d9ff93d913279423c6cb74aff96a91b22b02c86a0af09730b7777a9970e72083e250a9fe18a1623e80de0237186de3c4e2c82e17a309048d57a"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000000000000002156691bc33e9e24f2e71c2584f900000000009500000006ffffff113731693b468591704e463e0460a2cffc162c6be583d21db9e64401a50e05a0fb830a8492c66ab755359d9f10bf580d9ff93d913279423c6cb74aff96a91b22b02c86a0af09730b7777a9970e72083e250a9fe18a1623e80de0237186de3c4e2c82e17a309048d57a"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x6, 0x0, &(0x7f0000000040)="ded6e0966ec1", &(0x7f0000000380), 0x0, 0x3}, 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r5, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1d, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r4, &(0x7f0000000240)="df6d5abec0b4aff57c9fc7c4674a79f9a9d4d4d9d67fef143d5de0a3f686d22b10e0fd02ebec3c3c24671185b587ed23efc9826a953f8ee7cceea5373bdd547faa48c2d538ba3c65c17c18d5aede458ce09c"}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r4, &(0x7f0000000240)="df6d5abec0b4aff57c9fc7c4674a79f9a9d4d4d9d67fef143d5de0a3f686d22b10e0fd02ebec3c3c24671185b587ed23efc9826a953f8ee7cceea5373bdd547faa48c2d538ba3c65c17c18d5aede458ce09c"}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r2}, 0x8) (async) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r2}, 0x8) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a80)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, '\x00', 0x0, r0, 0x5, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x19, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5b77}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000880)='syzkaller\x00', 0xac, 0x30, &(0x7f00000008c0)=""/48, 0x41100, 0x24, '\x00', r6, @fallback=0xe, r0, 0x8, &(0x7f0000000900)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x8, 0x401, 0x80000000}, 0x10, r7, r5, 0x0, &(0x7f0000000980), 0x0, 0x10, 0x10001}, 0x94) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x5c, 0x8}, {}, {0x5, 0x0, 0x69}, {0x6, 0x0, 0x0, 0x10000000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x670, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x6}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x12, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x670, 0x0, 0x0, 0x0, 0x9}, [@generic={0x73, 0x1, 0x1, 0x6}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.247243414s ago: executing program 1 (id=11528): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}, @ldst={0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147}, 0x7c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.97835984s ago: executing program 0 (id=11530): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 1.802717539s ago: executing program 0 (id=11532): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0xc18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000280)=[0x0], &(0x7f0000000340)=[0x0], 0x0, 0x98, &(0x7f0000000380)=[{}, {}], 0x10, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x1c, &(0x7f0000000b00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x4, 0xd, 0x4, 0x266, 0x24}, @jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0x2, 0x10}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x81}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8c}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6}, 0x0, 0x0, r3, 0x0) close(r3) close(0xffffffffffffffff) r4 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit], 0x0, 0x7, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x0, 0xa, 0x9, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000800)=[0xffffffffffffffff], 0x0, 0x10, 0x4}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000022c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2c, 0x3, 0x101, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 1.79241372s ago: executing program 3 (id=11533): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x48) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x2, 0x8, 0x40, 0xc0, 0x1}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1a}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20, 0x0, 0x0, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}, {0x0, [0x61]}}, 0x0, 0x53}, 0x28) syz_clone(0x20204400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000080), 0x1003, r1}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r3, 0x1}, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="160a0000000000006311340000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 1.181383382s ago: executing program 3 (id=11537): ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xc27) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0x56, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) 1.105225976s ago: executing program 3 (id=11539): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xfc, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0xffffffff, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) (async) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x1a, &(0x7f0000000600)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000000}, {}, {}, [@jmp={0x5, 0x1, 0x2bacc00444392265, 0x3, 0x9, 0xffffffffffffffff, 0x10}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x9, 0x4, 0xb, 0x8, 0x10}, @jmp={0x5, 0x0, 0xd8f23951e3678db3, 0x4, 0x0, 0xffffffffffffffe0}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc}, @map_fd={0x18, 0x4, 0x1, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x53a4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000700)='GPL\x00', 0x56, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x2, 0x1, 0x4, 0x4}, 0x10, 0x15c63, 0xffffffffffffffff, 0x5, &(0x7f00000007c0)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000800)=[{0x3, 0x6, 0x7, 0x1}, {0x4, 0x5, 0xd, 0x9}, {0x0, 0x4, 0xb, 0x4}, {0x3, 0x1, 0x8, 0x6}, {0x0, 0x2, 0x6, 0x3}], 0x10, 0x8}, 0x94) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0xa71, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x50) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000009c0), &(0x7f0000000a00)='%-010d \x00'}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000ac0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b40)=@o_path={&(0x7f0000000b00)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x19, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0x9a}, @call={0x85, 0x0, 0x0, 0x2a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf0a6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x744}, @func={0x85, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='GPL\x00', 0xe7, 0xc1, &(0x7f0000000180)=""/193, 0x41000, 0x48, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0xd, 0x10001, 0x7}, 0x10, r2, r3, 0x5, &(0x7f0000000c40)=[0xffffffffffffffff, r4, 0xffffffffffffffff, r5, r6, r7, r8, r9], &(0x7f0000000c80)=[{0x3, 0x4, 0x4, 0x1}, {0x4, 0x5, 0xa, 0xb}, {0x4, 0x1, 0x2, 0xc}, {0x2, 0x3, 0x1, 0x5}, {0x2, 0x1, 0xe, 0x2}], 0x10, 0x7fff}, 0x94) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0x27, &(0x7f0000001000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0xd}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x644f}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}, @map_val={0x18, 0x9, 0x2, 0x0, r9, 0x0, 0x0, 0x0, 0x400}, @generic={0x2, 0xb, 0x1, 0x4, 0x5}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x7}]}, &(0x7f0000001140)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x21, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000011c0)={0x5, 0x0, 0x3, 0x40}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000001200)=[r6, r9, r5, r4], &(0x7f0000001240)=[{0x0, 0x5, 0x3, 0x70951143eaf465cb}, {0x1, 0x5, 0xd, 0x2}, {0x3, 0x3, 0x4, 0x6}, {0x5, 0x3, 0x6, 0x9}, {0x4, 0x3, 0x3}, {0x3, 0x3, 0x8, 0x3}], 0x10, 0xffffffff}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x3, 0x19, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffffffffffc0, 0x10}, @generic={0x3, 0x8, 0x7, 0x3, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x153cba5b}, @jmp={0x5, 0x1, 0x6, 0x4, 0x9, 0x30, 0x10}, @map_fd={0x18, 0x0, 0x1, 0x0, r6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff1, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000ec0)='GPL\x00', 0x2, 0x58, &(0x7f0000000f00)=""/88, 0x40f00, 0x56, '\x00', r1, @sched_cls=0x37, r7, 0x8, &(0x7f0000000f80)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000fc0)={0x2, 0x7, 0x3, 0x5}, 0x10, r2, r11, 0x3, &(0x7f0000001380)=[r0, r4, 0x1, r5], &(0x7f00000013c0)=[{0x1, 0x3, 0x10, 0x3}, {0x4, 0x3, 0x2, 0xc}, {0x1, 0x4, 0x5, 0x5}], 0x10, 0xfffffffb}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r7, 0xffffffffffffffff}, &(0x7f00000014c0), &(0x7f0000001500)=r7}, 0x20) (async) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001700)={0x1b, 0x0, 0x0, 0x9f, 0x0, 0xffffffffffffffff, 0x8000, '\x00', r1, 0xffffffffffffffff, 0x0, 0x3, 0x5}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0xc, &(0x7f0000001580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x2, 0x3, 0x1, 0x0, 0x0, 0xfffffffffffffff8, 0x10}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffffb}, @tail_call={{0x18, 0x2, 0x1, 0x0, r13}}, @exit]}, &(0x7f0000001600)='syzkaller\x00', 0x21fc, 0x18, &(0x7f0000001640)=""/24, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001680)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000016c0)={0x0, 0xb, 0x9, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r0, r14], &(0x7f00000017c0)=[{0x0, 0x2, 0x9, 0x7}, {0x5, 0x3, 0xa, 0xc}], 0x10, 0x2}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001b40)={r5, 0x58, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r16 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b80)=r2, 0x4) (async) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001bc0)=@base={0x18, 0x0, 0x1000, 0x8, 0x2000, r5, 0x5, '\x00', r1, r7, 0x1, 0x5, 0x1}, 0x50) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x11, 0x1d, &(0x7f00000018c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @alu={0x4, 0x0, 0x7, 0x2, 0xb, 0xfffffffffffffffe, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000019c0)='syzkaller\x00', 0x400, 0xbc, &(0x7f0000001a00)=""/188, 0x40f00, 0x70, '\x00', r15, @fallback=0xc, r16, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r10, 0x4, &(0x7f0000001c40)=[r13, r14, r17], &(0x7f0000001c80)=[{0x1, 0x1, 0x4, 0x4}, {0x2, 0x3, 0x1, 0x9}, {0x0, 0x4, 0xb, 0x7}, {0x5, 0x4, 0xe, 0x9}], 0x10, 0x7ff}, 0x94) (async) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=@base={0x13, 0x9, 0x1ff, 0x2, 0x220c0, r13, 0xe79, '\x00', r1, r7, 0x4, 0x4, 0x3}, 0x50) r20 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001e00)={0x2, 0x4, 0x8, 0x1, 0x80, r19, 0x47, '\x00', r15, r6, 0x1, 0x5, 0x1}, 0x50) (async) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f0000001e80)=r7) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000001ec0)=r9, 0x4) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001f00)={'veth0_to_bridge\x00', 0x100}) (async) socketpair(0x21, 0x3, 0xa53, &(0x7f0000001f40)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001f80)=r10, 0x4) (async) sendmsg$sock(r7, &(0x7f0000002300)={&(0x7f0000001fc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r21, 0x0, 0x2, 0x0, 0x4, {0xa, 0x4e21, 0x6, @mcast2, 0x6}}}, 0x80, &(0x7f0000002240)=[{&(0x7f0000002040)="054e82b5ee9b5a91d46ca5ab7e901d6bed6c1b8b99addfb56557455491eff0d0c745851ef6", 0x25}, {&(0x7f0000002080)="d86533c1c27c81ee6a5ce5f6303c073f2c6cd91ab4dd60fbb34e634e14b2ab492e8c06d5593bbc1ca54553a919d396ee3f11a477ad55c5af8ec00476ee56e38e781ef095111d83d54cd178f880f7168bf72a07cfa69a3f4a710b6331f7abffc9fad6217980c7f11f203d1b9c1859f1d162880d5f5b29b919000f4d630dbc50ba9cc518611fc03b51d28c4dd39d0acdbef56f099fbd4901a93aeab39b78c268bb4f785c43d0c9ebca0917daac7670905e52957fcdf4bc3d38f667a7283f640f57baef02b356d8d8cb08ce1bd3eee3f654e5bf6ff642db67b3a7f354bf60c902a096c9d2c58badf45766b67ebcc21e8bcb65e36e05b3d6b2b310", 0xf9}, {&(0x7f0000002180)="618d05d2402bbe8ab3b8de1581ada33cbca62a8ca3410a05dc24e8f7292c455dd40d71cec4e803fc699f61bedfe55c7639621f05626b360e52d15da0106b768d6e370a4c51678c5a5b43587577d744cf35380c6a78d5c29b1032", 0x5a}, {&(0x7f0000002200)="e799331dc7cfa613aca7", 0xa}], 0x4, &(0x7f0000002280)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0xffffff0d}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x60}, 0x80) (async) r22 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002640)={0x6, 0x28, &(0x7f0000002340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff9}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@cb_func={0x18, 0x4, 0x4, 0x0, 0xffffffffffffffff}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r13}}, @alu={0x4, 0x0, 0x8, 0xa, 0x2, 0x80, 0x10}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @map_val={0x18, 0x5, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0xffff}, @map_fd={0x18, 0x3, 0x1, 0x0, r6}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002480)='GPL\x00', 0x9075, 0x32, &(0x7f00000024c0)=""/50, 0x41000, 0x42, '\x00', r15, 0x25, r16, 0x8, &(0x7f0000002500)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000002540)={0x2, 0x4, 0x4, 0x3}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002580)=[r17, r20], &(0x7f00000025c0)=[{0x0, 0x1, 0x6, 0xb}, {0x2, 0x1, 0xa, 0x6}, {0x4, 0x1, 0x4, 0x8}, {0x4, 0x1, 0x5, 0xa}, {0x2, 0x3, 0x0, 0xb}], 0x10, 0x78}, 0x94) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000002800)={@ifindex=r15, 0x2b, 0x1, 0x5, &(0x7f0000002700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000002740)=[0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0], &(0x7f00000027c0)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002840)={@map=r14, r12, 0x5, 0x2, r22, @void, @value=r18, @void, @void, r23}, 0x20) 1.101210816s ago: executing program 3 (id=11540): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ec0)=ANY=[@ANYRES8], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0xe, &(0x7f0000002580)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRES64, @ANYRES64, @ANYRES8], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x7000000}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000f0000"], 0x50) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="120000000f0000"], 0x50) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000002c0)={r2, &(0x7f0000000a00), 0x20000000}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b907ef19edfff007049e0ff0888e", 0x0, 0x102a, 0x18000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffff1}, 0x50) r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000015004000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r5}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r5, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r6}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r3) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) close(0xffffffffffffffff) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r9, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r9, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x1) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000300000000030000000003000000020000000000000000000000000000010500000008000000010000000000000c04000000005f00000000000000"], 0x0, 0x4f}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="460a000000000063113800000000001800000000000000000000950000000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000540)) (async) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000540)) 999.564933ms ago: executing program 0 (id=11542): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x64b}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x24}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) close(r2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x2000000, {0x3, 0x2}}]}}, 0x0, 0x32}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x2) recvmsg$unix(r3, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x100) close(r4) close(r5) 946.356552ms ago: executing program 1 (id=11543): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000000)={&(0x7f00000001c0)=@id={0x1e, 0x3, 0x1, {0x4e20}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000810}, 0x40) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r2) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="37b53a24d1a5e8d919f6a80553639c88696bdfee217b244615bc7add7eb36596c03f216cc79bfb4b2f295c99035245ccaebadc0dfd55b8c2e51c1e0c61b548d086a2d137f4a984a44dd5b1701ce9a6c4e83071bbc160e2e760b2aeab2a2216d4bd3f1872592263cd7bf1e468f6dc79ae53dd1286f7b0a24564893411ad15437dca328fb8404cf0b69bb4eb", @ANYRES16=r2], 0x50) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000100)=0x8, 0x12) (async) ioctl$SIOCSIFHWADDR(r5, 0x4030582b, &(0x7f0000000000)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000d000000003800000003000000000000000045a04527000003000000000300000002000000000000"], 0x0, 0x53}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x2000, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) (async) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8983, &(0x7f0000000080)) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0ffffffffff030000000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xc2) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f0, &(0x7f0000000080)) (async) write$cgroup_netprio_ifpriomap(r5, &(0x7f0000000000)=ANY=[@ANYBLOB='batadv_sla26\x00'], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000d0df00850000001b"], 0x0, 0xfffffffe, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x9}, 0x40, 0x0, 0xfffffffe, 0x2, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, r5, 0x0) 943.312992ms ago: executing program 3 (id=11546): perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x40089, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xa}, 0x10014, 0x4, 0x0, 0x5, 0x0, 0x7ff, 0xc51, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x82100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x100000001000}, 0x21, 0x0, 0x4, 0x1, 0x0, 0x20000001, 0x0, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="08000000040000000400000007"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x4, 0x108, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2d}, 0x23) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45769daf, 0x0, @perf_config_ext={0x8, 0xfc}, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000100)="b9ff0304000000ffff9e08f086dd", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x4, 0xfc, 0x0, 0x0, 0x0, 0x3, 0x2feaad6ee635ef2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x7}, 0x0, 0x0, 0x0, 0x3, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8000}, 0xffffffffffffffff, 0xb, r2, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x1, 0x0, 0x4, 0x2, 0x0, 0x0, 0x34000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x9, 0xfffffffe, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f0000000080), 0x700}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0xa) getpid() r7 = openat$cgroup_devices(r6, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="61c7fcc413675399c1e1"], 0xa) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) syz_clone(0xa49a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000240000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000040000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000023000000850000000e00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 820.529803ms ago: executing program 1 (id=11548): r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0xb}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfffffffffffffffd) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x80, 0xdb, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x438e, 0x9}, 0x8000, 0x9, 0x9, 0x4, 0x5, 0x4, 0x0, 0x0, 0x5, 0x0, 0x3b}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000100)='!\x00') (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 806.031555ms ago: executing program 0 (id=11549): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23ffffff, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 446.384046ms ago: executing program 1 (id=11550): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) close(r0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000300)=""/218) ioctl$TUNSETIFF(r0, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00', 0x800}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000180)='%pI4 \x00'}, 0x20) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r2, r3}, 0xc) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 395.687454ms ago: executing program 2 (id=11551): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000240), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000500000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000440)={r0}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@datasec={0x6, 0x1, 0x0, 0xf, 0x3, [{0x2, 0x8}], "8f54b7"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '@'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x48}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0x1, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) (async) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r2}, 0x8) mkdirat$cgroup(r2, &(0x7f0000000340)='syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xb, 0xc, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x61fb}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x3}, @alu={0x4, 0x0, 0x1e, 0x0, 0xb, 0x30, 0x10}, @jmp={0x5, 0x0, 0x4, 0x1, 0x1, 0x100, 0x17}, @generic={0xf7, 0x0, 0xf, 0x6, 0x7}]}, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x9d, &(0x7f0000000540)=""/157, 0x41000, 0x9, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0x10, 0x3, 0x3}, 0x10, 0x0, r0, 0x1, 0x0, &(0x7f0000000680)=[{0x3, 0x3, 0xf, 0x6}], 0x10, 0x9}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x16, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 333.792714ms ago: executing program 1 (id=11552): socketpair(0x10, 0x1, 0x6, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) write$cgroup_int(r1, 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000500)="173d880db56f9fb87f49a8a8292eb6c26a90c5ccb41f926c6d43a18e047c991cf1bd52045ff0169d69896c2c06ff2af06ea2fb0c72d813089adf6ff9a246e7b7d8630215af924b1fe1aaabdb8ec309aae30a8e7e2ab01720e0db9402bbb1adb86c1e13a4dd43e294eb8935", 0x6b}, {&(0x7f0000000780)="b0e6479e8ed483153dec5e5ded5b0e27f98d93525cb29d03960bbd96005e43089b23779b0ea2a710ea80b1c2dd0271ad3e209a0c7238fc51e04f47cb0893192687f49d9a798a856b7295cf0a5013725fe0b882738cecbbafb41b6a3c6d5f9eb6b81e7f1ee34794d9826c66966ac7e06eed06173b", 0x74}], 0x2, &(0x7f0000000a00)=ANY=[], 0x170}, 0x4040014) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb688a8", 0x0, 0x0, 0x60000000, 0x0, 0xfffffe99, 0x0, 0x0}, 0x50) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0xf}, {0x0, 0x0, 0x0, 0x81}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000002"], 0x0}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00'}) socketpair(0x1f, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x80000e4) ioctl$SIOCSIFHWADDR(r5, 0x541b, &(0x7f0000000340)={'syzkaller1\x00', @remote}) 331.064465ms ago: executing program 2 (id=11553): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x806, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x12100, 0xc8, 0x2, 0x8, 0x0, 0x10001, 0xa, 0x0, 0x800}, 0x0, 0x5, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x3, 0x13, &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYBLOB="c477494e235a73d963fb910be9382b575a9b67293f9cbce1fba94043f2ac213c1308aaadd2b5fe77152acda0e680b28a0876b1c68881deea143af2ac4824dfdf48ee9ac379ab65ecd4dfdfe7719e56af0fc4e8f733673576633a7284866225bd2f26aa3dad8adc2416e51ed240773891f7fbe1dc05cb47266e1b5c96b231de8067a206f36843c6ae4f4b118c6d0ba70ab135d62adf0e7026b935029443ba9cee2b2190f2cf8e2ecd493b0b298fa150b42083036eded5eb47fd8cf78e49fd328a1fd23436d2ef2dc543f57d698ca851a3e4c9a7dc32273fd2d035044a71be4277"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0xe, 0x0, &(0x7f0000000a80)="b8000005000000000152912e5763", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xac, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0xc9, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xfffff6b5, '\x00', r2, r0, 0x1, 0x5, 0x3}, 0x50) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8000, '\x00', r2, r0, 0x0, 0x3, 0x4}, 0x50) 292.020822ms ago: executing program 2 (id=11554): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000000000400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ff07000000000000000000970463b790f455e30018010000646c6c1f000000000000000007010000f8ffff6801093d83e78428ffb70200000000008500000072000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffdf) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000ffffff00000000000000008510000002000000850000000f0000009500000000000000"], 0x0, 0xfffffdff, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000100)="b9ff03076044238cb89e14f008000de0ffff00184000633277fbac141412", 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x6) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x8800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x8800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9aa, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x2037, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f00000000c0)={'bond_slave_0\x00', @random="2fac2001c79b"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffbfffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x4, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x4, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) close(r5) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80000000000000101000007f0c08000000000000000071273fa7b49301641184a907c5"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) 79.173657ms ago: executing program 1 (id=11555): r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x4a) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001300)={r2, 0x18000000000002a0, 0x36, 0x0, &(0x7f0000000000)="b9ff03076844268cb8be14f086dd0f13268b326d400ec6c9fc95f1a6d3820234d49b61fcefa32002fcf76b60bc5ebeed2e4604000000", 0x0, 0x20000005, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') 14.059338ms ago: executing program 2 (id=11556): bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000005010000000000000700009f6b1171000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069117e00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) 12.888728ms ago: executing program 2 (id=11557): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x5, 0x4, 0x8, 0x2}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000bc7a007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x79, r0}, 0x38) (async) perf_event_open(&(0x7f0000000240)={0x2, 0x78, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40800, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000fc0)=' \xb4\xcfhj0\x04\x9e\x92\xee\x87\xa1X\xbb\xea/\xbe\x18\xeb\xa9\bsDi\xb2\xc6E\x14\x8a\x1d\xc0\xd9\xe6\x10\xc0s\xe8\xc1\x12\xbd\xe2tX}\xa3\x1e \xfady7D -\x96x\x81\xdb.?\x16\xbb\x93\x1c') (async) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r1}, 0xc) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x55, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x21}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) 11.168949ms ago: executing program 3 (id=11558): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x5, 0x1, 0x8, 0x1}, 0x50) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000070000000080000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000080000000000000064ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r4, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001440)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfffffffffffffcac, 0xfffffffffffffffd}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8912, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r8, 0xb4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002880)={0x18, 0x8, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3538}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f0000000780)='syzkaller\x00', 0xff, 0x1000, &(0x7f00000015c0)=""/4096, 0x40f00, 0x4a, '\x00', r9, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002700)={0x5, 0xe, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000027c0)=[r8, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000002800)=[{0x2, 0x2, 0x4, 0x6}, {0x4, 0x5, 0x2, 0x6}, {0x2, 0x3, 0xf, 0x8}, {0x3, 0x5, 0xc, 0x7}, {0x4, 0x2, 0x5, 0xc}], 0x10, 0xb}, 0x94) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r11, 0x4) socketpair(0x6, 0x80000, 0x6, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r12, &(0x7f0000000c80)={&(0x7f0000000800)=@l2={0x1f, 0xb0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0xfff}, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000880)="5010d2dc2ba016726a8b5c4c4adceef2ba3a2599f3a3ef4c4f41c159c63e8753466c4b77b0d1d3ed2e475713c662304d04873db048f41a8249732904cf8cfa9eb00ede12cba12176d2919f1ab799c6d9fe16ba770deac0f20704a16d68f764bbd0338b8e74c582f3fb6652cc2246a17810f41f7ebb266d0d8303828a99fe168d", 0x80}, {&(0x7f0000000900)="84a589a8aab9b811e47e917d8a54345ff43ea670dfa89f433e32978f124ecee6036466765d7dc3c720962af5e8f1a8544374b47fba97e20a360c8d9610895bfaef6114552ae84faff823a9e1c00b9fa62d3c25697f88e1d395fc5238d505625eb12fe31fe18ef27331a3c4d055d69acbe32c02fa5fc97f31fb4146fa9794459a776a713b71d243773bf02c5739ae023b64dad2588de01d80d862250ea2234e9a65db002751e8f7db26cc3f25a2dffc37c90bec7d70c79b64937fa3827dfeab94", 0xc0}, {&(0x7f0000000a80)="7431ff8ec7ad3ca3861704af76836e4074ea7aca599dcff11aabad0260663312328113c2e37c020e32063e22030b6a3240c0fa255922a0e7bf74a54ed04957a907299e669bac6d1edc08e13cd8cff98d2ea549c89a6d777ac8ecd40557181bdf2466b1a8d64639327b4e9fce44f6acd96b971507ce2b8290c90a7fe5e5d1463eeeea8fbcf4768e7ce8507a0da6d62ceddd7134e77d1496b76500cf18b2f3d2743d2566601fe9ac0c02e60826d1dd46a3d664fc41542e45c5d925a73a45", 0xbd}], 0x3, &(0x7f0000000b80)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0xd}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xe}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0xf0}, 0x4000) r13 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0xffffffffffffffff, 0x7f, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)='%pS \x00'}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x501000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xb, 0x12, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x10, 0x1, 0x2, 0x41, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000100)='syzkaller\x00', 0x1, 0x10, &(0x7f0000000140)=""/16, 0x41100, 0x8, '\x00', r9, @fallback=0x31, r10, 0x8, &(0x7f00000001c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x1, 0xd, 0xc}, 0x10, r11, r7, 0x1, &(0x7f0000000400)=[r13, r14, r0, r0, r0, r0, r0, r15], &(0x7f00000004c0)=[{0x2, 0x4, 0x10, 0x6}]}, 0x94) 0s ago: executing program 2 (id=11559): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x1, 0x4, 0x4}, 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020752500000000002020206b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000000000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r2}, 0xc) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x50}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0900000001000000080000004000000042000000", @ANYRES32=0x1, @ANYBLOB="00e400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="5f254be2bf91dc7ac75ee226c108000000f5fc9f5d830000005b45bcdc0f2d66afce93375fd1a57f082f39549306652d1652b34e5aee016eb7ff1fcfe4ece38f508436"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r4}, 0x38) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000080000080000000009000000731105000000000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, @cgroup_sock_addr=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000500)={r4, &(0x7f0000000340), 0x0}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000006007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x8, 0x1, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r10 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r9, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r10}, 0x10) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@map=r4, r5, 0x24, 0x2014, 0x0, @value=r10, @void, @void, @void, r8}, 0x20) (async) close(r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, &(0x7f0000000780)}, 0x20) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r6}, 0xc) kernel console output (not intermixed with test programs): un_chr_ioctl cmd 2147767507 [ 273.932186][T12556] device syzkaller0 entered promiscuous mode [ 276.079320][ T24] audit: type=1400 audit(1776264044.659:170): avc: denied { create } for pid=12652 comm="syz.1.3490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 276.334687][T12697] device syzkaller0 entered promiscuous mode [ 276.532959][T12730] device syzkaller0 entered promiscuous mode [ 276.810503][T12760] device syzkaller0 entered promiscuous mode [ 276.822534][ T54] syzkaller0: tun_net_xmit 48 [ 277.094837][T12780] bridge0: port 3(gretap0) entered blocking state [ 277.159908][T12780] bridge0: port 3(gretap0) entered disabled state [ 277.167277][T12780] device gretap0 entered promiscuous mode [ 277.180154][T12780] bridge0: port 3(gretap0) entered blocking state [ 277.186647][T12780] bridge0: port 3(gretap0) entered forwarding state [ 277.465939][ T24] audit: type=1400 audit(1776264046.039:171): avc: denied { create } for pid=12788 comm="syz.1.3529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 277.756042][ T24] audit: type=1400 audit(1776264046.329:172): avc: denied { associate } for pid=12797 comm="syz.4.3531" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 278.324356][T12824] : port 1(ip6gretap0) entered blocking state [ 278.395746][T12824] : port 1(ip6gretap0) entered disabled state [ 278.428769][T12824] device ip6gretap0 entered promiscuous mode [ 279.337300][T12883] device sit0 left promiscuous mode [ 279.675956][T12881] device sit0 entered promiscuous mode [ 281.179897][T12961] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.192389][T12961] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.204299][T12961] device bridge_slave_0 entered promiscuous mode [ 281.280208][T12961] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.287267][T12961] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.419145][T12961] device bridge_slave_1 entered promiscuous mode [ 281.974470][T12961] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.981575][T12961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.988857][T12961] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.995959][T12961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.242515][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.252256][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.393120][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.401218][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.454692][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.471979][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.480954][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.487987][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.495599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 282.506908][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.515670][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.522731][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.533938][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 282.546649][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.592610][ T49] device ip6gretap0 left promiscuous mode [ 282.605990][ T49] : port 1(ip6gretap0) entered disabled state [ 282.639728][T12961] device veth0_vlan entered promiscuous mode [ 282.666332][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 282.681492][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.689746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 282.698115][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 282.715752][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 282.738924][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.747335][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.755329][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.771317][T12961] device veth1_macvtap entered promiscuous mode [ 282.792458][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.800848][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 282.809504][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 282.827994][T13046] device syzkaller0 entered promiscuous mode [ 282.840996][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.849834][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.858240][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.866777][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.893412][T13050] device syzkaller0 entered promiscuous mode [ 282.955111][T13061] device syzkaller0 entered promiscuous mode [ 283.346565][ T24] audit: type=1400 audit(1776264051.919:173): avc: denied { setattr } for pid=13104 comm="syz.0.3618" path="/net/tun" dev="devtmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 283.648604][ T49] nr0: port 1(macsec0) entered disabled state [ 283.663093][ T49] device veth1_macvtap left promiscuous mode [ 286.848806][T13281] device syzkaller0 entered promiscuous mode [ 287.555767][T13293] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.563511][T13293] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.571125][T13293] device bridge_slave_0 entered promiscuous mode [ 287.611772][T13293] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.639273][T13293] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.647165][T13293] device bridge_slave_1 entered promiscuous mode [ 287.857710][T13322] â6±ÿ: renamed from team_slave_1 [ 288.000972][T13293] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.008066][T13293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.015419][T13293] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.022608][T13293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.031086][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.044353][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.114202][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.127194][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.138291][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.158803][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.167121][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.174280][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.182509][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.190993][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.199484][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.206532][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.240623][T13330] device syzkaller0 entered promiscuous mode [ 288.329789][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 288.337971][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.346274][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 288.356418][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.385990][T13293] device veth0_vlan entered promiscuous mode [ 288.407655][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 288.423602][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.442892][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 288.459217][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.484274][T13293] device veth1_macvtap entered promiscuous mode [ 288.505644][T13347] device sit0 entered promiscuous mode [ 288.528831][T13336] +: renamed from team_slave_1 [ 288.657172][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.675653][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.688938][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 288.706642][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.715216][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 288.745915][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.756308][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.781199][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 288.791581][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.826856][T13354] device syzkaller0 entered promiscuous mode [ 290.449073][ T49] device bridge_slave_1 left promiscuous mode [ 290.458434][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.502169][ T49] device bridge_slave_0 left promiscuous mode [ 290.528580][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.573372][ T24] audit: type=1400 audit(1776264059.149:174): avc: denied { create } for pid=13438 comm="syz.3.3703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 290.624054][ T49] device veth0_vlan left promiscuous mode [ 291.220441][T13452] device syzkaller0 entered promiscuous mode [ 292.123044][T13507] device syzkaller0 entered promiscuous mode [ 292.382809][T13528] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 292.397548][T13528] syzkaller0: linktype set to 773 [ 292.486842][T13528] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 292.494209][T13528] syzkaller0: linktype set to 7 [ 292.562444][T13555] : port 1(syz_tun) entered blocking state [ 292.574061][T13555] : port 1(syz_tun) entered disabled state [ 292.580767][T13555] device syz_tun entered promiscuous mode [ 293.139833][T13605] device sit0 left promiscuous mode [ 293.183870][T13606] device sit0 entered promiscuous mode [ 293.410289][T13614] device syzkaller0 entered promiscuous mode [ 293.423391][T13616] device syzkaller0 entered promiscuous mode [ 293.444951][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 293.815456][T13627] device syzkaller0 entered promiscuous mode [ 295.327524][T13707] device wg2 entered promiscuous mode [ 295.349561][T13710] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 295.355405][T13710] syzkaller0: linktype set to 0 [ 295.390310][T13714] device syzkaller0 entered promiscuous mode [ 296.855147][T13785] device syzkaller0 entered promiscuous mode [ 296.912869][T13790] device syzkaller0 entered promiscuous mode [ 297.240335][T13839] device wg2 left promiscuous mode [ 297.249775][T13839] device wg2 entered promiscuous mode [ 298.302824][T13905] device syzkaller0 entered promiscuous mode [ 298.407517][T13924] syz.2.3845[13924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.407573][T13924] syz.2.3845[13924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.525624][T13943] device syzkaller0 entered promiscuous mode [ 302.991886][T14152] device syzkaller0 entered promiscuous mode [ 304.160251][T14189] device syzkaller0 entered promiscuous mode [ 304.931598][T14221] tap0: tun_chr_ioctl cmd 1074025673 [ 307.167535][T14323] device syzkaller0 entered promiscuous mode [ 307.370045][T14335] device wg2 left promiscuous mode [ 307.630807][T14369] device wg2 entered promiscuous mode [ 309.296441][T14428] Ÿë: port 1(vlan1) entered blocking state [ 309.302470][T14428] Ÿë: port 1(vlan1) entered disabled state [ 309.309288][T14428] device vlan1 entered promiscuous mode [ 310.243853][T14483] syz.3.4000 (14483) used obsolete PPPIOCDETACH ioctl [ 310.356907][T14478] device sit0 entered promiscuous mode [ 311.143312][T14500] device syzkaller0 entered promiscuous mode [ 311.714661][T14548] device veth0_vlan left promiscuous mode [ 311.728712][T14548] device veth0_vlan entered promiscuous mode [ 311.743903][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.772746][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.838766][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 311.923011][T14550] device syzkaller0 entered promiscuous mode [ 312.603367][T14619] syz.2.4040[14619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.603426][T14619] syz.2.4040[14619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.029604][T14638] batadv0: tun_chr_ioctl cmd 2148553947 [ 314.591201][T14679] -1: renamed from syzkaller0 [ 316.497463][T14762] @0Ù: renamed from bond_slave_1 [ 318.134831][T14809] device syzkaller0 entered promiscuous mode [ 318.172293][T14812] device sit0 left promiscuous mode [ 319.475769][ T24] audit: type=1400 audit(1776264088.049:175): avc: denied { create } for pid=14869 comm="syz.1.4104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 320.114250][T14903] device syzkaller0 entered promiscuous mode [ 320.681889][T14950] device wg2 left promiscuous mode [ 322.506760][T15021] device veth0_vlan left promiscuous mode [ 322.525102][T15021] device veth0_vlan entered promiscuous mode [ 322.574206][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.586902][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.599069][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.761593][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.769968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.777528][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.980683][T15060] device syzkaller0 entered promiscuous mode [ 323.089149][T15072] device syzkaller0 entered promiscuous mode [ 323.167687][T15078] device syzkaller0 entered promiscuous mode [ 325.862887][T15306] bridge0: port 4(veth0_vlan) entered blocking state [ 325.917303][T15306] bridge0: port 4(veth0_vlan) entered disabled state [ 325.929028][T15306] bridge0: port 4(veth0_vlan) entered blocking state [ 325.935763][T15306] bridge0: port 4(veth0_vlan) entered forwarding state [ 326.483613][T15336] device wg2 entered promiscuous mode [ 327.322865][T15388] €Â0: renamed from pim6reg1 [ 328.234233][T15418] device syzkaller0 entered promiscuous mode [ 328.729250][T15432] device syzkaller0 entered promiscuous mode [ 329.149392][T15456] device syzkaller0 entered promiscuous mode [ 331.821008][T15557] device syzkaller0 entered promiscuous mode [ 333.250177][T15602] device syzkaller0 entered promiscuous mode [ 333.608600][T15632] syz.4.4322[15632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.608656][T15632] syz.4.4322[15632] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.789488][T15645] device syzkaller0 entered promiscuous mode [ 337.629093][T15839] device syzkaller0 entered promiscuous mode [ 338.874408][T15857] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 340.008396][T15900] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 340.068569][T15900] syzkaller0: linktype set to 773 [ 340.246552][T15910] device wg2 entered promiscuous mode [ 340.495551][T15929] erspan0: refused to change device tx_queue_len [ 340.582249][T15929] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.385191][T15976] IPv6: pim6reg1: Disabled Multicast RS [ 343.538997][T16175] geneve1: tun_chr_ioctl cmd 1074025672 [ 343.574689][T16175] geneve1: ignored: set checksum enabled [ 344.329050][T16195] device syzkaller0 entered promiscuous mode [ 344.655390][T16214] device wg2 left promiscuous mode [ 344.837763][T16217] device wg2 entered promiscuous mode [ 344.894833][T16230] device syzkaller0 entered promiscuous mode [ 344.954239][T16218] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.962111][T16218] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.969787][T16218] device bridge_slave_0 entered promiscuous mode [ 344.982061][T16218] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.994736][T16218] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.002554][T16218] device bridge_slave_1 entered promiscuous mode [ 345.387583][T16218] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.394658][T16218] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.401929][T16218] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.408946][T16218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.481805][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.492457][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.501124][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.511284][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.520005][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.532306][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 345.549675][T16275] device syzkaller0 entered promiscuous mode [ 345.564041][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.575118][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 345.582907][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 345.612750][T16218] device veth0_vlan entered promiscuous mode [ 345.703891][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 345.714443][T16218] device veth1_macvtap entered promiscuous mode [ 345.725529][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 345.853905][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 346.261194][T16311] device syzkaller0 entered promiscuous mode [ 346.547426][T16355] device syzkaller0 entered promiscuous mode [ 346.565053][T16355] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 346.607474][T16361] device syzkaller0 entered promiscuous mode [ 347.047885][ T948] device bridge_slave_1 left promiscuous mode [ 347.058016][ T948] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.066400][ T948] device bridge_slave_0 left promiscuous mode [ 347.072867][ T948] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.080809][ T948] device veth0_vlan left promiscuous mode [ 347.315333][T16405] device syzkaller0 entered promiscuous mode [ 347.846432][T16428] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.853904][T16428] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.862051][T16428] device bridge_slave_0 entered promiscuous mode [ 347.889018][T16428] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.896071][T16428] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.995631][T16428] device bridge_slave_1 entered promiscuous mode [ 348.381871][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.395163][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.458822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.505156][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.661049][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.668123][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.713906][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.724737][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.733848][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.740916][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.750801][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.759195][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.767301][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 348.775644][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.814522][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.857029][T16428] device veth0_vlan entered promiscuous mode [ 348.867054][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.880368][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.889793][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.897193][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 348.906034][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 348.926351][T16428] device veth1_macvtap entered promiscuous mode [ 348.946643][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 348.963482][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.972042][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 349.011434][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 349.025362][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 349.269685][T16507] device syzkaller0 entered promiscuous mode [ 350.490423][ T948] device bridge_slave_1 left promiscuous mode [ 350.515779][ T948] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.626465][ T948] device bridge_slave_0 left promiscuous mode [ 350.692604][ T948] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.701131][ T948] device veth1_macvtap left promiscuous mode [ 350.713036][ T948] device veth0_vlan left promiscuous mode [ 351.687258][T16669] device syzkaller0 entered promiscuous mode [ 351.726576][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 352.380887][T16693] device syzkaller0 entered promiscuous mode [ 352.587462][T16701] device syzkaller0 entered promiscuous mode [ 355.378644][T16856] nr0: port 1(macsec0) entered blocking state [ 355.384906][T16856] nr0: port 1(macsec0) entered disabled state [ 355.413324][T16856] device macsec0 entered promiscuous mode [ 356.161559][T16869] device syzkaller0 entered promiscuous mode [ 358.542070][T16977] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.892301][T16979] device syzkaller0 entered promiscuous mode [ 359.819518][T17030] device sit0 left promiscuous mode [ 359.880211][T17029] device sit0 entered promiscuous mode [ 360.692929][T17031] device syzkaller0 entered promiscuous mode [ 360.821376][T17060] device syzkaller0 entered promiscuous mode [ 363.873057][T17113] device syzkaller0 entered promiscuous mode [ 366.649429][T17273] device syzkaller0 entered promiscuous mode [ 366.996145][T17279] device syzkaller0 entered promiscuous mode [ 367.899087][T17380] device syzkaller0 entered promiscuous mode [ 368.181273][T17399] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.448617][T17506] device syzkaller0 entered promiscuous mode [ 373.974982][T17530] device syzkaller0 entered promiscuous mode [ 374.696162][T17562] device wg2 left promiscuous mode [ 374.725795][T17562] device wg2 entered promiscuous mode [ 374.965998][T17577] cgroup: fork rejected by pids controller in /syz2 [ 375.168773][T17588] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 375.194473][T17588] syzkaller0: linktype set to 0 [ 376.120773][T17698] device veth0_vlan left promiscuous mode [ 376.126779][T17698] device veth0_vlan entered promiscuous mode [ 376.145076][T15318] device syz_tun left promiscuous mode [ 376.157379][T15318] : port 1(syz_tun) entered disabled state [ 376.180524][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.192145][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.200535][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.297626][T17712] Ÿë: port 2(veth0_to_team) entered blocking state [ 376.308791][T17712] Ÿë: port 2(veth0_to_team) entered disabled state [ 376.325926][T17712] device veth0_to_team entered promiscuous mode [ 376.574245][T17726] IPv6: pim6reg1: Disabled Multicast RS [ 376.651049][T17717] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.674395][T17717] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.738772][T17717] device bridge_slave_0 entered promiscuous mode [ 376.759175][T17717] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.766344][T17717] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.773889][T17717] device bridge_slave_1 entered promiscuous mode [ 377.011111][T17717] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.018214][T17717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.025610][T17717] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.032640][T17717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.146318][ T948] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.154890][ T948] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.222642][T17757] device syzkaller0 entered promiscuous mode [ 377.311066][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.324476][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.418185][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 377.494512][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 377.516858][ T948] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.523958][ T948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 377.549970][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 377.573537][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 377.588747][ T948] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.595908][ T948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 377.628067][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 377.636225][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 377.644309][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 377.653451][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 377.670362][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 377.678789][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 377.691433][T17717] device veth0_vlan entered promiscuous mode [ 377.716162][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 377.726829][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.744980][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 377.752838][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 377.765687][T17717] device veth1_macvtap entered promiscuous mode [ 377.776850][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 377.803728][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.812663][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 377.833599][ T296] bridge0: port 3(gretap0) entered disabled state [ 377.841869][ T296] device gretap0 left promiscuous mode [ 377.847742][ T296] bridge0: port 3(gretap0) entered disabled state [ 377.866005][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.874498][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.892845][T17780] device syzkaller0 entered promiscuous mode [ 377.931600][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.941096][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 378.069169][ T296] device macsec0 left promiscuous mode [ 378.074920][ T296] nr0: port 1(macsec0) entered disabled state [ 378.087199][ T296] bridge0: port 4(veth0_vlan) entered disabled state [ 378.097563][ T296] device bridge_slave_1 left promiscuous mode [ 378.104100][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.113761][ T296] device bridge_slave_0 left promiscuous mode [ 378.120241][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.141773][ T296] device veth1_macvtap left promiscuous mode [ 378.147960][ T296] device veth0_vlan left promiscuous mode [ 379.057265][T17896] device syzkaller0 entered promiscuous mode [ 383.907062][T18008] device syzkaller0 entered promiscuous mode [ 387.639906][T18065] device syzkaller0 entered promiscuous mode [ 387.896574][T18080] device dummy0 entered promiscuous mode [ 389.732616][T18182] device syzkaller0 entered promiscuous mode [ 391.180993][T18237] â6±ÿ: renamed from team_slave_1 [ 391.640026][T18250] device syzkaller0 entered promiscuous mode [ 394.870749][T18360] device wg2 left promiscuous mode [ 394.891817][T18359] device wg2 entered promiscuous mode [ 394.916395][T18368] bridge0: port 3(ip6gretap0) entered blocking state [ 394.938418][T18368] bridge0: port 3(ip6gretap0) entered disabled state [ 394.988207][T18368] device ip6gretap0 entered promiscuous mode [ 394.994595][T18368] bridge0: port 3(ip6gretap0) entered blocking state [ 395.001310][T18368] bridge0: port 3(ip6gretap0) entered forwarding state [ 395.009164][T18374] device ip6gretap0 left promiscuous mode [ 395.015009][T18374] bridge0: port 3(ip6gretap0) entered disabled state [ 395.983940][T18450] syz.1.5089[18450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.983995][T18450] syz.1.5089[18450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.700695][T18511] device syzkaller0 entered promiscuous mode [ 398.723789][T18578] device syzkaller0 entered promiscuous mode [ 399.120253][T18612] €Â0: renamed from pim6reg1 [ 401.041138][T18696] device syzkaller0 entered promiscuous mode [ 403.169531][T18769] device syzkaller0 entered promiscuous mode [ 403.346647][T18793] device syzkaller0 entered promiscuous mode [ 403.702654][T18832] : port 1(ip6gretap0) entered blocking state [ 403.715578][T18832] : port 1(ip6gretap0) entered disabled state [ 403.729269][T18832] device ip6gretap0 entered promiscuous mode [ 406.597147][T18967] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.616467][T18967] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.840456][T18975] device bridge_slave_1 left promiscuous mode [ 406.846634][T18975] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.854217][T18975] device bridge_slave_0 left promiscuous mode [ 406.860388][T18975] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.220460][T19008] tap0: tun_chr_ioctl cmd 2148553947 [ 407.368220][T19017] FAULT_INJECTION: forcing a failure. [ 407.368220][T19017] name failslab, interval 1, probability 0, space 0, times 1 [ 407.399629][T19017] CPU: 1 PID: 19017 Comm: syz.1.5261 Tainted: G W syzkaller #0 [ 407.408504][T19017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 407.418558][T19017] Call Trace: [ 407.421853][T19017] __dump_stack+0x21/0x24 [ 407.426190][T19017] dump_stack_lvl+0x1a7/0x208 [ 407.430865][T19017] ? show_regs_print_info+0x18/0x18 [ 407.436074][T19017] ? stack_trace_save+0xa6/0xf0 [ 407.440928][T19017] dump_stack+0x15/0x1c [ 407.445083][T19017] should_fail+0x3c1/0x510 [ 407.449504][T19017] ? __d_alloc+0x2d/0x6a0 [ 407.453831][T19017] __should_failslab+0xa4/0xe0 [ 407.458588][T19017] should_failslab+0x9/0x20 [ 407.463095][T19017] kmem_cache_alloc+0x3d/0x2d0 [ 407.467862][T19017] __d_alloc+0x2d/0x6a0 [ 407.472015][T19017] ? _raw_spin_trylock_bh+0x150/0x150 [ 407.477393][T19017] d_alloc_pseudo+0x1d/0x70 [ 407.481890][T19017] alloc_file_pseudo+0xe0/0x200 [ 407.486733][T19017] ? alloc_empty_file_noaccount+0x80/0x80 [ 407.492446][T19017] __anon_inode_getfd+0x26b/0x3d0 [ 407.497471][T19017] ? anon_inode_getfd+0x40/0x40 [ 407.502319][T19017] ? __kasan_check_write+0x14/0x20 [ 407.507437][T19017] ? _raw_spin_lock_bh+0x94/0xf0 [ 407.512373][T19017] anon_inode_getfd+0x31/0x40 [ 407.517043][T19017] btf_new_fd+0x819/0xa00 [ 407.521364][T19017] bpf_btf_load+0x5e/0x70 [ 407.525808][T19017] __se_sys_bpf+0x4ea/0x740 [ 407.530308][T19017] ? __x64_sys_bpf+0x90/0x90 [ 407.534892][T19017] ? debug_smp_processor_id+0x17/0x20 [ 407.540252][T19017] __x64_sys_bpf+0x7b/0x90 [ 407.544661][T19017] do_syscall_64+0x31/0x40 [ 407.549073][T19017] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 407.554953][T19017] RIP: 0033:0x7f798f826819 [ 407.559363][T19017] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 407.578966][T19017] RSP: 002b:00007f798e281028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 407.587387][T19017] RAX: ffffffffffffffda RBX: 00007f798fa9ffa0 RCX: 00007f798f826819 [ 407.595355][T19017] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 407.603326][T19017] RBP: 00007f798e281090 R08: 0000000000000000 R09: 0000000000000000 [ 407.611391][T19017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 407.619366][T19017] R13: 00007f798faa0038 R14: 00007f798fa9ffa0 R15: 00007fff3958d978 [ 407.736426][T19042] device syzkaller0 entered promiscuous mode [ 408.131597][T19076] device syzkaller0 entered promiscuous mode [ 408.459553][T19096] syz.1.5284[19096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.459614][T19096] syz.1.5284[19096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.539918][T19097] device syzkaller0 entered promiscuous mode [ 408.637591][T19118] device syzkaller0 entered promiscuous mode [ 410.148723][T19191] device syzkaller0 entered promiscuous mode [ 410.575118][T19212] device syzkaller0 entered promiscuous mode [ 411.703016][T19271] -: renamed from syzkaller0 [ 411.739159][T19275] device syzkaller0 entered promiscuous mode [ 411.964956][T19295] device veth0_vlan left promiscuous mode [ 411.992564][T19295] device veth0_vlan entered promiscuous mode [ 412.010814][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.036442][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.044883][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.871772][T19776] syz.4.5483[19776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.871898][T19776] syz.4.5483[19776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.776224][T19814] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.795006][T19814] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.821249][T19819] syz.1.5495[19819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.821307][T19819] syz.1.5495[19819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.179659][T19831] syz.1.5499[19831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.194714][T19832] syz.1.5499[19832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.206469][T19832] syz.1.5499[19832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.207232][T19831] syz.1.5499[19831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.442896][T19908] device syzkaller0 entered promiscuous mode [ 421.834849][T19912] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.848585][T19912] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.866615][T19912] device bridge_slave_0 entered promiscuous mode [ 421.874727][T19912] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.888354][T19912] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.906072][T19912] device bridge_slave_1 entered promiscuous mode [ 421.975126][T19928] device syzkaller0 entered promiscuous mode [ 422.258828][T19912] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.265914][T19912] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.273301][T19912] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.280417][T19912] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.397068][T16462] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.404460][T16462] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.412218][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 422.423708][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 422.437776][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 422.452630][T16462] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.459699][T16462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.467544][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 422.478126][T16462] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.485178][T16462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.513870][ T296] device ip6gretap0 left promiscuous mode [ 422.520485][ T296] : port 1(ip6gretap0) entered disabled state [ 422.535055][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 422.547394][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 422.558377][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 422.590412][T19912] device veth0_vlan entered promiscuous mode [ 422.608932][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.658178][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.748857][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.857978][T19912] device veth1_macvtap entered promiscuous mode [ 422.950382][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 423.086247][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 423.104703][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 423.176218][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 423.213598][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 423.883883][ T296] device macsec0 left promiscuous mode [ 423.891390][ T296] nr0: port 1(macsec0) entered disabled state [ 424.006636][ T296] device bridge_slave_1 left promiscuous mode [ 424.070148][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.185757][ T296] device bridge_slave_0 left promiscuous mode [ 424.258476][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.268512][ T296] device veth1_macvtap left promiscuous mode [ 424.274682][ T296] device veth0_vlan left promiscuous mode [ 424.602515][T20051] device syzkaller0 entered promiscuous mode [ 424.631835][T20050] tap0: tun_chr_ioctl cmd 2148553947 [ 424.683596][T20054] device syzkaller0 entered promiscuous mode [ 424.951552][T20074] device syzkaller0 entered promiscuous mode [ 425.555195][T20097] : port 1(ip6gretap0) entered blocking state [ 425.613612][T20097] : port 1(ip6gretap0) entered disabled state [ 425.706199][T20097] device ip6gretap0 entered promiscuous mode [ 425.779491][T20088] device ip6gretap0 left promiscuous mode [ 425.932502][T20088] : port 1(ip6gretap0) entered disabled state [ 427.729340][T20193] +: renamed from team_slave_1 [ 428.871839][T20236] syz.0.5610[20236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.063265][T20289] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.082163][T20289] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.217922][T20294] device bridge_slave_1 left promiscuous mode [ 430.232464][T20294] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.268688][T20294] device bridge_slave_0 left promiscuous mode [ 430.288502][T20294] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.366563][T20426] device syzkaller0 entered promiscuous mode [ 434.495448][T20539] device veth0_vlan left promiscuous mode [ 434.556928][T20539] device veth0_vlan entered promiscuous mode [ 434.702726][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.718357][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.726174][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.885441][T20550] batadv0: tun_chr_ioctl cmd 1074025673 [ 434.895477][T20551] batadv0: tun_chr_ioctl cmd 21731 [ 434.916549][T20551] batadv0: tun_chr_ioctl cmd 21731 [ 434.933487][T20550] batadv0: tun_chr_ioctl cmd 1074025673 [ 436.330025][T20607] device syzkaller0 entered promiscuous mode [ 436.809132][T20656] device veth1_macvtap left promiscuous mode [ 436.830744][T20656] device veth1_macvtap entered promiscuous mode [ 436.858395][T20656] device macsec0 entered promiscuous mode [ 439.688839][T20825] device wg2 left promiscuous mode [ 439.813480][T20825] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.820712][T20825] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.903016][T20829] device bridge_slave_1 left promiscuous mode [ 439.912909][T20829] bridge0: port 2(bridge_slave_1) entered disabled state [ 439.950739][T20829] device bridge_slave_0 left promiscuous mode [ 439.978617][T20829] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.072926][T20835] device wg2 entered promiscuous mode [ 440.085175][T20835] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 440.802519][T20851] device wg2 entered promiscuous mode [ 442.674258][T21016] device sit0 entered promiscuous mode [ 442.833413][T21037] device syzkaller0 entered promiscuous mode [ 443.240933][T21040] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 443.646696][T21116] device syzkaller0 entered promiscuous mode [ 443.841424][T21123] : port 1(ip6gretap0) entered blocking state [ 443.847848][T21123] : port 1(ip6gretap0) entered disabled state [ 443.857417][T21123] device ip6gretap0 entered promiscuous mode [ 443.873593][T21134] device ip6gretap0 left promiscuous mode [ 443.884145][T21134] : port 1(ip6gretap0) entered disabled state [ 444.212781][T21148] ÿÿÿÿÿÿ: renamed from vlan1 [ 446.397564][T21209] device pim6reg1 entered promiscuous mode [ 446.650683][T21204] device sit0 entered promiscuous mode [ 448.229543][T21274] device syzkaller0 entered promiscuous mode [ 449.555517][T21357] â6±ÿ: renamed from team_slave_1 [ 450.146383][T21387] device sit0 left promiscuous mode [ 450.964600][T21482] device syzkaller0 entered promiscuous mode [ 451.391713][T21492] device syzkaller0 entered promiscuous mode [ 452.303160][T21526] device wg2 entered promiscuous mode [ 455.100741][T21619] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 455.208660][T21619] device syzkaller0 entered promiscuous mode [ 456.477133][T21677] device syzkaller0 entered promiscuous mode [ 457.229712][T21706] FAULT_INJECTION: forcing a failure. [ 457.229712][T21706] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 457.257973][T21706] CPU: 0 PID: 21706 Comm: syz.3.6025 Tainted: G W syzkaller #0 [ 457.266853][T21706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 457.276903][T21706] Call Trace: [ 457.280196][T21706] __dump_stack+0x21/0x24 [ 457.284514][T21706] dump_stack_lvl+0x1a7/0x208 [ 457.289194][T21706] ? show_regs_print_info+0x18/0x18 [ 457.294394][T21706] dump_stack+0x15/0x1c [ 457.298544][T21706] should_fail+0x3c1/0x510 [ 457.303122][T21706] should_fail_usercopy+0x1a/0x20 [ 457.308148][T21706] strncpy_from_user+0x24/0x2e0 [ 457.312996][T21706] bpf_prog_load+0x18c/0x14a0 [ 457.317668][T21706] ? avc_has_perm_noaudit+0x260/0x260 [ 457.323033][T21706] ? map_freeze+0x320/0x320 [ 457.327527][T21706] ? vfs_write+0xb27/0xdc0 [ 457.331938][T21706] ? selinux_bpf+0xc7/0xf0 [ 457.336359][T21706] ? security_bpf+0x82/0xa0 [ 457.340849][T21706] __se_sys_bpf+0x49a/0x740 [ 457.345347][T21706] ? __x64_sys_bpf+0x90/0x90 [ 457.349930][T21706] ? debug_smp_processor_id+0x17/0x20 [ 457.355287][T21706] __x64_sys_bpf+0x7b/0x90 [ 457.359706][T21706] do_syscall_64+0x31/0x40 [ 457.364115][T21706] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 457.369997][T21706] RIP: 0033:0x7f6fd0509819 [ 457.374409][T21706] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 457.394010][T21706] RSP: 002b:00007f6fcef64028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 457.402500][T21706] RAX: ffffffffffffffda RBX: 00007f6fd0782fa0 RCX: 00007f6fd0509819 [ 457.410467][T21706] RDX: 0000000000000080 RSI: 0000200000003480 RDI: 0000000000000005 [ 457.418436][T21706] RBP: 00007f6fcef64090 R08: 0000000000000000 R09: 0000000000000000 [ 457.426394][T21706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.434352][T21706] R13: 00007f6fd0783038 R14: 00007f6fd0782fa0 R15: 00007ffc2f045d98 [ 458.206424][T21742] device syzkaller0 entered promiscuous mode [ 459.647860][T21815] ref_ctr_offset mismatch. inode: 0x943 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 460.063883][T21835] device sit0 entered promiscuous mode [ 462.063029][T21887] device syzkaller0 entered promiscuous mode [ 464.627640][T21966] device syzkaller0 entered promiscuous mode [ 465.139175][T22006] device sit0 left promiscuous mode [ 465.235458][T22005] device sit0 entered promiscuous mode [ 465.595164][T22032] device syzkaller0 entered promiscuous mode [ 465.893057][T22068] device syzkaller0 entered promiscuous mode [ 465.913999][T22068] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 467.678660][T22178] device syzkaller0 entered promiscuous mode [ 467.854222][T22188] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 471.349694][ T24] audit: type=1400 audit(1776264239.929:176): avc: denied { create } for pid=22346 comm="syz.2.6213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 472.561603][T22396] tap0: tun_chr_ioctl cmd 1074025680 [ 472.731376][T22407] device syzkaller0 entered promiscuous mode [ 474.580562][T22488] batadv0: tun_chr_ioctl cmd 1074025677 [ 474.617626][T22488] batadv0: linktype set to 804 [ 475.027986][T22521] device veth0_vlan left promiscuous mode [ 475.170453][T22521] device veth0_vlan entered promiscuous mode [ 475.276867][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.308848][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.323650][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 476.050702][T22586] device syzkaller0 entered promiscuous mode [ 476.415806][T22606] device wg2 left promiscuous mode [ 477.239956][T22675] device lo entered promiscuous mode [ 478.173294][T22729] device syzkaller0 entered promiscuous mode [ 478.755003][T22749] device syzkaller0 entered promiscuous mode [ 478.791969][T22749] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 479.089971][T22778] device syzkaller0 entered promiscuous mode [ 479.929492][T22809] device syzkaller0 entered promiscuous mode [ 480.285061][T22836] device syzkaller0 entered promiscuous mode [ 480.381063][T22838] device syzkaller0 entered promiscuous mode [ 480.438168][T22844] device syzkaller0 entered promiscuous mode [ 480.451914][T22836] device syzkaller0 left promiscuous mode [ 480.533397][T22836] device syzkaller0 entered promiscuous mode [ 480.827043][T22873] device syzkaller0 entered promiscuous mode [ 481.743726][T22930] device wg2 left promiscuous mode [ 482.712134][T22964] device syzkaller0 entered promiscuous mode [ 486.721327][T23144] nr0: port 1(macsec0) entered blocking state [ 486.727571][T23144] nr0: port 1(macsec0) entered disabled state [ 486.734207][T23144] device macsec0 entered promiscuous mode [ 487.216664][T23194] tap0: tun_chr_ioctl cmd 1074025673 [ 487.721849][T23220] device veth0_vlan left promiscuous mode [ 487.807866][T23220] device veth0_vlan entered promiscuous mode [ 487.849723][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 487.867357][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 487.883610][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 488.072195][T23250] : port 1(ip6gretap0) entered blocking state [ 488.086196][T23250] : port 1(ip6gretap0) entered disabled state [ 488.189224][T23250] device ip6gretap0 entered promiscuous mode [ 488.325010][T23267] device ip6gretap0 left promiscuous mode [ 488.334352][T23267] : port 1(ip6gretap0) entered disabled state [ 489.386389][T23330] device sit0 entered promiscuous mode [ 491.166318][T23441] device syzkaller0 entered promiscuous mode [ 494.586009][T23589] device syzkaller0 entered promiscuous mode [ 497.458435][T23660] device syzkaller0 entered promiscuous mode [ 503.406294][T23861] device syzkaller0 entered promiscuous mode [ 505.126611][T23942] tap0: tun_chr_ioctl cmd 1074025677 [ 505.189812][T23942] tap0: linktype set to 1 [ 505.258095][T23946] tap0: tun_chr_ioctl cmd 2147767507 [ 505.993529][T23984] device syzkaller0 entered promiscuous mode [ 506.371422][T24028] device syzkaller0 entered promiscuous mode [ 506.592399][T24048] device wg2 entered promiscuous mode [ 507.865921][T24128] device vlan0 entered promiscuous mode [ 508.231548][T24144] device syzkaller0 entered promiscuous mode [ 508.437572][T24159] bridge0: port 3(veth1_macvtap) entered blocking state [ 508.457275][T24159] bridge0: port 3(veth1_macvtap) entered disabled state [ 508.566883][T24165] device syzkaller0 entered promiscuous mode [ 508.725304][T24187] device syzkaller0 entered promiscuous mode [ 508.900047][T24203] +: renamed from team_slave_1 [ 509.056945][T24204] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.713884][T24266] device dummy0 entered promiscuous mode [ 509.885842][T24268] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 510.288071][T24291] device syzkaller0 entered promiscuous mode [ 510.482314][T24298] device sit0 left promiscuous mode [ 510.813982][T24331] device sit0 left promiscuous mode [ 511.209393][T24385] device veth1_macvtap left promiscuous mode [ 511.227814][T24385] device macsec0 left promiscuous mode [ 513.290265][T24549] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 513.487378][T24571] device syzkaller0 entered promiscuous mode [ 513.820046][T24585] : port 1(ip6gretap0) entered blocking state [ 513.832968][T24585] : port 1(ip6gretap0) entered disabled state [ 513.879747][T24585] device ip6gretap0 entered promiscuous mode [ 513.977237][T24589] device ip6gretap0 left promiscuous mode [ 513.985353][T24589] : port 1(ip6gretap0) entered disabled state [ 514.169721][T24588] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.177922][T24588] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.197348][T24588] device bridge_slave_0 entered promiscuous mode [ 514.209106][T24588] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.218349][T24588] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.261806][T24588] device bridge_slave_1 entered promiscuous mode [ 514.429336][T24588] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.436399][T24588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 514.443713][T24588] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.450748][T24588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 514.481000][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 514.489447][T16462] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.496752][T16462] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.515853][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 514.524692][T16462] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.531755][T16462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 514.756753][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 514.778635][T16462] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.785712][T16462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 514.857721][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 514.866476][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 514.990692][ T296] device ip6gretap0 left promiscuous mode [ 514.996535][ T296] : port 1(ip6gretap0) entered disabled state [ 515.080750][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 515.155620][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 515.164312][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.174047][T24588] device veth0_vlan entered promiscuous mode [ 515.186966][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 515.203223][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.240118][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 515.249726][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 515.259840][T24588] device veth1_macvtap entered promiscuous mode [ 515.271084][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 515.289116][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 515.319288][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 515.354523][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 515.373253][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 515.981432][T24657] device syzkaller0 entered promiscuous mode [ 516.011173][T24658] device syzkaller0 entered promiscuous mode [ 516.061500][ T296] device veth0_to_team left promiscuous mode [ 516.067594][ T296] Ÿë: port 2(veth0_to_team) entered disabled state [ 516.075571][ T296] device vlan1 left promiscuous mode [ 516.081002][ T296] Ÿë: port 1(vlan1) entered disabled state [ 516.087739][ T296] device veth1_macvtap left promiscuous mode [ 516.093984][ T296] device veth0_vlan left promiscuous mode [ 516.542338][T24682] device syzkaller0 entered promiscuous mode [ 516.817792][T24713] nr0: port 1(macsec0) entered blocking state [ 516.823920][T24713] nr0: port 1(macsec0) entered forwarding state [ 516.847771][T24713] device nr0 entered promiscuous mode [ 517.218606][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 518.183258][T24769] device syzkaller0 entered promiscuous mode [ 523.937648][T25005] device syzkaller0 entered promiscuous mode [ 524.843548][T25066] device sit0 left promiscuous mode [ 524.954635][T25067] device sit0 entered promiscuous mode [ 525.217737][T25094] IPv6: pim6reg1: Disabled Multicast RS [ 526.242526][T25137] device pim6reg1 entered promiscuous mode [ 527.969795][T25225] device syzkaller0 entered promiscuous mode [ 528.921318][T25308] FAULT_INJECTION: forcing a failure. [ 528.921318][T25308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 528.978442][T25308] CPU: 1 PID: 25308 Comm: syz.1.7076 Tainted: G W syzkaller #0 [ 528.987326][T25308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 528.997368][T25308] Call Trace: [ 529.000648][T25308] __dump_stack+0x21/0x24 [ 529.004952][T25308] dump_stack_lvl+0x1a7/0x208 [ 529.009718][T25308] ? show_regs_print_info+0x18/0x18 [ 529.014895][T25308] ? sched_clock_cpu+0x1b/0x3d0 [ 529.019723][T25308] ? sched_clock_cpu+0x1b/0x3d0 [ 529.024546][T25308] dump_stack+0x15/0x1c [ 529.028683][T25308] should_fail+0x3c1/0x510 [ 529.033084][T25308] should_fail_usercopy+0x1a/0x20 [ 529.038097][T25308] copy_fpstate_to_sigframe+0x898/0xbb0 [ 529.043622][T25308] ? fpregs_set+0x5d0/0x5d0 [ 529.048104][T25308] ? _raw_spin_unlock_irq+0x4e/0x70 [ 529.053277][T25308] ? get_signal+0x1238/0x12e0 [ 529.057928][T25308] ? fpu__alloc_mathframe+0x88/0x150 [ 529.063186][T25308] arch_do_signal_or_restart+0x616/0x11d0 [ 529.068881][T25308] ? __kasan_check_write+0x14/0x20 [ 529.074056][T25308] ? mutex_lock+0x92/0xf0 [ 529.078357][T25308] ? mutex_trylock+0xa0/0xa0 [ 529.082919][T25308] ? __fget_files+0x2c4/0x320 [ 529.087596][T25308] ? __ia32_sys_rt_sigreturn+0x730/0x730 [ 529.093206][T25308] ? fput_many+0x15a/0x1a0 [ 529.097768][T25308] ? __ia32_sys_read+0x90/0x90 [ 529.102520][T25308] exit_to_user_mode_loop+0xa2/0xe0 [ 529.107715][T25308] exit_to_user_mode_prepare+0x76/0xa0 [ 529.113171][T25308] syscall_exit_to_user_mode+0x1d/0x40 [ 529.118615][T25308] do_syscall_64+0x3d/0x40 [ 529.123010][T25308] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 529.128878][T25308] RIP: 0033:0x7f798f7e704e [ 529.133276][T25308] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 529.152954][T25308] RSP: 002b:00007f798e280fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 529.161343][T25308] RAX: 0000000000000001 RBX: 00007f798e2816c0 RCX: 00007f798f7e704e [ 529.169289][T25308] RDX: 0000000000000001 RSI: 00007f798e281090 RDI: 0000000000000005 [ 529.177240][T25308] RBP: 00007f798e281090 R08: 0000000000000000 R09: 0000000000000000 [ 529.185185][T25308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 529.193131][T25308] R13: 00007f798faa0038 R14: 00007f798fa9ffa0 R15: 00007fff3958d978 [ 529.268095][T25314] device syzkaller0 entered promiscuous mode [ 530.447305][T25400] tap0: tun_chr_ioctl cmd 35111 [ 530.647078][T25400] device syzkaller0 entered promiscuous mode [ 533.556471][T25608] device veth0_vlan left promiscuous mode [ 533.570573][T25608] device veth0_vlan entered promiscuous mode [ 533.655714][T25637] @ÿ: renamed from bond_slave_0 [ 536.410173][ T24] audit: type=1400 audit(1776264304.989:177): avc: denied { create } for pid=25827 comm="syz.4.7229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 536.520611][ T24] audit: type=1400 audit(1776264305.029:178): avc: denied { create } for pid=25828 comm="syz.2.7230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 537.485925][T25871] @ÿ: renamed from bond_slave_0 [ 538.981374][T25980] device syzkaller0 entered promiscuous mode [ 539.986959][T26028] device syzkaller0 entered promiscuous mode [ 540.164875][T26041] device syzkaller0 entered promiscuous mode [ 542.139274][T26141] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.146350][T26141] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.198711][T26141] device bridge_slave_0 entered promiscuous mode [ 542.261757][T26141] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.347321][T26141] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.530075][T26141] device bridge_slave_1 entered promiscuous mode [ 542.905250][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 542.913504][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 543.126981][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 543.135479][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 543.145391][T16462] bridge0: port 1(bridge_slave_0) entered blocking state [ 543.152466][T16462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 543.160006][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 543.168367][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 543.176619][T16462] bridge0: port 2(bridge_slave_1) entered blocking state [ 543.183665][T16462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 543.191227][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 543.199424][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 543.239326][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 543.286075][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 543.332310][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.342745][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.354694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 543.369734][T26141] device veth0_vlan entered promiscuous mode [ 543.393198][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 543.422194][T26141] device veth1_macvtap entered promiscuous mode [ 543.433984][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 543.451828][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 544.793771][T26296] device sit0 entered promiscuous mode [ 545.893451][T26345] device syzkaller0 entered promiscuous mode [ 546.442186][T26407] device syzkaller0 entered promiscuous mode [ 550.137524][T26571] device syzkaller0 entered promiscuous mode [ 551.645532][T26641] device syzkaller0 entered promiscuous mode [ 551.928482][T26655] device syzkaller0 entered promiscuous mode [ 555.307869][T26800] device veth1_macvtap left promiscuous mode [ 559.621920][T26992] device syzkaller0 entered promiscuous mode [ 559.736318][T27001] device sit0 left promiscuous mode [ 559.987729][T27008] device syzkaller0 entered promiscuous mode [ 560.048263][T27008] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 560.661421][T27019] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.672177][T27019] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.685372][T27019] device bridge_slave_0 entered promiscuous mode [ 560.730804][T27019] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.740228][T27019] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.750490][T27019] device bridge_slave_1 entered promiscuous mode [ 560.875875][T27019] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.882949][T27019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.890237][T27019] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.897243][T27019] bridge0: port 1(bridge_slave_0) entered forwarding state [ 560.918517][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.929306][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.955235][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 560.978969][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 561.003116][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 561.012666][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 561.021556][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 561.029085][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 561.055489][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 561.064525][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 561.073452][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 561.080530][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 561.107941][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 561.116189][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 561.126823][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 561.135005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 561.153011][T27019] device veth0_vlan entered promiscuous mode [ 561.166911][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 561.175621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 561.184557][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 561.192686][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 561.201036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 561.208717][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 561.220367][T27019] device veth1_macvtap entered promiscuous mode [ 561.230033][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 561.239073][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 561.247370][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 561.270883][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 561.279955][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 561.288811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 561.297275][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 561.850809][T27117] device sit0 left promiscuous mode [ 562.302795][T27138] device syzkaller0 entered promiscuous mode [ 562.890879][ T49] device bridge_slave_1 left promiscuous mode [ 562.912113][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.979088][ T49] device bridge_slave_0 left promiscuous mode [ 562.985339][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.135867][ T49] device veth1_macvtap left promiscuous mode [ 563.956242][T27195] device syzkaller0 entered promiscuous mode [ 564.923534][T27279] bridge0: port 3(gretap0) entered blocking state [ 564.934317][T27279] bridge0: port 3(gretap0) entered disabled state [ 564.950357][T27279] device gretap0 entered promiscuous mode [ 564.956449][T27279] bridge0: port 3(gretap0) entered blocking state [ 564.962918][T27279] bridge0: port 3(gretap0) entered forwarding state [ 566.914192][T27415] device syzkaller0 entered promiscuous mode [ 571.146965][T27563] device syzkaller0 entered promiscuous mode [ 572.279951][T27635] device sit0 entered promiscuous mode [ 572.307920][T27633] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 573.539090][T27728] tap0: tun_chr_ioctl cmd 1074025681 [ 574.810716][T27841] @ÿ: renamed from bond_slave_0 [ 575.459547][T27886] device bridge_slave_0 entered promiscuous mode [ 575.524406][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 576.847308][T27908] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.854544][T27908] bridge0: port 1(bridge_slave_0) entered disabled state [ 576.862148][T27908] device bridge_slave_0 entered promiscuous mode [ 576.872870][T27908] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.883721][T27908] bridge0: port 2(bridge_slave_1) entered disabled state [ 576.891794][T27908] device bridge_slave_1 entered promiscuous mode [ 577.084933][T27939] device syzkaller0 entered promiscuous mode [ 577.861359][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 577.869632][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 577.888753][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 577.897440][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 577.906294][ T948] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.913368][ T948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 577.931854][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 577.940560][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 577.949079][ T948] bridge0: port 2(bridge_slave_1) entered blocking state [ 577.956176][ T948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 577.963604][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 577.971887][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 577.979909][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 577.988539][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 578.004572][T27908] device veth0_vlan entered promiscuous mode [ 578.024264][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 578.031959][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 578.040432][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 578.048828][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 578.056930][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 578.065196][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 578.072808][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 578.117595][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 578.126336][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 578.291913][T27908] device veth1_macvtap entered promiscuous mode [ 578.338370][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 578.346055][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 578.368703][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 578.499387][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 578.509088][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 579.728932][T28010] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x37 [ 579.936593][T28025] device sit0 entered promiscuous mode [ 580.433406][ T7] device macsec0 left promiscuous mode [ 580.439095][ T7] nr0: port 1(macsec0) entered disabled state [ 580.551072][ T7] device veth1_macvtap left promiscuous mode [ 580.648685][ T7] device veth0_vlan left promiscuous mode [ 583.486278][T28293] syzkaller0: refused to change device tx_queue_len [ 583.514886][T28298] device syzkaller0 entered promiscuous mode [ 583.614363][T28305] device sit0 left promiscuous mode [ 585.000170][T28401] device syzkaller0 entered promiscuous mode [ 585.737926][T28436] device sit0 left promiscuous mode [ 585.801971][T28436] device sit0 entered promiscuous mode [ 586.169453][T28475] tap0: tun_chr_ioctl cmd 1074025675 [ 586.248692][T28475] tap0: persist enabled [ 586.257024][T28472] tap0: tun_chr_ioctl cmd 1074025675 [ 586.265226][T28472] tap0: persist disabled [ 586.557626][T28488] device syzkaller0 entered promiscuous mode [ 586.748538][T28488] syzkaller0: tun_net_xmit 1280 [ 591.768206][T28754] device syzkaller0 entered promiscuous mode [ 592.850890][T28796] syzkaller0: refused to change device tx_queue_len [ 593.725567][T28806] device syzkaller0 entered promiscuous mode [ 594.683780][T28848] device syzkaller0 entered promiscuous mode [ 596.376554][T28924] tap0: tun_chr_ioctl cmd 1074025681 [ 597.228817][T29012] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 597.234871][T29012] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 598.729050][ T24] audit: type=1400 audit(1776264367.299:179): avc: denied { create } for pid=29048 comm="syz.2.8154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 600.882550][T29142] device syzkaller0 entered promiscuous mode [ 601.059781][ T6628] syzkaller0: tun_net_xmit 48 [ 601.806929][T29185] device syzkaller0 entered promiscuous mode [ 602.149751][T29224] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.157000][T29224] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.175022][T29224] device bridge_slave_1 left promiscuous mode [ 602.181257][T29224] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.189091][T29224] device bridge_slave_0 left promiscuous mode [ 602.195374][T29224] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.445404][T29438] sit0: mtu greater than device maximum [ 606.248659][T29482] ªªªªªª™™: renamed from vlan0 [ 606.276046][T29497] device syzkaller0 entered promiscuous mode [ 606.373502][T29507] device syzkaller0 entered promiscuous mode [ 607.624255][T29595] device syzkaller0 entered promiscuous mode [ 607.783486][T29638] device veth1_macvtap left promiscuous mode [ 607.791620][T29638] device veth1_macvtap entered promiscuous mode [ 607.798924][T29638] device macsec0 entered promiscuous mode [ 607.876344][T29647] device syzkaller0 entered promiscuous mode [ 608.735133][T29711] device syzkaller0 entered promiscuous mode [ 608.749099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 609.100467][T29733] device syzkaller0 entered promiscuous mode [ 609.811168][T29791] device syzkaller0 entered promiscuous mode [ 611.308536][T29851] syz.2.8390[29851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.308588][T29851] syz.2.8390[29851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.446609][T29848] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.466620][T29848] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.474300][T29848] device bridge_slave_0 entered promiscuous mode [ 611.482876][T29848] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.489943][T29848] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.497380][T29848] device bridge_slave_1 entered promiscuous mode [ 611.821568][T29848] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.828652][T29848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 611.835924][T29848] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.842960][T29848] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.084951][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.093919][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 612.126550][T29874] device syzkaller0 entered promiscuous mode [ 612.136109][T29874] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 612.225302][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 612.250615][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 612.354445][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 612.471898][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 612.480526][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.487576][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.495310][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 612.504513][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 612.550028][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.557115][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 612.574324][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 612.588043][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 612.601741][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 612.616832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 612.737929][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 612.797807][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 613.336006][T29848] device veth0_vlan entered promiscuous mode [ 613.343269][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 613.351838][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 613.360435][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 613.367979][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 613.441565][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 613.450295][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 613.464256][T29848] device veth1_macvtap entered promiscuous mode [ 613.475372][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 613.483995][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 613.492651][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 613.512358][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 613.520845][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 613.602181][T29919] 7B’ç÷ï: renamed from syzkaller0 [ 614.863662][T29949] device syzkaller0 entered promiscuous mode [ 615.377020][T29968] device syzkaller0 entered promiscuous mode [ 616.317216][T30005] device syzkaller0 entered promiscuous mode [ 616.422734][T30018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 616.941561][T30046] device macsec0 entered promiscuous mode [ 616.952739][T30046] device veth1_macvtap left promiscuous mode [ 620.349397][T30146] device wg2 entered promiscuous mode [ 621.007459][T30162] device syzkaller0 entered promiscuous mode [ 621.127997][T30177] device syz_tun entered promiscuous mode [ 622.022339][T30199] device sit0 entered promiscuous mode [ 624.857614][T30296] device wg2 entered promiscuous mode [ 626.898103][T30423] device lo entered promiscuous mode [ 627.620982][T30470] device syzkaller0 entered promiscuous mode [ 627.871903][T30475] device wg2 entered promiscuous mode [ 628.352664][T30514] device wg2 entered promiscuous mode [ 628.367663][T30527] €Â0: renamed from pim6reg1 [ 629.446357][T30608] nr0: port 1(macsec0) entered blocking state [ 629.453118][T30608] nr0: port 1(macsec0) entered disabled state [ 629.971760][T30632] device wg2 entered promiscuous mode [ 631.910131][T30716] device syzkaller0 entered promiscuous mode [ 633.247906][T30775] device syzkaller0 entered promiscuous mode [ 633.307250][T30782] device syzkaller0 entered promiscuous mode [ 633.414135][T30792] device syzkaller0 entered promiscuous mode [ 634.413772][T30837] device syzkaller0 entered promiscuous mode [ 634.622316][T30867] veth1_to_batadv: mtu greater than device maximum [ 634.648168][T30870] device sit0 left promiscuous mode [ 635.461704][T30913] device syzkaller0 entered promiscuous mode [ 636.885735][T30965] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.928357][T30965] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.935872][T30965] device bridge_slave_0 entered promiscuous mode [ 636.944847][T30965] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.952120][T30965] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.959969][T30965] device bridge_slave_1 entered promiscuous mode [ 637.217179][T30965] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.224276][T30965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 637.231593][T30965] bridge0: port 1(bridge_slave_0) entered blocking state [ 637.238623][T30965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 637.505685][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 637.519670][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 637.539182][ T948] bridge0: port 2(bridge_slave_1) entered disabled state [ 637.570276][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 637.589296][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 637.597614][ T948] bridge0: port 2(bridge_slave_1) entered blocking state [ 637.604803][ T948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 637.612561][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 637.621084][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 637.638691][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 637.646993][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 637.671594][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 637.682563][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 637.700365][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 637.708438][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 637.716685][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 637.724768][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 637.743673][T30965] device veth0_vlan entered promiscuous mode [ 637.761688][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 637.770735][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 637.782394][T30965] device veth1_macvtap entered promiscuous mode [ 637.792953][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 637.800890][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 637.810698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 637.827298][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 637.836169][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 637.913319][T31009] device syzkaller0 entered promiscuous mode [ 638.172991][T31039] device syzkaller0 entered promiscuous mode [ 638.241210][T16462] bridge0: port 3(gretap0) entered disabled state [ 638.252947][T16462] device gretap0 left promiscuous mode [ 638.259057][T16462] bridge0: port 3(gretap0) entered disabled state [ 638.379553][T16462] nr0: port 1(macsec0) entered disabled state [ 638.388620][T16462] device bridge_slave_1 left promiscuous mode [ 638.414295][T16462] bridge0: port 2(bridge_slave_1) entered disabled state [ 638.429966][T16462] device bridge_slave_0 left promiscuous mode [ 638.443014][T16462] bridge0: port 1(bridge_slave_0) entered disabled state [ 638.461625][T16462] device veth1_macvtap left promiscuous mode [ 639.276641][T31124] device syzkaller0 entered promiscuous mode [ 640.305193][T31174] device syzkaller0 entered promiscuous mode [ 641.393460][T31216] device syzkaller0 entered promiscuous mode [ 641.597346][T31233] device syzkaller0 entered promiscuous mode [ 641.628829][T31238] syz.0.8805[31238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.628890][T31238] syz.0.8805[31238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.252311][T31274] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 642.459677][T31299] syzkaller0: tun_chr_ioctl cmd 2147767511 [ 642.572183][T31314] device syzkaller0 entered promiscuous mode [ 643.295467][T31349] device syzkaller0 entered promiscuous mode [ 643.436013][T31353] tap0: tun_chr_ioctl cmd 1074025680 [ 644.811483][T31445] device sit0 left promiscuous mode [ 644.865074][T31445] â6±ÿ: renamed from team_slave_1 [ 644.908583][T31445] device sit0 entered promiscuous mode [ 645.230270][T31457] device syzkaller0 entered promiscuous mode [ 645.569480][T31489] device sit0 entered promiscuous mode [ 645.830000][T31516] batadv0: tun_chr_ioctl cmd 1074025677 [ 645.835778][T31516] batadv0: linktype set to 776 [ 646.710055][T31569] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 646.749388][T31569] device syzkaller0 entered promiscuous mode [ 647.454537][T31597] device wg2 left promiscuous mode [ 649.521262][ T24] audit: type=1400 audit(1776264418.099:180): avc: denied { setattr } for pid=31721 comm="syz.1.8942" path="pipe:[122392]" dev="pipefs" ino=122392 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 651.020865][T31833] FAULT_INJECTION: forcing a failure. [ 651.020865][T31833] name failslab, interval 1, probability 0, space 0, times 0 [ 651.151786][T31835] ref_ctr_offset mismatch. inode: 0x6e8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 651.168885][T31833] CPU: 0 PID: 31833 Comm: syz.2.8975 Tainted: G W syzkaller #0 [ 651.177778][T31833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 651.187838][T31833] Call Trace: [ 651.191153][T31833] __dump_stack+0x21/0x24 [ 651.195477][T31833] dump_stack_lvl+0x1a7/0x208 [ 651.200157][T31833] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 651.206303][T31833] ? show_regs_print_info+0x18/0x18 [ 651.211498][T31833] dump_stack+0x15/0x1c [ 651.215654][T31833] should_fail+0x3c1/0x510 [ 651.220101][T31833] ? __build_skb+0x2d/0x310 [ 651.224600][T31833] __should_failslab+0xa4/0xe0 [ 651.229359][T31833] should_failslab+0x9/0x20 [ 651.233856][T31833] kmem_cache_alloc+0x3d/0x2d0 [ 651.238607][T31833] __build_skb+0x2d/0x310 [ 651.242933][T31833] build_skb+0x24/0x200 [ 651.247145][T31833] ? tun_get_user+0x7fb/0x3270 [ 651.251919][T31833] tun_get_user+0x814/0x3270 [ 651.256507][T31833] ? tun_do_read+0x1c70/0x1c70 [ 651.261281][T31833] ? __irq_exit_rcu+0x40/0x150 [ 651.266195][T31833] ? irq_exit_rcu+0x9/0x10 [ 651.270611][T31833] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 651.276442][T31833] ? tun_chr_write_iter+0x192/0x270 [ 651.281820][T31833] ? tun_get_user+0x11/0x3270 [ 651.286515][T31833] tun_chr_write_iter+0x1bf/0x270 [ 651.291517][T31833] vfs_write+0x758/0xdc0 [ 651.295735][T31833] ? kernel_write+0x3c0/0x3c0 [ 651.300395][T31833] ? __fget_files+0x2c4/0x320 [ 651.305054][T31833] ? __fdget_pos+0x1f7/0x380 [ 651.309805][T31833] ? ksys_write+0x71/0x250 [ 651.314554][T31833] ksys_write+0x149/0x250 [ 651.318881][T31833] ? __ia32_sys_read+0x90/0x90 [ 651.323633][T31833] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 651.329698][T31833] ? __kasan_check_read+0x11/0x20 [ 651.334798][T31833] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 651.340843][T31833] __x64_sys_write+0x7b/0x90 [ 651.345422][T31833] do_syscall_64+0x31/0x40 [ 651.349848][T31833] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 651.355717][T31833] RIP: 0033:0x7f4fcd2e6819 [ 651.360110][T31833] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 651.379697][T31833] RSP: 002b:00007f4fcbd41028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 651.388093][T31833] RAX: ffffffffffffffda RBX: 00007f4fcd55ffa0 RCX: 00007f4fcd2e6819 [ 651.396129][T31833] RDX: 0000000000000015 RSI: 0000200000000300 RDI: 00000000000000c8 [ 651.404075][T31833] RBP: 00007f4fcbd41090 R08: 0000000000000000 R09: 0000000000000000 [ 651.412022][T31833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 651.420057][T31833] R13: 00007f4fcd560038 R14: 00007f4fcd55ffa0 R15: 00007ffdac6fd588 [ 651.944651][T31869] syz.3.8986[31869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.944701][T31869] syz.3.8986[31869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.063834][T31869] device syzkaller0 entered promiscuous mode [ 652.236971][T31888] FAULT_INJECTION: forcing a failure. [ 652.236971][T31888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 652.258556][T31888] CPU: 0 PID: 31888 Comm: syz.0.8992 Tainted: G W syzkaller #0 [ 652.267510][T31888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 652.277646][T31888] Call Trace: [ 652.280927][T31888] __dump_stack+0x21/0x24 [ 652.285231][T31888] dump_stack_lvl+0x1a7/0x208 [ 652.289897][T31888] ? thaw_kernel_threads+0x220/0x220 [ 652.295171][T31888] ? __irq_exit_rcu+0x40/0x150 [ 652.299912][T31888] ? show_regs_print_info+0x18/0x18 [ 652.305081][T31888] ? irq_exit_rcu+0x9/0x10 [ 652.309471][T31888] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 652.315254][T31888] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 652.321406][T31888] dump_stack+0x15/0x1c [ 652.325549][T31888] should_fail+0x3c1/0x510 [ 652.329940][T31888] should_fail_usercopy+0x1a/0x20 [ 652.334938][T31888] _copy_to_user+0x20/0x90 [ 652.339337][T31888] simple_read_from_buffer+0xe9/0x160 [ 652.344686][T31888] proc_fail_nth_read+0x1a6/0x220 [ 652.349686][T31888] ? proc_fault_inject_write+0x310/0x310 [ 652.355289][T31888] ? vfs_read+0x1f5/0xa60 [ 652.359594][T31888] ? proc_fault_inject_write+0x310/0x310 [ 652.365195][T31888] vfs_read+0x209/0xa60 [ 652.369334][T31888] ? kernel_read+0x70/0x70 [ 652.373987][T31888] ? __irq_exit_rcu+0x40/0x150 [ 652.378726][T31888] ? irq_exit_rcu+0x9/0x10 [ 652.383116][T31888] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 652.388898][T31888] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 652.395031][T31888] ksys_read+0x149/0x250 [ 652.399246][T31888] ? vfs_write+0xdc0/0xdc0 [ 652.403637][T31888] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 652.409688][T31888] ? debug_smp_processor_id+0x17/0x20 [ 652.415042][T31888] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 652.421084][T31888] __x64_sys_read+0x7b/0x90 [ 652.425561][T31888] do_syscall_64+0x31/0x40 [ 652.429961][T31888] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 652.435831][T31888] RIP: 0033:0x7f60dc46904e [ 652.440222][T31888] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 652.459899][T31888] RSP: 002b:00007f60daf02fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.468290][T31888] RAX: ffffffffffffffda RBX: 00007f60daf036c0 RCX: 00007f60dc46904e [ 652.476237][T31888] RDX: 000000000000000f RSI: 00007f60daf030a0 RDI: 0000000000000006 [ 652.484192][T31888] RBP: 00007f60daf03090 R08: 0000000000000000 R09: 0000000000000000 [ 652.492140][T31888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.500087][T31888] R13: 00007f60dc722038 R14: 00007f60dc721fa0 R15: 00007ffd5496e3f8 [ 652.744369][T31911] device sit0 left promiscuous mode [ 652.827784][T31911] device sit0 entered promiscuous mode [ 653.552154][T31925] device syzkaller0 entered promiscuous mode [ 654.088772][T31957] : port 1(ip6gretap0) entered blocking state [ 654.098958][T31957] : port 1(ip6gretap0) entered disabled state [ 654.140524][T31957] device ip6gretap0 entered promiscuous mode [ 660.251171][T32091] device syzkaller0 entered promiscuous mode [ 661.090411][T32133] device syzkaller0 entered promiscuous mode [ 661.408627][T32158] device syzkaller0 entered promiscuous mode [ 663.127752][T32253] device syzkaller0 entered promiscuous mode [ 667.482795][T32393] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.490106][T32393] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.520971][T32396] device bridge_slave_1 left promiscuous mode [ 667.527170][T32396] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.558255][T32396] device bridge_slave_0 left promiscuous mode [ 667.598498][T32396] bridge0: port 1(bridge_slave_0) entered disabled state [ 671.789211][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 672.152038][T32577] tap0: tun_chr_ioctl cmd 2147767520 [ 672.182480][T32577] tap0: tun_chr_ioctl cmd 1074812118 [ 673.294458][T32633] device syzkaller0 entered promiscuous mode [ 674.119954][T32678] device syzkaller0 entered promiscuous mode [ 674.911115][T32765] device syzkaller0 entered promiscuous mode [ 675.139573][ T317] device syzkaller0 entered promiscuous mode [ 675.838594][ T363] device syzkaller0 entered promiscuous mode [ 676.389771][ T410] device syzkaller0 entered promiscuous mode [ 677.200748][ T432] device wg2 left promiscuous mode [ 677.309092][ T440] device sit0 left promiscuous mode [ 677.830359][ T492] device batadv_slave_1 entered promiscuous mode [ 677.941792][ T502] device lo entered promiscuous mode [ 678.096427][ T506] device wg2 entered promiscuous mode [ 681.184443][ T744] tap0: tun_chr_ioctl cmd 35111 [ 681.698690][ T788] tun1: tun_chr_ioctl cmd 2147767506 [ 682.342608][ T831] device syzkaller0 entered promiscuous mode [ 684.492127][ T929] device syzkaller0 entered promiscuous mode [ 684.706990][ T959] Ÿë: port 1(veth0_to_team) entered blocking state [ 684.741386][ T959] Ÿë: port 1(veth0_to_team) entered disabled state [ 684.761196][ T959] device veth0_to_team entered promiscuous mode [ 688.263792][ T1169] device sit0 entered promiscuous mode [ 688.457149][ T1184] device syzkaller0 entered promiscuous mode [ 689.134160][ T1227] device syzkaller0 entered promiscuous mode [ 690.008206][ T1305] device sit0 left promiscuous mode [ 690.083081][ T1297] device sit0 entered promiscuous mode [ 691.161415][ T1383] syz.4.9558[1383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.161518][ T1383] syz.4.9558[1383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.260465][ T1388] device syzkaller0 entered promiscuous mode [ 692.100033][ T1425] device syzkaller0 entered promiscuous mode [ 692.149715][ T1432] Ÿë: port 1(vlan1) entered blocking state [ 692.168377][ T1432] Ÿë: port 1(vlan1) entered disabled state [ 692.175660][ T1432] device vlan1 entered promiscuous mode [ 693.298827][ T1522] syz.2.9595[1522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 693.298895][ T1522] syz.2.9595[1522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.414413][ T1567] sit0: mtu greater than device maximum [ 695.740211][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.747271][ T1604] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.755298][ T1604] device bridge_slave_0 entered promiscuous mode [ 695.762339][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.769438][ T1604] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.776874][ T1604] device bridge_slave_1 entered promiscuous mode [ 696.341778][ T1656] ªªªªªª: renamed from syzkaller0 [ 696.583491][ T1604] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.591456][ T1604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.598737][ T1604] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.605755][ T1604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.644795][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.662492][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.722666][ T1672] device syzkaller0 entered promiscuous mode [ 696.750121][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 696.792300][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.818933][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 696.838568][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 696.866492][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.873579][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.919347][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 696.949716][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 696.968478][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.975539][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 697.002789][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 697.018758][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 697.039790][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 697.058886][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 697.092906][ T1604] device veth0_vlan entered promiscuous mode [ 697.104832][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 697.116722][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 697.133628][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 697.148338][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 697.172798][ T1604] device veth1_macvtap entered promiscuous mode [ 697.190002][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 697.198662][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 697.211789][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 697.229000][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 697.241035][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 697.278386][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 697.287126][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 697.296690][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 697.305436][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 697.388133][ T1684] device syzkaller0 entered promiscuous mode [ 697.495446][ T1678] bridge0: port 1(bridge_slave_0) entered blocking state [ 697.513745][ T1678] bridge0: port 1(bridge_slave_0) entered disabled state [ 697.535010][ T1678] device bridge_slave_0 entered promiscuous mode [ 697.597192][ T1678] bridge0: port 2(bridge_slave_1) entered blocking state [ 697.608446][ T1678] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.626059][ T1678] device bridge_slave_1 entered promiscuous mode [ 697.797706][ T1697] device syzkaller0 entered promiscuous mode [ 698.313406][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 698.358086][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 698.387545][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 698.433764][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 698.488671][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 698.495845][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 698.549934][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 698.563658][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 698.573063][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 698.580141][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 698.588671][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 698.624742][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 698.634889][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 698.678380][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 698.701808][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 698.728149][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 698.736326][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 698.762857][ T1678] device veth0_vlan entered promiscuous mode [ 698.770724][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.778951][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.796123][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 698.805951][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 698.841664][ T1678] device veth1_macvtap entered promiscuous mode [ 698.863323][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 698.875242][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 698.884186][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 698.912437][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 698.921182][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 699.005287][ T1777] ÿÿÿÿÿÿ: renamed from vlan1 [ 699.141699][ T948] device bridge_slave_1 left promiscuous mode [ 699.151158][ T948] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.170931][ T948] device bridge_slave_0 left promiscuous mode [ 699.178405][ T948] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.189790][ T948] device veth1_macvtap left promiscuous mode [ 699.543228][ T1821] device syzkaller0 entered promiscuous mode [ 700.801076][ T1923] geneve1: tun_chr_ioctl cmd 1074025672 [ 700.818494][ T1923] geneve1: ignored: set checksum enabled [ 701.439255][ T1955] device syzkaller0 entered promiscuous mode [ 701.654251][ T1966] device syzkaller0 entered promiscuous mode [ 702.219543][ T2026] device syzkaller0 entered promiscuous mode [ 702.928523][ T2063] device syzkaller0 entered promiscuous mode [ 703.712829][ T2139] device syzkaller0 entered promiscuous mode [ 703.719693][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 703.832405][ T2146] ªªªªª: renamed from bond_slave_0 [ 704.233776][ T2161] device syzkaller0 entered promiscuous mode [ 706.126654][ T2264] device syzkaller0 entered promiscuous mode [ 706.143451][ T2267] device pim6reg1 entered promiscuous mode [ 708.079404][ T2347] device syzkaller0 entered promiscuous mode [ 710.628453][ T2486] device wg2 entered promiscuous mode [ 711.046335][ T2506] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 711.079454][ T2506] device syzkaller0 entered promiscuous mode [ 716.748219][ T2659] device syzkaller0 entered promiscuous mode [ 717.443625][ T2721] device wg2 entered promiscuous mode [ 717.615443][ T2733] device syzkaller0 entered promiscuous mode [ 717.826574][ T2781] device macsec0 entered promiscuous mode [ 717.877201][ T2781] device syzkaller0 entered promiscuous mode [ 718.588113][ T2798] device syzkaller0 entered promiscuous mode [ 719.055555][ T2819] device syzkaller0 entered promiscuous mode [ 719.286308][ T2831] bridge0: port 3(veth0_vlan) entered blocking state [ 719.300380][ T2831] bridge0: port 3(veth0_vlan) entered disabled state [ 719.307557][ T2831] bridge0: port 3(veth0_vlan) entered blocking state [ 719.314273][ T2831] bridge0: port 3(veth0_vlan) entered forwarding state [ 720.838180][ T2896] device wg2 left promiscuous mode [ 720.939975][ T2885] device wg2 entered promiscuous mode [ 727.113651][ T3144] device syzkaller0 entered promiscuous mode [ 727.592632][ T3193] device syzkaller0 entered promiscuous mode [ 727.640860][ T3203] syz.2.10070[3203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 727.640965][ T3203] syz.2.10070[3203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 728.176312][ T3242] device syzkaller0 entered promiscuous mode [ 728.235786][ T3245] device syzkaller0 entered promiscuous mode [ 728.723994][ T3265] device syzkaller0 entered promiscuous mode [ 729.931962][ T3336] device syzkaller0 entered promiscuous mode [ 730.449148][ T3366] syz.2.10119[3366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.449205][ T3366] syz.2.10119[3366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 732.042804][ T3460] device ipvlan1 entered promiscuous mode [ 733.075549][ T3498] device syzkaller0 entered promiscuous mode [ 733.305766][ T3514] device syzkaller0 entered promiscuous mode [ 733.763139][ T3535] device syzkaller0 entered promiscuous mode [ 736.341876][ T3685] device pim6reg1 entered promiscuous mode [ 737.376742][ T3760] device syzkaller0 entered promiscuous mode [ 737.698120][ T3787] device sit0 entered promiscuous mode [ 739.123048][ T3862] device wg2 left promiscuous mode [ 739.323946][ T3866] device wg2 entered promiscuous mode [ 740.685116][ T3882] bridge0: port 1(bridge_slave_0) entered blocking state [ 740.842133][ T3882] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.850361][ T3882] device bridge_slave_0 entered promiscuous mode [ 740.892183][ T3899] device syzkaller0 entered promiscuous mode [ 740.914050][ T3882] bridge0: port 2(bridge_slave_1) entered blocking state [ 740.926164][ T3882] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.934555][ T3882] device bridge_slave_1 entered promiscuous mode [ 740.956204][ T8249] syzkaller0: tun_net_xmit 48 [ 741.034348][ T3917] device syzkaller0 entered promiscuous mode [ 741.159229][ T3924] device syzkaller0 entered promiscuous mode [ 741.549496][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 741.568496][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 741.751285][ T3952] device syzkaller0 entered promiscuous mode [ 741.811047][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 741.828744][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 741.848424][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 741.855722][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 742.284210][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 742.311929][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 742.342727][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 742.351862][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.359213][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 742.421181][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 742.445733][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 742.459393][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 742.478006][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 742.516868][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 742.588712][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 742.597114][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 742.608882][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 742.626072][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 742.649386][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 742.658023][ T3882] device veth0_vlan entered promiscuous mode [ 742.681968][ T3882] device veth1_macvtap entered promiscuous mode [ 742.702915][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 742.714010][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 742.722936][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 742.731614][ T3977] device sit0 entered promiscuous mode [ 743.473984][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 743.495295][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 743.504016][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 743.513329][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 743.724668][ T4018] device syzkaller0 entered promiscuous mode [ 743.754383][ T4004] device veth0_vlan left promiscuous mode [ 743.877489][ T4004] device veth0_vlan entered promiscuous mode [ 744.065683][ T948] device vlan1 left promiscuous mode [ 744.078526][ T948] Ÿë: port 1(vlan1) entered disabled state [ 744.961020][ T4083] bridge0: port 3(veth0_vlan) entered disabled state [ 745.257854][ T4089] ªªªªªª™™: renamed from vlan0 [ 745.290472][ T4103] device syzkaller0 entered promiscuous mode [ 745.315476][ T4096] device syzkaller0 entered promiscuous mode [ 745.852324][ T4156] device syzkaller0 entered promiscuous mode [ 746.413550][ T4206] device syzkaller0 entered promiscuous mode [ 746.564633][ T4221] device syzkaller0 entered promiscuous mode [ 747.424489][ T4270] device syzkaller0 entered promiscuous mode [ 748.057927][ T4321] device syzkaller0 entered promiscuous mode [ 749.638595][ T4382] device syzkaller0 entered promiscuous mode [ 750.169698][ T4396] device syzkaller0 entered promiscuous mode [ 750.379147][ T4530] : renamed from bond_slave_0 [ 750.491309][ T4538] device syzkaller0 entered promiscuous mode [ 751.587184][ T4557] device dummy0 entered promiscuous mode [ 751.915840][ T4553] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.038344][ T4553] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.121661][ T4553] device bridge_slave_0 entered promiscuous mode [ 752.171198][ T4553] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.178407][ T4553] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.185881][ T4553] device bridge_slave_1 entered promiscuous mode [ 752.284835][ T4586] device syzkaller0 entered promiscuous mode [ 752.543129][ T4583] device syzkaller0 entered promiscuous mode [ 752.715594][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 752.723494][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 752.731382][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 752.781709][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 752.818539][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.825627][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 752.935795][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 752.944840][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 753.116070][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 753.203811][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.211091][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 753.219180][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 753.255994][ T4553] device veth0_vlan entered promiscuous mode [ 753.282644][ T4553] device veth1_macvtap entered promiscuous mode [ 753.305571][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 753.338979][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 753.350762][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 753.359743][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 753.368277][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 753.377394][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 753.387558][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 753.396464][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 753.405612][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 753.414092][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 753.423521][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 753.432885][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 753.441811][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 753.519119][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 753.584573][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 754.011425][ T4667] device syzkaller0 entered promiscuous mode [ 754.806587][ T948] device bridge_slave_1 left promiscuous mode [ 754.814062][ T948] bridge0: port 2(bridge_slave_1) entered disabled state [ 754.833577][ T948] device bridge_slave_0 left promiscuous mode [ 754.863357][ T948] bridge0: port 1(bridge_slave_0) entered disabled state [ 754.920563][ T948] device veth1_macvtap left promiscuous mode [ 760.910912][ T4890] device syzkaller0 entered promiscuous mode [ 763.319363][ T4978] device syzkaller0 entered promiscuous mode [ 763.937225][ T5034] device syzkaller0 entered promiscuous mode [ 765.126678][ T5082] device syzkaller0 entered promiscuous mode [ 768.195496][ T5293] device syzkaller0 entered promiscuous mode [ 769.286842][ T5345] device syzkaller0 entered promiscuous mode [ 770.040490][ T5379] device syzkaller0 entered promiscuous mode [ 770.509241][ T5434] device macsec0 entered promiscuous mode [ 770.530674][ T5434] device veth1_macvtap left promiscuous mode [ 770.592728][ T5442] device syzkaller0 entered promiscuous mode [ 771.908983][ T5482] device syzkaller0 entered promiscuous mode [ 774.692570][ T5589] device syzkaller0 entered promiscuous mode [ 775.060708][ T5593] device syzkaller0 entered promiscuous mode [ 775.684755][ T5607] device syzkaller0 entered promiscuous mode [ 775.784365][ T5629] device syzkaller0 entered promiscuous mode [ 775.845964][ T5639] device syzkaller0 entered promiscuous mode [ 776.505350][ T5697] device syzkaller0 entered promiscuous mode [ 777.440639][ T5720] device wg2 left promiscuous mode [ 778.121259][ T5742] device syzkaller0 entered promiscuous mode [ 778.880962][ T5760] device syzkaller0 entered promiscuous mode [ 779.913405][ T5801] device syzkaller0 entered promiscuous mode [ 779.983240][ T5804] device syzkaller0 entered promiscuous mode [ 781.192733][ T5897] device syzkaller0 entered promiscuous mode [ 781.745258][ T5921] device bridge_slave_0 entered promiscuous mode [ 781.809433][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 782.828433][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.834401][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.873794][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.881189][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.887115][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.893300][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.902284][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.908944][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.932197][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.941861][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.955379][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 782.990633][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.007209][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.040412][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.060162][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.066248][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.076350][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.082801][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.088997][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.094952][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.101126][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.112847][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.184969][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.215306][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.303600][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.366991][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.410147][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 783.541481][ T6041] device syzkaller0 entered promiscuous mode [ 783.666916][ T6018] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 785.340383][ T6105] device syzkaller0 entered promiscuous mode [ 785.762297][ T6137] device veth0_vlan left promiscuous mode [ 785.898869][ T6137] device veth0_vlan entered promiscuous mode [ 785.906138][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 785.947211][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 785.984295][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 786.197565][ T6161] device syzkaller0 entered promiscuous mode [ 786.303177][ T6172] ÿÿÿÿÿÿ: renamed from vlan1 [ 786.316111][ T6171] device syzkaller0 entered promiscuous mode [ 787.272611][ T6209] device syzkaller0 entered promiscuous mode [ 787.393795][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 787.404352][ T948] bridge0: port 3(veth0_vlan) entered blocking state [ 787.411100][ T948] bridge0: port 3(veth0_vlan) entered forwarding state [ 787.419389][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 787.427720][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 787.834117][ T6269] device syzkaller0 entered promiscuous mode [ 787.951049][ T6281] device team_slave_1 entered promiscuous mode [ 787.957822][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 787.969570][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 789.110639][ T6330] device syzkaller0 entered promiscuous mode [ 789.208038][ T6353] device veth0_vlan left promiscuous mode [ 789.235909][ T6353] device veth0_vlan entered promiscuous mode [ 789.310499][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 789.318959][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 789.326579][ T948] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 789.383513][ T6342] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.392707][ T6342] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.400352][ T6342] device bridge_slave_0 entered promiscuous mode [ 789.457561][ T6342] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.465214][ T6342] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.478811][ T6342] device bridge_slave_1 entered promiscuous mode [ 789.564600][ T6342] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.571670][ T6342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.578986][ T6342] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.586183][ T6342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.612234][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 789.641906][T16462] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.650470][T16462] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.678167][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 789.686579][T16462] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.693651][T16462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.702572][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 789.711810][T16462] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.718884][T16462] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.747521][ T6394] device syzkaller0 entered promiscuous mode [ 789.760239][ T296] device ip6gretap0 left promiscuous mode [ 789.766068][ T296] : port 1(ip6gretap0) entered disabled state [ 789.781445][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 789.790278][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 789.805167][ T6342] device veth0_vlan entered promiscuous mode [ 789.812401][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 789.821750][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 789.830308][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 789.837947][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 789.864663][ T6342] device veth1_macvtap entered promiscuous mode [ 789.872977][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 789.929912][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 789.949819][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 789.959215][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 789.967784][T16462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 790.127662][ T6411] device wg2 entered promiscuous mode [ 791.035123][ T6486] device syzkaller0 entered promiscuous mode [ 791.332607][ T6499] device syzkaller0 entered promiscuous mode [ 796.315850][ T6676] bridge0: port 3(veth0_vlan) entered disabled state [ 796.759322][ T6691] device syzkaller0 entered promiscuous mode [ 798.170780][ T6743] device syzkaller0 entered promiscuous mode [ 798.493235][ T6754] bridge0: port 2(bridge_slave_1) entered disabled state [ 798.500626][ T6754] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.593740][ T6904] device syzkaller0 entered promiscuous mode [ 800.657313][ T6906] device syzkaller0 entered promiscuous mode [ 801.775746][ T6959] device syzkaller0 entered promiscuous mode [ 802.286022][ T6978] device wg2 left promiscuous mode [ 802.438042][ T6988] device wg2 entered promiscuous mode [ 802.516554][ T6995] device syzkaller0 entered promiscuous mode [ 802.964300][ T7031] device syzkaller0 entered promiscuous mode [ 804.405763][ T7110] device syzkaller0 entered promiscuous mode [ 804.803771][ T7151] sock: sock_set_timeout: `syz.3.11194' (pid 7151) tries to set negative timeout [ 805.215443][ T7172] device wg2 left promiscuous mode [ 805.237722][ T7178] device wg2 entered promiscuous mode [ 805.308537][ T7194] device syzkaller0 entered promiscuous mode [ 806.827023][ T7246] tap0: tun_chr_ioctl cmd 2147767520 [ 807.168974][ T7281] device macsec0 entered promiscuous mode [ 807.175025][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 807.183331][ T7281] device veth1_macvtap left promiscuous mode [ 807.787399][ T7321] device syzkaller0 entered promiscuous mode [ 807.955747][ T7338] device syzkaller0 entered promiscuous mode [ 807.989244][ T7340] device veth0_vlan left promiscuous mode [ 808.051509][ T7340] device veth0_vlan entered promiscuous mode [ 808.137154][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 808.168958][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 808.177924][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 808.478476][ T7394] device macsec0 entered promiscuous mode [ 808.517344][ T7389] device syzkaller0 entered promiscuous mode [ 808.677104][ T7405] device syzkaller0 entered promiscuous mode [ 810.102299][ T7453] device syzkaller0 entered promiscuous mode [ 810.696154][ T7467] device syzkaller0 entered promiscuous mode [ 811.016206][ T7477] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 811.183340][ T7477] device syzkaller0 entered promiscuous mode [ 811.296867][ T7491] device syzkaller0 entered promiscuous mode [ 811.599077][ T7506] device veth0_vlan left promiscuous mode [ 811.605856][ T7506] device veth0_vlan entered promiscuous mode [ 812.675962][ T7577] device syzkaller0 entered promiscuous mode [ 812.757769][ T7582] device syzkaller0 entered promiscuous mode [ 812.882957][ T7587] device wg2 left promiscuous mode [ 812.897883][ T24] audit: type=1400 audit(1776264581.469:181): avc: denied { create } for pid=7592 comm="syz.1.11322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 813.046971][ T7601] device wg2 entered promiscuous mode [ 813.082803][ T7606] device syzkaller0 entered promiscuous mode [ 813.175545][ T7625] device syzkaller0 entered promiscuous mode [ 813.782087][ T7663] device syzkaller0 entered promiscuous mode [ 814.479872][ T7684] tap0: tun_chr_ioctl cmd 1074025680 [ 816.042357][ T7722] syz.0.11357[7722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 816.049122][ T7722] syz.0.11357[7722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 816.540937][ T7750] device veth0_vlan left promiscuous mode [ 816.604924][ T7750] device veth0_vlan entered promiscuous mode [ 817.689621][ T7840] nr0: port 1(macsec0) entered blocking state [ 817.695819][ T7840] nr0: port 1(macsec0) entered disabled state [ 817.752713][ T7851] device syzkaller0 entered promiscuous mode [ 819.007122][ T7911] device syzkaller0 entered promiscuous mode [ 819.168996][ T7918] device syzkaller0 entered promiscuous mode [ 820.271669][ T7961] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 820.360412][ T7963] device syzkaller0 entered promiscuous mode [ 820.413585][ T7967] device syzkaller0 entered promiscuous mode [ 821.598235][ T8041] bridge0: port 1(bridge_slave_0) entered blocking state [ 821.624648][ T8041] bridge0: port 1(bridge_slave_0) entered disabled state [ 821.645408][ T8041] device bridge_slave_0 entered promiscuous mode [ 821.681969][ T8041] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.737970][ T8041] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.752098][ T8041] device bridge_slave_1 entered promiscuous mode [ 821.863972][ T8041] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.871085][ T8041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 821.878387][ T8041] bridge0: port 1(bridge_slave_0) entered blocking state [ 821.885418][ T8041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 821.935291][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 821.943013][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 821.959190][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.988184][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 821.997431][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.004514][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.012656][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 822.021290][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.028454][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.037296][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 822.045646][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 822.074833][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 822.083846][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 822.101986][ T8041] device veth0_vlan entered promiscuous mode [ 822.114985][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 822.123174][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 822.149412][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 822.176844][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 822.191493][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 822.209514][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 822.225184][ T8041] device veth1_macvtap entered promiscuous mode [ 822.236580][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 822.251313][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 822.358525][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 822.478273][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 822.580822][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 822.872983][ T8104] device wg2 entered promiscuous mode [ 823.598542][ T8151] tap0: tun_chr_ioctl cmd 1074025673 [ 823.671480][ T8157] ÿÿÿÿÿÿ: renamed from vlan1 [ 824.200792][ T296] nr0: port 1(macsec0) entered disabled state [ 824.242164][ T296] device bridge_slave_1 left promiscuous mode [ 824.268385][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.333432][ T296] device bridge_slave_0 left promiscuous mode [ 824.401845][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.545995][ T296] device veth0_vlan left promiscuous mode [ 824.624809][ T8232] syz.0.11502[8232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 824.624863][ T8232] syz.0.11502[8232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 825.140980][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 825.160572][ T49] bridge0: port 3(veth0_vlan) entered blocking state [ 825.167328][ T49] bridge0: port 3(veth0_vlan) entered forwarding state [ 825.174809][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 825.182705][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 826.428232][ T8326] device syzkaller0 entered promiscuous mode [ 827.240717][ T8361] device syzkaller0 entered promiscuous mode [ 827.907245][ T8410] device syzkaller0 entered promiscuous mode [ 828.631556][ T8432] device wg2 entered promiscuous mode [ 828.752677][ T8414] general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN [ 828.764553][ T8414] KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027] [ 828.772968][ T8414] CPU: 1 PID: 8414 Comm: syz.0.11549 Tainted: G W syzkaller #0 [ 828.781806][ T8414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 828.791970][ T8414] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 828.797953][ T8414] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 828.817572][ T8414] RSP: 0018:ffffc90000da7440 EFLAGS: 00010202 [ 828.823658][ T8414] RAX: 0000000000000004 RBX: 1ffff11023c2f779 RCX: 0000000000000000 [ 828.831638][ T8414] RDX: ffffc90008c73000 RSI: 0000000000000a06 RDI: 00000000ffffffff [ 828.839618][ T8414] RBP: ffffc90000da7540 R08: ffff8881f714786f R09: 1ffff1103ee28f0d [ 828.847592][ T8414] R10: dffffc0000000000 R11: ffffed103ee28f0e R12: 0000000000000000 [ 828.855576][ T8414] R13: 0000000000000020 R14: 1ffff920001b4e90 R15: dffffc0000000000 [ 828.863561][ T8414] FS: 00007fbef96a36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 828.872638][ T8414] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 828.879382][ T8414] CR2: 0000200000000430 CR3: 00000001152c0000 CR4: 00000000003506a0 [ 828.887656][ T8414] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 828.895638][ T8414] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 828.903629][ T8414] Call Trace: [ 828.906956][ T8414] ? perf_pending_event+0x560/0x560 [ 828.912202][ T8414] ? sysvec_call_function_single+0xc8/0xd0 [ 828.918060][ T8414] ? __this_cpu_preempt_check+0x13/0x20 [ 828.923621][ T8414] ? __perf_event_account_interrupt+0x1a4/0x2c0 [ 828.929888][ T8414] __perf_event_overflow+0x1b3/0x340 [ 828.935195][ T8414] perf_swevent_event+0x2f7/0x530 [ 828.940234][ T8414] ___perf_sw_event+0x3aa/0x4d0 [ 828.945183][ T8414] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 828.951701][ T8414] ? _raw_spin_lock_irqsave+0xc2/0x130 [ 828.957176][ T8414] ? _raw_spin_lock+0xf0/0xf0 [ 828.961927][ T8414] ? __skb_wait_for_more_packets+0x2ad/0x590 [ 828.968051][ T8414] __perf_sw_event+0x134/0x270 [ 828.972824][ T8414] do_user_addr_fault+0xc76/0xc90 [ 828.978006][ T8414] ? _raw_spin_unlock+0x4d/0x70 [ 828.982878][ T8414] ? unix_dgram_recvmsg+0x5d0/0xd70 [ 828.988098][ T8414] ? do_kern_addr_fault+0x80/0x80 [ 828.993139][ T8414] ? unix_dgram_sendmsg+0x17e0/0x17e0 [ 828.998602][ T8414] exc_page_fault+0x5a/0xc0 [ 829.003108][ T8414] asm_exc_page_fault+0x1e/0x30 [ 829.007960][ T8414] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 829.013676][ T8414] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 90 90 90 90 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 90 90 90 90 90 90 48 bb f9 ef ff ff ff 7f [ 829.033474][ T8414] RSP: 0018:ffffc90000da7a78 EFLAGS: 00050246 [ 829.039546][ T8414] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000200000000430 [ 829.047517][ T8414] RDX: ffffc90000da7eb0 RSI: 0000000000000000 RDI: 00000000ffffffff [ 829.055490][ T8414] RBP: ffffc90000da7c10 R08: 0000000000000003 R09: 0000000000000004 [ 829.063561][ T8414] R10: dffffc0000000000 R11: fffff520001b4f04 R12: dffffc0000000000 [ 829.071537][ T8414] R13: 0000200000000400 R14: 0000000000000000 R15: 0000000000000000 [ 829.079535][ T8414] ? ____sys_recvmsg+0x399/0x5e0 [ 829.084488][ T8414] ? __sys_recvmsg_sock+0x50/0x50 [ 829.089517][ T8414] ? import_iovec+0x7c/0xb0 [ 829.094032][ T8414] ___sys_recvmsg+0x21a/0x5c0 [ 829.098707][ T8414] ? __sys_recvmsg+0x270/0x270 [ 829.103580][ T8414] ? alloc_file+0x82/0x540 [ 829.108004][ T8414] ? __fdget+0x1a1/0x230 [ 829.112265][ T8414] __x64_sys_recvmsg+0x1f6/0x2c0 [ 829.117215][ T8414] ? __kasan_check_write+0x14/0x20 [ 829.122515][ T8414] ? ___sys_recvmsg+0x5c0/0x5c0 [ 829.127366][ T8414] ? __kasan_check_read+0x11/0x20 [ 829.132391][ T8414] ? exit_to_user_mode_prepare+0x9a/0xa0 [ 829.138093][ T8414] do_syscall_64+0x31/0x40 [ 829.142494][ T8414] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 829.148391][ T8414] RIP: 0033:0x7fbefac48819 [ 829.152790][ T8414] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 829.172414][ T8414] RSP: 002b:00007fbef96a3028 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 829.180916][ T8414] RAX: ffffffffffffffda RBX: 00007fbefaec1fa0 RCX: 00007fbefac48819 [ 829.188873][ T8414] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000005 [ 829.196825][ T8414] RBP: 00007fbefacdec91 R08: 0000000000000000 R09: 0000000000000000 [ 829.204775][ T8414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 829.212821][ T8414] R13: 00007fbefaec2038 R14: 00007fbefaec1fa0 R15: 00007ffeed7e4c28 [ 829.220782][ T8414] Modules linked in: [ 829.225184][ T8414] ---[ end trace ac710a929289352e ]--- [ 829.231057][ T8414] RIP: 0010:bpf_overflow_handler+0x288/0x370 [ 829.237043][ T8414] Code: ff 55 00 41 89 c4 42 80 3c 3b 00 74 0a 48 8b 7c 24 10 e8 db 63 1a 00 48 8b 44 24 10 4c 8b 28 49 83 c5 20 4c 89 e8 48 c1 e8 03 <42> 80 3c 38 00 74 08 4c 89 ef e8 b9 63 1a 00 bb 70 02 00 00 49 03 [ 829.256923][ T8414] RSP: 0018:ffffc90000da7440 EFLAGS: 00010202 [ 829.263198][ T8414] RAX: 0000000000000004 RBX: 1ffff11023c2f779 RCX: 0000000000000000 [ 829.271453][ T8414] RDX: ffffc90008c73000 RSI: 0000000000000a06 RDI: 00000000ffffffff [ 829.279554][ T8414] RBP: ffffc90000da7540 R08: ffff8881f714786f R09: 1ffff1103ee28f0d [ 829.287537][ T8414] R10: dffffc0000000000 R11: ffffed103ee28f0e R12: 0000000000000000 [ 829.291159][ T24] audit: type=1400 audit(1776264597.859:182): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 829.295562][ T8414] R13: 0000000000000020 R14: 1ffff920001b4e90 R15: dffffc0000000000 [ 829.325330][ T8414] FS: 00007fbef96a36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 829.334306][ T8414] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 829.340917][ T8414] CR2: 0000200000000430 CR3: 00000001152c0000 CR4: 00000000003506a0 [ 829.341709][ T24] audit: type=1400 audit(1776264597.859:183): avc: denied { search } for pid=77 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 829.349151][ T8414] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 829.349158][ T8414] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 829.349200][ T8414] Kernel panic - not syncing: Fatal exception [ 829.393054][ T8414] Kernel Offset: disabled [ 829.397367][ T8414] Rebooting in 86400 seconds..