last executing test programs: 4.789905968s ago: executing program 3 (id=12452): r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x4, 0xc3, 0x1, 0x5, 0x0, 0x220, 0x10, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x10005, 0x8, 0x1, 0x1b, 0x7, 0x8000, 0x8, 0x0, 0xf777, 0x0, 0x5}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xacf) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x51, 0x71, 0xb, 0x80, 0x0, 0x10000, 0x92100, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x13, 0x0, @perf_config_ext={0x1, 0x5}, 0x10600, 0x4, 0xa6, 0x1, 0x5, 0x8, 0x4, 0x0, 0x0, 0x0, 0xcb}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'wlan0\x00', @local}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r2, &(0x7f0000000200)='io.pressure\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x5, 0x5, 0x1, 0x2, 0x0, 0x3, 0x2000, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000240), 0x9}, 0x0, 0x100000001, 0x10000, 0x8, 0xa, 0xff, 0x2, 0x0, 0x7fffffff, 0x0, 0x2}, r2, 0x4, r0, 0x6) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000680)={r1, 0x20, &(0x7f0000000640)={&(0x7f00000004c0)=""/182, 0xb6, 0x0, &(0x7f0000000580)=""/129, 0x81}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1, 0xa, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@map_fd={0x18, 0xa, 0x1, 0x0, r1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000380)='syzkaller\x00', 0xaaa, 0x92, &(0x7f00000003c0)=""/146, 0x41100, 0x4, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x4, 0x4, 0x10001, 0x6}, 0x10, r3, r1, 0x6, 0x0, &(0x7f00000006c0)=[{0x4, 0x1, 0x8, 0x6}, {0x1, 0x4, 0xe, 0xc}, {0x4, 0x2, 0xf, 0xa}, {0x0, 0x5, 0xe, 0x2}, {0x4, 0x1, 0x10, 0x7}, {0x3, 0x3, 0xd, 0x3}]}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r1, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0xd, 0x16, &(0x7f0000000800)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x7, 0x0, 0x2, 0x1, 0x8, 0x50, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x95}}, @ldst={0x0, 0x1, 0x6, 0x0, 0x5, 0x40, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}], &(0x7f00000008c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x1, '\x00', r5, @sock_ops=0x3, r1, 0x8, &(0x7f00000009c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000a00)={0x1, 0xe, 0x5e24, 0x9}, 0x10, r3, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)=[r1, r1, r1], &(0x7f0000000a80)=[{0x1, 0x4, 0x4, 0x2}, {0x4, 0x1, 0x1}, {0x0, 0x5, 0xc, 0x1}, {0x1, 0x5, 0x9}, {0x1, 0x2, 0xe, 0x1}, {0x4, 0x1, 0xb, 0x2}, {0x1, 0x2, 0x2, 0x1}, {0x0, 0x1, 0x3, 0x5}], 0x10, 0xb40e}, 0x94) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x7, [@var={0x5, 0x0, 0x0, 0xe, 0x4, 0x2}, @float={0x9, 0x0, 0x0, 0x10, 0x8}, @float={0xe, 0x0, 0x0, 0x10, 0x10}, @enum={0xf, 0x6, 0x0, 0x6, 0x4, [{0x5, 0x2}, {0xe, 0x3}, {0x3, 0x3}, {0x2, 0x15b}, {0xf, 0x5}, {0xd, 0x6d9}]}, @fwd={0x6}]}, {0x0, [0x0, 0x61, 0x5f, 0x0, 0x6f]}}, &(0x7f0000000c80)=""/236, 0x8f, 0xec, 0x0, 0x1000, 0x10000, @value=r1}, 0x28) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000dc0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x1, '\x00', r5, r7, 0x0, 0x4, 0x5}, 0x50) write$cgroup_int(r1, &(0x7f0000000e40)=0x7b1923fa, 0x12) recvmsg(r1, &(0x7f0000001fc0)={&(0x7f0000000e80)=@tipc, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000f00)=""/103, 0x67}], 0x1, &(0x7f0000000fc0)=""/4096, 0x1000}, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002040)=@o_path={&(0x7f0000002000)='./file0\x00', r6, 0x4000, r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000022c0)={0x6, 0x1e, &(0x7f0000002080)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @generic={0x1a, 0x3, 0x6, 0x80}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x8b}], &(0x7f0000002180)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x29, '\x00', r5, 0x25, r1, 0x8, &(0x7f00000021c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000002200)={0x4, 0x6, 0x3ff, 0x8001}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000002240)=[r1], &(0x7f0000002280)=[{0x5, 0x1, 0x1}, {0x2, 0x4, 0xf, 0xc}], 0x10, 0xc64}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000002680)={0x15, 0x29, &(0x7f0000002380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xab}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffb}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @alu={0x4, 0x0, 0x6, 0x1, 0x0, 0x18, 0x8}, @jmp={0x5, 0x1, 0x2, 0x7, 0x1, 0xffffffffffffffc0, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002500)='GPL\x00', 0x2, 0x7d, &(0x7f0000002540)=""/125, 0x40f00, 0x1, '\x00', r5, @fallback=0x8, r7, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r3, r4, 0x8, &(0x7f00000025c0)=[r1, r8, r1, r8, r1], &(0x7f0000002600)=[{0x0, 0x5, 0x8, 0x3}, {0x4, 0x3, 0x8, 0xa}, {0x3, 0x4, 0xc, 0x4}, {0x2, 0x3, 0x6, 0xb}, {0x0, 0x2, 0xa, 0x91d3073328233c89}, {0x4, 0x2, 0x10, 0xc}, {0x1, 0x4, 0x9}, {0x3, 0x5, 0x4, 0x6}], 0x10, 0xfffffff2}, 0x94) openat$cgroup_subtree(r2, &(0x7f0000002740), 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000002b40)={&(0x7f0000002780)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10, &(0x7f0000002a80)=[{&(0x7f00000027c0)="df5c47ea0afddb4d35", 0x9}, {&(0x7f0000002800)="0248b8a1e0b7f02812349467521cf29be55e481e3d084d73d9222c8b73ee88680d4f9f143415075bf4ab303ba1594a026b263a6b683199094baa3361f13159ff2b1d8ac06646bd4766ab97a7dd3476efb5e7cd018a89d0abe362b82999fd6e0948fe9f142d61a30da8a3071f99d405ef5a19c0157c2c5522d9f225bde6634fc1b60ed3428ad8cdbc548b83db8221", 0x8e}, {&(0x7f00000028c0)="04ead5fd14ba064c2fd35987aa14e8bc6aa4fca1f5e5fd32bc568d287e50bd162285d7088bd1ab1fad38b7ea2ae5c84cbe38286b497b044bce4c6057c20304d8f40b778f1df178453983b1e170b646421d692b855148ebbe60593b3d3ce34c2a9fa857b5f8", 0x65}, {&(0x7f0000002940)="ad46cca53b60ad48a9f50050569192b62413a819b5293e5e0e58b3588a1e00ff8c6d30c1ed43168190966dde075e015441f9d4765c9972a4ca4c89b61340a3938a1d663226208dffbd32c52e436aa6974b11089261396d3f3c92c178c510103fc2fc529dd63ce0be875d12c4e78aa2648042776f42cace63223b1fc8118f7bd63ad4e1b05ceaec52fee64a1935543f19bb0e1a68a09ba277f74b43b5ee592a87126954ddce875262b0295657", 0xac}, {&(0x7f0000002a00)="462f7b102cc4ccfef9374fe84ffec2a79f8c", 0x12}, {&(0x7f0000002a40)="65080242", 0x4}], 0x6, &(0x7f0000002b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xf7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x200}}], 0x30}, 0x20000000) r10 = openat$cgroup_ro(r1, &(0x7f0000002b80)='cpuacct.stat\x00', 0x0, 0x0) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002ec0)=@o_path={&(0x7f0000002e80)='./file0\x00', 0x0, 0x4000, r4}, 0x18) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000002f40)={0x18, 0x27, &(0x7f0000002bc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x548b}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x5}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffff8}, @generic={0x8, 0x0, 0x9, 0x9, 0x5}, @jmp={0x5, 0x0, 0x4, 0x8, 0x2, 0xfffffffffffffff8, 0x1}, @tail_call={{0x18, 0x2, 0x1, 0x0, r10}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000002d00)='syzkaller\x00', 0x7, 0x90, &(0x7f0000002d40)=""/144, 0x41000, 0x0, '\x00', r5, @fallback=0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000002e00)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000002e40)={0x3, 0x2, 0x81, 0x4}, 0x10, 0xffffffffffffffff, r11, 0x0, &(0x7f0000002f00)=[r1, r1, r8], 0x0, 0x10, 0x6}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000003080)={r8, 0x58, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000030c0)=@base={0x17, 0x8001, 0xffffff80, 0x0, 0x800, 0x1, 0x401, '\x00', r13, r1}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003400)={r10, 0xe0, &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000003140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000003180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000031c0)=[0x0], 0x0, 0x92, &(0x7f0000003200)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000003240), &(0x7f0000003280), 0x8, 0x8f, 0x8, 0x8, &(0x7f00000032c0)}}, 0x10) socketpair(0x15, 0x80000, 0x5, &(0x7f0000003440)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000003580)={@ifindex=r14, 0x5, 0x0, 0x2, &(0x7f0000003480)=[0x0, 0x0], 0x2, 0x0, &(0x7f00000034c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003540)=[0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000035c0)={@map, r12, 0x38, 0x10, r11, @void, @value=r9, @void, @void, r15}, 0x20) 4.674130408s ago: executing program 3 (id=12454): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000040), 0x4) 3.760617361s ago: executing program 2 (id=12472): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0a00000001010000ff7f0000c800000000000000", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x4000, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0xc, 0x7}, 0x414, 0x2000000, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r1) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0004000071106b00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r5, 0xb4, &(0x7f0000000540)}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext={0x0, 0x7}, 0x102002, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, r0, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) close(r3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {0x0}, {&(0x7f00000006c0)="97b13f5cf9", 0x5}], 0x3}, 0x0) r6 = syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000005c0)=r6, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000200)=0x1, 0x12) 3.608321887s ago: executing program 3 (id=12475): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x2}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xf}, 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/61}, 0x33) r2 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) r3 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xc, 0xff}, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x10002, 0x804, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0xfffffffe}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\n\x00\x00\x00'], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x10, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1fffffff}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@call={0x85, 0x0, 0x0, 0x76}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.382818314s ago: executing program 3 (id=12479): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{r1}, 0x0, &(0x7f00000013c0)}, 0x20) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f0000000000)="393c42a60067055f4e4205f640", &(0x7f0000000040)=""/39, &(0x7f0000000080)="a8da6ad68d532f1bacb7cb0a977a4292a7a3e041f7cbe8e86be9796afaa4e57ee34485301a287c3c40e0f1d48fd5512bcdc6dff511d83f1280d04baf162c36b5a5ee0cc2f1092420db87a78c6cf2f31755be243055c8cba56ec0fbc45bc65da5d0582dfa32a605c81960e3f8161efd12a32aa7aafe3a4fd53fa2bd9d6248eedced062ec054afabab8c90b1a9a9f5617ae9", &(0x7f0000000140)="8dcb46a7d164d577024690770db2102d75868d984adb1135196215d16f76723b13797c2721ab2cdbbb4b5d41ed0be5fc02fe103d654ce706ba46ce615dd63e8e08f031bd55bb6a845495176494c8066a671921404e765f1192176b9a1588cf143c869662a87233ad6387b6c7ba11a8a7e12d601b792c68750f73f071a0", 0xf, r1, 0x4}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async, rerun: 32) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 3.215701492s ago: executing program 1 (id=12482): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0000000271106f00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000480)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.150820363s ago: executing program 1 (id=12484): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@restrict={0x2, 0x0, 0x0, 0xb, 0x5}, @struct={0xf, 0x1, 0x0, 0x4, 0x0, 0x1ff, [{0xe, 0x3, 0x4}]}, @const={0x8, 0x0, 0x0, 0xa, 0x3}, @union={0x4, 0x1, 0x0, 0x5, 0x1, 0x5, [{0x5, 0x2}]}]}, {0x0, [0x61, 0x4f, 0x30]}}, &(0x7f0000000600)=""/111, 0x65, 0x6f, 0x0, 0x2}, 0x28) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) gettid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000180)="7d7562e7875f35eccfb32b7316e8da754179662190314c1f7c9f84f4ec74b9801f2bc2ec3f1187d2c96f91772e537a20b67a804a424274f748337d28083d84873f0624d8af2770cccfea03cd6b3b11ef3bc40732a3", 0x55}, {&(0x7f0000000340)="66745bade786bff06017879cec1261660b672141860cca6fcf9f2f948c3033e05c4be1999e6e6af91591895212d9e5a41fab40d8ca2d47bc18b7f16ef32560b93ee2c6cc9db55def014f51a87a811a347fce5380d6a894bb3f80dabb4e24baef632d5b35308f9546cfe9cd1b379b4d967e0c735215171ac9bf3007e8ff953b6139c93019ebe49da2f5f36233f086ee2c8a07a0acc460abfad39de79a97483191c9cf8160cf233497a2ad17dbdd9913ce5cb2360309f3b973cd43711fa818e1de57c08d18fabef748326400", 0xcb}], 0x2, &(0x7f00000009c0)=[@rights={{0x28, 0x1, 0x1, [r2, r3, r0, r0, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r4, r0, r1]}}, @rights={{0x30, 0x1, 0x1, [r2, r3, r2, r4, r4, r3, r1, r3]}}], 0x78, 0x2020000}, 0x40000) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="02000000040000000400000009"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0d00000024000000040000000100000000000000", @ANYRES32=r5], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r6, &(0x7f0000000080), 0x0}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b40)={r4, &(0x7f00000006c0)="a157198265641e53d0eb", &(0x7f0000000a40)=""/252}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8970, &(0x7f0000000080)) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xef, 0x3, 0xfc, 0x0, 0x0, 0x0, 0x28264, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_config_ext={0x8000000001eb, 0x10001}, 0x2078, 0x0, 0x0, 0x8, 0x0, 0x7, 0x7}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703000000000001850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r11}, &(0x7f0000000540), &(0x7f0000000580)=r12}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r11, &(0x7f0000000780)}, 0x20) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(r10, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a000000200065000300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) close(r9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) 2.98769397s ago: executing program 1 (id=12486): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x6d, 0x0, 0x0, 0x41100}, 0x94) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) (async) r5 = openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000340), 0x2, 0x0) (async) r8 = openat$cgroup_subtree(r7, &(0x7f0000000340), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB="0700010020"], 0x5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="2271bfdc80d18d666c73d2c04696cb29919a03c8cd9d26a28324bbef3824a40460f43dc444914ea245c8b6bb096f81cb94400223930210921a84719ebabb7ef795c9013dd6d1c99f5b1c1a2d857429d332a7096fdb01df09158502228fca26d1eabd5230bac78db047ee431205aa1c2ab56f08d0a11ed9bd60e2a35266eb0af097a72356d243db32b890c74ae3eda76203f4db6349f7e900c9901d8572d87e7e490ba9dc3b130239001b7056faad0ff88f4094b661438ac1a1f4ca10fad6734517ebf5e9b60de17724aac2b8", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x94) perf_event_open(0x0, 0x0, 0x800007, 0xffffffffffffffff, 0x2) (async) perf_event_open(0x0, 0x0, 0x800007, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06f2ff03404e84bb95244e4c5d04000420000008", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06f2ff03404e84bb95244e4c5d04000420000008", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0xff, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000000380)={0xfffffffffffffffe, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aa40db80d601c31b90531cbd507b99f5b36ac4ee1de85ab7ac538e7cd3e07d0ca01ce0f5916a7b55c82f091ea0b5407f844a5f5954ad76aaf71b61e0b3961fb74e4939e919f49e8c22e252c47f629164c4ba0d7f6b30a91c68e34f07e4f8cc6b820482e493d50c4bc23ed9874ffc658a4036afa211e1bbdf8813426715f1d6993b530", 0x83}], 0x1, 0x0, 0x0, 0x40001}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r9) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r11, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r11, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) (async) openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000001700), 0x12) (async) write$cgroup_pid(r5, &(0x7f0000001700), 0x12) 2.237875705s ago: executing program 3 (id=12487): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x32efe636, 0x80104, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x32efe636, 0x80104, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffeffffffff, 0x2}, 0x0, 0x2, 0xff7ffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./cgroup/cgroup.procs\x00') (async) unlink(&(0x7f0000000080)='./cgroup/cgroup.procs\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x20, &(0x7f00000005c0)={&(0x7f0000000440)=""/210, 0xd2, 0x0, &(0x7f0000000540)=""/121, 0x79}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0xe, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0, @ANYBLOB="ced240cb2f7fc4d0e7041642963107af30cade4171e26b0b79d0a44d1dcdc9804edac25094996e0a9d98da72d130d2f65421a5cc1a953907a650b00cc8d0f406221b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 1.984495388s ago: executing program 3 (id=12488): close(0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x1f, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0xc1, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xfffffffc}]}]}}, &(0x7f0000000080)=""/159, 0x46, 0x9f, 0x1}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x5, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000000000a50a000000000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xda, 0xda, 0x7, [@datasec={0x9, 0x2, 0x0, 0xf, 0x1, [{0x1, 0xd, 0x1}, {0x1, 0x8}], "f5"}, @volatile={0xf, 0x0, 0x0, 0x9, 0x5}, @typedef={0x9, 0x0, 0x0, 0x8, 0x3}, @typedef={0x3, 0x0, 0x0, 0x8, 0x5}, @datasec={0xf, 0x9, 0x0, 0xf, 0x1, [{0x3, 0x5, 0x2}, {0x3, 0x28, 0x7}, {0x2, 0xd6, 0xfffff1a8}, {0x5, 0x69b2}, {0x1, 0xa347, 0x2}, {0x5, 0x8, 0xffff7fff}, {0x2, 0x7}, {0x4, 0xde, 0x2}, {0x4, 0x16d, 0xffff}], "8d"}, @float={0xe}, @typedef={0xa, 0x0, 0x0, 0x8, 0x3}]}, {0x0, [0x5f, 0x30, 0x5f, 0x61, 0x30]}}, &(0x7f0000000400)=""/181, 0xfb, 0xb5, 0x1, 0x7, 0x10000}, 0x28) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x9, 0x4, 0x0, 0x0, 0x2, 0x4023, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext, 0x409, 0x8000000000000040, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x200000fc}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x3) gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$sock(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x8025) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r0, r2, 0x5, 0x3, 0x2}, 0x50) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r6) write$cgroup_devices(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="80fd"], 0xa) openat$cgroup_ro(r6, &(0x7f0000000e40)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)=@generic={&(0x7f0000000580)='./file0\x00', 0x0, 0x8}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@generic={&(0x7f0000000600)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit={0x95, 0x0, 0x7b00}, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x9b, &(0x7f0000000300)=""/155}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='devices.list\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x10000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'pimreg\x00', 0x2}) 1.951525623s ago: executing program 0 (id=12489): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000d000000003800000003000000000000000045a04527000003000000000300000002000000000000"], 0x0, 0x53}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x0, 0x2}, 0xc42a, 0x900000000000100, 0x7, 0x5, 0x0, 0x200000, 0x0, 0x0, 0x8000, 0x1d3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8983, &(0x7f0000000080)) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0ffffffffff030000000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xc2) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)) 1.709672234s ago: executing program 0 (id=12490): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffeffffffffffffc, 0xffffffffffffffff, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0xf0, 0x0, 0x0, 0x6, 0x44009, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0x800, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b705000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d40)={r4, 0x0, 0xe, 0x0, &(0x7f0000000040)="0000ffffffffa000903626e43925", 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r5 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000000c0)='\"pu<-0!|(') (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000180)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa6, &(0x7f0000000380)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xe9, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x39c, 0xc3, &(0x7f000000cf3d)=""/195, 0x1e00, 0x0, '\x00', r7}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r8) r9 = perf_event_open(&(0x7f0000000e80)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x646e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a80)=@generic={&(0x7f0000000a40)='./file0\x00', r3}, 0x18) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) (async, rerun: 32) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x70) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000580)}], 0x1}, 0x4000055) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1c, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x63, '\x00', r7, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, 0x0, 0x1ff, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000080)) 1.529308684s ago: executing program 0 (id=12491): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000300000000000000", @ANYRES32, @ANYBLOB="0000000000003191855500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069117e00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x70) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f0000eceba518d400000000"], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000540)={r4, r2}, 0xc) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) close(r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000080)='./file0\x00', r3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00ff0004000071106b00"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe4a}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1a, 0x80005, 0x401, &(0x7f0000000000)={0x0, 0x0}) close(r8) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, @perf_config_ext, 0x102002, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) close(r6) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r7, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000005c0)=r9) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110c230041) close(r0) 1.403773565s ago: executing program 4 (id=12492): socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="05000000060000000800000005"], 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c21000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f5, &(0x7f0000000900)={'sit0\x00', @random="0060230c1100"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x1e, 0x100000000}, 0x1cad, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7", 0x23}], 0x1}, 0x20000000) recvmsg(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000780)=""/54, 0x36}], 0x1}, 0x2020) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000153f575e2c5e4a2cfae8b95b00000000100000001000000003000000020000000013000e0200000000000000005f00"], 0x0, 0x2b, 0x0, 0x1}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x5, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r5, 0x800454e1, &(0x7f00000012c0)=r6) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0xecc}, 0x14558, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(0xffffffffffffffff) 1.158274446s ago: executing program 4 (id=12493): socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x13, 0x0, &(0x7f00000005c0)="07ec0c191cd2749bf8ffc2c4257f078b3909d0", 0xfffffffffffffffd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x8810) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) close(r6) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r8 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r9 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1005e2, 0x2, 0x0, 0x0, 0x2, 0x1000000}, 0xffffffffffffffff, 0x0, r8, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0xffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@map=0x1, 0x31, 0x1, 0x1, &(0x7f0000000180)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0}, 0x40) r11 = openat$cgroup(0xffffffffffffffff, &(0x7f00000004c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r11, r4, 0x20, 0x2, r2, @void, @value=r2, @void, @void, r10}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x2400, 0x4) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.126489711s ago: executing program 0 (id=12494): write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYRESHEX], 0x3a) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050000000100000007"], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f00000002c0), 0x0}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x4200, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'syzkaller1\x00', @remote}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000100000d0000000000000000030000000000000000000001ff200000400000000000000000000003000000000200000002", @ANYRES32=0x0], 0x0, 0x56}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r0, 0x58, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5c, 0x5c, 0x5, [@decl_tag={0xa, 0x0, 0x0, 0x11, 0x5, 0xa}, @const={0x9, 0x0, 0x0, 0xa, 0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x1, 0x2}, @union={0xd, 0x2, 0x0, 0x5, 0x1, 0x0, [{0x1, 0x1, 0xe}, {0x7, 0x4, 0x5}]}, @float={0x4, 0x0, 0x0, 0x10, 0x10}]}, {0x0, [0x2e, 0x0, 0x30]}}, &(0x7f0000000680)=""/78, 0x79, 0x4e, 0x1, 0x8}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x19, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8}, [@map_fd={0x18, 0x8, 0x1, 0x0, r0}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xf}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x1}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5535}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @alu={0x4, 0x1, 0xe, 0x7, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc}, @map_idx={0x18, 0xb, 0x5, 0x0, 0xe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x86}]}, &(0x7f0000000440)='GPL\x00', 0x562c, 0x4e, &(0x7f0000000480)=""/78, 0x40f00, 0x0, '\x00', r2, 0x25, r3, 0x8, &(0x7f00000007c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000800)={0x0, 0xe, 0xffff3fc8, 0xdd25}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000840)=[{0x1, 0x2, 0x7, 0x2}, {0x4, 0x2, 0xa, 0x2}], 0x10, 0x5267}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000800000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000001a00)={r5, 0x1}, 0xc) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={@map=r0, 0x25, 0x0, 0x2, &(0x7f0000000000)=[0x0], 0x1, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0]}, 0x40) 1.111455544s ago: executing program 0 (id=12495): perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x100000000) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='@\'{-!:&.^\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x81, 0xbd, 0x9, 0xa, 0x0, 0x3, 0x2, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x2000, 0x9, 0x242b, 0x1, 0x2, 0x8, 0xb9, 0x0, 0x8}, 0xffffffffffffffff, 0x3, r1, 0x4) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x64, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='!=[\\\\}#\x00') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x26e1, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c23003f) write$cgroup_devices(r4, &(0x7f0000000080)=ANY=[@ANYBLOB="80fd"], 0xa) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xd, 0x4}, 0x50) 1.003568872s ago: executing program 4 (id=12496): r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@cgroup=r1, 0xd, 0x0, 0x74a3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@cgroup=r1, r1, 0x35, 0x8, 0x0, @void, @value=r1, @void, @void, r3}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={@fallback=r2, r1, 0x22, 0x2050, 0x0, @value=r1, @void, @void, @void, r3}, 0x20) (async) r4 = openat$cgroup_devices(r1, &(0x7f0000000240)='devices.deny\x00', 0x2, 0x0) (async) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000280)={'batadv0\x00', @broadcast}) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', r1, 0x4000, r0}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={r1, 0xffffffffffffffff}, 0x4) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x17, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000400)='syzkaller\x00', 0x8, 0xea, &(0x7f0000000440)=""/234, 0x41100, 0x84, '\x00', r5, 0x1c, r1, 0x8, &(0x7f0000000600)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x4, 0xa, 0x7, 0x8}, 0x10, 0x22f7e, r1, 0x6, &(0x7f00000006c0)=[r1, r1, r1, r1, r6, r1, r1], &(0x7f0000000700)=[{0x4, 0x1, 0x7, 0xa}, {0x1, 0x2, 0x0, 0x4}, {0x0, 0x4, 0x10}, {0x0, 0x4, 0xa, 0x7}, {0x3, 0x5, 0x1, 0x2}, {0x2, 0x3}], 0x10, 0x6}, 0x94) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000840)={r0, 0xffffffffffffffff}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x2, 0x23, &(0x7f0000000880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6d09, 0x0, 0x0, 0x0, 0x80}, [@call={0x85, 0x0, 0x0, 0x67}, @alu={0x4, 0x0, 0x0, 0x1, 0xb, 0x30, 0x4}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0x37}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f00000009c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000a00)=""/4096, 0x41100, 0x10, '\x00', r5, @fallback=0x14, r1, 0x8, &(0x7f0000001a00)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001a40)={0x1, 0x1, 0x7, 0x1}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000001a80)=[r6], &(0x7f0000001ac0)}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001d40)={r1, &(0x7f0000001bc0)="51f645cac758565ba04dc6843c0ccac991480606e88a8df45879464a2a4b0340fd3062f93bde3740a70629daf66ebc748055b9808190072e29a48018bfbd339d846216a534776d2e4d81380f0af4f0f03fa46edffe8a98a33bacaad290387da2de6eb56a682193829920", &(0x7f0000001c40)=""/240}, 0x20) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e00)={{r1, 0xffffffffffffffff}, &(0x7f0000001d80), &(0x7f0000001dc0)='%pS \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001ec0)={{r10}, &(0x7f0000001e40), &(0x7f0000001e80)='%pS \x00'}, 0x20) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001f40)=@generic={&(0x7f0000001f00)='./file0\x00', r1}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r7) (async) r11 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001f80), 0x4) close(r11) (async) r12 = openat$cgroup_ro(r1, &(0x7f0000001fc0)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002000)=@bloom_filter={0x1e, 0x1a88c52a, 0xfff, 0x1000, 0x44000, r8, 0x0, '\x00', r5, r12, 0x4, 0x2, 0x4, 0x8}, 0x50) (async) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000002080)) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000022c0)={0xffffffffffffffff, 0x0, 0xd2, 0x54, &(0x7f00000020c0)="462d6aa110550661f4f6aac3e460482d00c767951be21a171d96947b0c021de52f368cc9c5c410b4be22acee71c2c49e19307c3ec6b116b0baa2b45abe4c2695a5869292e207a712c7c1c36b882798b6fadbb865a29005e0ddd4344fa583b509fefad1d27eb640fe61aa12ac5a5b8dfb7e1e35c4e71fa6cd502509bdad36b1b18130e4cfaebf13c79b22f9882f3aee29b5c6ea7137b2eb60950dac94567472f340af7d2b1250920137c1fa70de1b7d9149cb4b77124d8c85dedf4aec775eda1d45ecad0900908b3f1ae0014006d44c7b87be", &(0x7f00000021c0)=""/84, 0x6, 0x0, 0x27, 0x17, &(0x7f0000002240)="f848a1878ba7f6040bc61123dbd1e4544e54ff3925bf2d5c93bfbfb13e765e9f3e0f12f8d9933d", &(0x7f0000002280)="a4b1a0b853cd580edff6c79fa6b0ec3aa00aa2f1270dbc", 0x3, 0x0, 0x7fffffff}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002380)=@o_path={&(0x7f0000002340)='./file0\x00', r9, 0x4000, r8}, 0x18) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r7) (async) close(r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002640)={r1, 0x0, 0xe8, 0x5f, &(0x7f00000023c0)="077fd3916255c35e6086369cb26e0985021c3ba72d1c49f768bf8d7d1030c3cedc020cf03175daae86c6aee59a3060eceb354c4090b99dbbdbbec2744d216c3c1f213adae01ab9d69418c19f7440d7d9fdba86efd4c612ce68fde40571c7bc9407b191600a3d8e3c3299fd92633b2d950b468995143ee9d3844c11c0a01f6a1684f90f3b7c56fffbb7a017f42b5dcd7cbb3fd879dbbe99b5fd818988456269038884f79139805abe74358bd040f5ec8c6daee54d9b1f9b495f2ab845c75c25b624ff8bb553266359a7abacb6cc7c35242c202c048c4c35a8cc12684c6d78a2901deca28243926bd3", &(0x7f00000024c0)=""/95, 0x5, 0x0, 0x28, 0x95, &(0x7f0000002540)="17f24eaa400115bfa134d14e59d24e8bf292e976d5a3ed809239f8260237fc1258146c7418033a91", &(0x7f0000002580)="9f2a88aece8935c45bbf2982f90638c979c9b7bb7193c27aba8b5afafd8a1de56aebe6071ebe46f99c1d85d16fcea9af67ba3d57fec1ffc18626ba217f4cabf2885b2e9f569e94dad9698bf66d35acb6e549ce9b0397bd29efd2404692e8d7ae20d6bac4b4a864d1ea0b4647819ebb9dfc5f5045874dcae384da96eb046b8a38eac2a8ece2796b49d9d0dd82c98e1aaee48a47b7d1", 0x7, 0x0, 0x8000}, 0x50) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000026c0)) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r1) 992.153694ms ago: executing program 4 (id=12497): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0xb, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_fd={0x18, 0x5, 0x1, 0x0, r1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r3, &(0x7f0000000100)="6750320802c1086d06ab696a76c015d39e728dc736e9e03ecdc62444ff42d62177e466cf72a8082c95760a7a77bcede2552a28e24bcb50cee52188af3522afd2750f95680fb9d57f7eed1cd89663d9d89b1d80f4bbf057b60518fe189f5356719f888e6ec98511e3b170a1b3e077ee2dab454ecd70d2f784efa93e344ab8c26fd53b4c3bcd1ca192e288b6a2bfb8f37e26e873113777e9885727ccadc088101a2deff2924037604160d185462c4b9b756cad649f7e311b9b40381d1b18abe5b692fbd2a92aae1906315036f579c6e1538e206da0d82ba4b0cd7a891a1ca343c358f3a7", &(0x7f0000000200)=""/108}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={r2, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000700)=[0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000840), &(0x7f0000000940), 0x8, 0x9d, 0x8, 0x8, &(0x7f0000000dc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYRES64], &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000d80)={&(0x7f0000000500), 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000580)=""/67, 0x43}, {&(0x7f0000000600)=""/111, 0x6f}, {&(0x7f0000000680)=""/120, 0x78}, {&(0x7f00000009c0)=""/244, 0xf4}, {&(0x7f0000000ac0)=""/200, 0xc8}], 0x5, &(0x7f0000000c40)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x118}, 0x10003) 855.546897ms ago: executing program 4 (id=12498): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x11, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000400008500000061000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r1, 0x18000000000002a0, 0x48, 0x62, &(0x7f0000000600)="b9ff03075fe9008cb89e08e088a8", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x28) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x0, 0x74, &(0x7f0000000200)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x13, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (rerun: 64) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000, '\x00', r2, 0x0, 0x0, 0x1}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, r3}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x20, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000180000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000180100002020782500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000957500008500000006000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff000000007110c200000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) 744.776645ms ago: executing program 2 (id=12499): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x33}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x4, 0x59eb, 0x3, 0x1, 0x64020, 0xffffffffffffffff, 0xd0, '\x00', r0, 0xffffffffffffffff, 0x0, 0x1, 0x5}, 0x50) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0xb5, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r2, r1, 0x4, r1}, 0x10) 727.436178ms ago: executing program 2 (id=12500): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xa) openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)={0x1, 0x0, [0x0]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000700000009"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x3, 0x4, 0xfffff6e6, 0x0, r2}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0xd, 0xfe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x2000000, 0x8, 0x4, 0x0, 0x0, 0x0, 0x102ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 680.463956ms ago: executing program 1 (id=12501): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x94) openat$cgroup_int(r0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x10, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xc5bf) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x5411, &(0x7f0000000040)={'bridge_slave_0\x00'}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x38, 0x26, &(0x7f0000000500)="2077e7dedda60fb505e6394d02d95ae1583b0f97782b80bb0e15fd51433a497e67474911a70c77e53c2086485135099591ce5d5bd6fc4e68", 0x0, 0x0, 0x0, 0xfffffffd}, 0x50) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='cpu<=0||!') syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="00d20023582a12c581c468000000001dbff9dc0059427b6508957926d1510591116e0640e77e2c5bbf38f9c370226180c693ba504a54d2b83b8f3e08abbf469ac93e06cdcc4eb634cd1ffd70f81498b9ea4a35dc5b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r6}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 533.768431ms ago: executing program 4 (id=12502): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="05000000050000000200000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000007000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xd2, 0x3, 0x0, 0x0, 0x0, 0x5, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x2, 0x9}, 0x108, 0x0, 0x5, 0x8, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 522.003953ms ago: executing program 2 (id=12503): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910000000000000c3000010000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x1f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000500)=""/64}, 0x20) 337.519544ms ago: executing program 2 (id=12505): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff}, [@call={0x85, 0x0, 0x0, 0x23}, @printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x72}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000005"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x50) close(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x5, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4, r2}, 0xc) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') 212.582655ms ago: executing program 2 (id=12506): perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x53, 0x5, 0x0, 0x0, 0x0, 0x4, 0x82, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x0, @perf_config_ext={0x3, 0x8001}, 0x0, 0x2e, 0x4, 0x3, 0x2, 0xfffffffe, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x7, 0x4, 0x900, 0x5, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000005000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000400)={r1, r0}, 0xc) socketpair(0x1e, 0x0, 0x1, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/10, @ANYRES32, @ANYBLOB="0d00ff"], 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1) write$cgroup_pid(r5, &(0x7f0000000180), 0x12) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 211.757135ms ago: executing program 1 (id=12507): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="110000c1fa01a9200e859a1f65027b440294cd00", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x9, [@var={0x6, 0x0, 0x0, 0xe, 0x4, 0x1}, @fwd={0xa}, @var={0x6, 0x0, 0x0, 0xe, 0x5}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x0, 0x2e, 0x5f, 0x5f, 0x0, 0x2e, 0x30]}}, &(0x7f0000000100)=""/116, 0x59, 0x74, 0x0, 0x4}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xbee85889a6abf684, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xffff}, [@jmp={0x5, 0x0, 0x2, 0xb, 0x2, 0xfffffffffffffff8}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f00000001c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x4, 0x0, 0x7ff}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[r1, r1, r1, r3, r3, r3, r3, 0x1], &(0x7f0000000300)=[{0x0, 0x3, 0xf}], 0x10, 0x8}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f00000004000000080000000c00000000000000", @ANYRES32, @ANYBLOB="0500000000000000000000001000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x3, 0x14, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006100000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003010000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r6, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b9ff03076003008cfaffffff88a8", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x14, &(0x7f00000000c0)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xda13}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4000000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r7, r5}, 0xc) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002200000018010000202070250000000000202020730af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="12000000040000000800000043"], 0x50) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r13 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b00)={{r13}, &(0x7f0000000a80), &(0x7f0000000ac0)=r10}, 0x20) (async) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r13, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f00000000c0)=r14, 0x4) (async) sendmsg$inet(r12, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x48c0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000800)={0xaff, 0x0}, 0x8) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000008c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000840), &(0x7f0000000880)='%pB \x00'}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_lsm={0x1d, 0x18, &(0x7f0000000500)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}], &(0x7f0000000680)='syzkaller\x00', 0x2287, 0x96, &(0x7f0000000b40)=""/150, 0x41000, 0x23, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000000b00)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x3, 0xb, 0xa, 0x1}, 0x10, r15, 0x0, 0x4, &(0x7f0000000900)=[r3, r16], &(0x7f0000000940)=[{0x5, 0x5, 0x9, 0x9}, {0x3, 0x5, 0x2, 0x4}, {0x0, 0x5, 0x2, 0x1}, {0x5, 0x2, 0x5, 0xc}], 0x10, 0x2}, 0x94) 60.30665ms ago: executing program 0 (id=12508): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00/\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000280), &(0x7f0000000240)=r1}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="110000000000000000000000010000000400000000bb000000110000"], 0x2a0}, 0x800) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r5, 0x4) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f0000000040)='GPL\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0700000004000000800000000100000028000000", @ANYRES16=0x0, @ANYBLOB="000000ffffffffffffffffd856ea36b8"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018150000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000004000000b704000000000000850000001500000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0xc000, 0x0) ioctl$TUNATTACHFILTER(r8, 0x401054d5, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0x0, 0x9a, 0x2, 0x8}, {0x2, 0x0, 0x80, 0xa3}, {0xa94, 0x7, 0x4, 0x5c}]}) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r10, 0x0, 0x36, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x11, 0x2, 0x300, &(0x7f0000000b00)) 0s ago: executing program 1 (id=12509): recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/58, 0x3a}, {&(0x7f0000000140)=""/175, 0xaf}], 0x2}, 0x40000002) socketpair(0x1, 0x20000000000001, 0x10000000, &(0x7f0000000100)) (async) socketpair(0x1, 0x20000000000001, 0x10000000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000afcd48d6493790710000000000080000b2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c987d669f381faca0f9d9924be41a9169bdfaf16da915b2e249f21c6eee84309e7a23c19a394830f2539fcb4e0b6eab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bfb1c0e6b1244d35b213bda84cc172afcc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b7958f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbb888b0255f347160ec83070000000000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab2e4b380a00d72bc0480f94479757306720399379d9271cf555c14d56b51c2298237bebfc08e0d5976a942b844139f1111f2dc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78a602ca3cdf6a662d8bc9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e558d17879570c8ad943e392955f4f979ea13201bafe4f0f6ea508000000a0c548552b571bed5647323478a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151fcda6cb799c6e924966a7f90bf8fd1e75ee76bd72346cfbb526894aa7fe5e68949a3b304723177d356c4604bca492ecec37e83efceefd78a2533659edc8bef9cb85451c6a145074343caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffcebde1d9d3d350000000000000000e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e5a61561a9845e4ff29e2bd43b5b923b272341c5e093fd66a2946501559335781092cf8ce987c56cd31121624d7455f2a3666276c3c0e812b28e2f30d035cee5d0e77a3c72208ec651cc0ae637fa474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f030b8d3ebcef5af469abe753314fae31a09c3a041a1e7b55c4e81dba1e12289ee34463aaf28345bde0c195bc9f022ca8ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f241262d0af3246eb4fc4bda345360200000001fbddeacd3adaa4d2715e21c772ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d419de1a7b5c9dc22c96295a0600adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa7000008000000000000117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb408c8a80f7f02f750d6c977a1919f9f69a6cfefdf879d447df53f3b9b70d10355b07466d1ef0056b5af553d18a6cd50feeb7bfad9b7be3283b6450d34264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5a71e0d7696caba172745c7dd919ffb631820420b75b6522c0e21c882c66f4f25ffb6d95e07e068000000000000eb5b63e45d5d80fe52734093ae5aa3c0b4f3f45bfff201000000000000002e31560e5b741445ea2a1acee2e98c9f3427834ba0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa66237e0dacc107f532348cc2116473381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f8873522608c6f0100000000000000f721303e6b89e5c54d680ac66d09af90dbf50ee69a39265964279d174b0000000000000000000000fa08ad0731ba49fbf981f8265e7f1f4c2d97f4680b135f87c228ce69418a282b6caa2481a0df1774fa7d94944bb92d2b89f73f0e8b63f6316c5762f3288bc970720f48b5647dd177db6810fae0533496b6d58da50ee80a6b9a7438978c5465113f668eb4484350048289d07dbef325d3221a7cb35f812f257941a9781e3214c2a3dcf89d99844b762a9cf17548c54fccad2c7ae8072b82e0880815daf966bd5343c1635e123f868a7167cfcff33320253af570f4ef9c0254afdd89ac3943562b530dd88da8a94013bbaf204bebc38055adc39f07f7c22711f4d1f6dcc928d1578a093c072e0b92babc76f47ee367e745a024a2278319d9a4d1378482b74c516647652bfb6e93002494a5cd74e2a9a4734487062437da23e1efa6ef7674108aaa3ffac859c3577c2637bb3bdc69bc365b1f20dba96b8acca62f3f80045318de0facf2ed44b814e842c2a520159bb6c320cec0910c0b8bd3d547bdfba2e09d24d117ed0388afd37affbad2f9c77c9c1314a16ffe64f5e3744a2fffd7039670f5706e589a4c3868db06fd892d68a547477f8ef686ff0dba7b8c18c94d5a89b0567a851750a35d9cc2217db890d89385fcaa00f0f2e524672e6f4c8bedfd5da5b157709b8265cf511dc5846ab1d85916c4a6b2d1b408575982e11230cbac0a9c6eaa03c945645581f678403c2a936c53ae72940aa92bcf22b82c6bc028e0acdddf9fef595f0f7a9f80c0e4c659ced769ec463d26a81e468846761a8e1efd6a031ab7adc8665e267be0065cc315aa23012423ec8b8492d9b50fa4d8c5891959b761eec6dc988532782fda13239c948e27853606e26225c796b79cc04f3d1a5a13000000001e301d82a27010d3ac6119d2b12caf282413672d20c852c50084d7b2d50754775ed63bc18023c31351af76e24788d96103455693b34e09a163a9f613a7e5530222cebd7fa0fbff32dc98088f9fab33648cc38e87dd2dd6ee157f5f018702696915661715c979b7796d4f101a257688af7c148e8615c938c4ca8a69f6fc585ec1dd1857a501f90b161eff23181a11a2b0da4c58d459cbf9db"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x200000000000f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x1, 0x0, 0x4, 0x0, 0x2, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000285000000170000001801000020646c2500000000002020207b1af8ff00000000bfa1000000000000070100"], 0x0, 0xffffffff}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x7}]}, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='syzkaller\x00'}, 0x27) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008040}, 0x4000011) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, r4, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000a80)={r5, &(0x7f0000000900)="9ef23b56125c7b65efec10c5b765e25be667c79cb355896feb283ea5108b9e3c645e8e1b28be5ccb515875b0b2b55d0ba30ce4a160b89670bf0b11b1a1adda308fae0aa108075cd074bbeb47a661cc7f49b1eec2af40c677a72876d5229bc319567cf709319c39701c5a63900f3ecca6054411d9d97eb22beb2afa486551d222d37d7acc4544ecec7e", &(0x7f00000009c0)=""/156}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f00000003c0), 0x0, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x49, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x2, 0x45, 0x8, 0x0, 0xffff, 0x8002a, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffffb, 0x2, @perf_config_ext={0x3, 0x1}, 0x108009, 0xb, 0x200, 0x3, 0x1, 0x9, 0x401, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) (async) r6 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x1, 0x2, 0x45, 0x8, 0x0, 0xffff, 0x8002a, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffffb, 0x2, @perf_config_ext={0x3, 0x1}, 0x108009, 0xb, 0x200, 0x3, 0x1, 0x9, 0x401, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000300)='*!]}*)-[(#\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000900000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r8, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r8, 0x0, 0x0}, 0x10) close(r0) kernel console output (not intermixed with test programs): V_CHANGE): veth1: link becomes ready [ 210.489244][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.506137][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 210.514715][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 210.523306][ T399] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.530369][ T399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.541454][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.550168][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 210.558950][ T399] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.566025][ T399] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.580086][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.588376][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.597330][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.606003][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.625401][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 210.633786][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 210.646645][T10215] device veth0_vlan entered promiscuous mode [ 210.653246][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 210.661353][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 210.669464][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 210.677396][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 210.694405][T10215] device veth1_macvtap entered promiscuous mode [ 210.702840][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 210.711787][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 210.720797][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 210.756994][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 210.765587][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 210.781811][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 210.790557][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 210.981559][ T350] device macsec0 left promiscuous mode [ 210.992394][ T350] nr0: port 1(macsec0) entered disabled state [ 211.040766][ T350] device veth1_macvtap left promiscuous mode [ 211.789508][T10286] device syzkaller0 entered promiscuous mode [ 212.649881][T10336] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 213.249227][T10336] device syzkaller0 entered promiscuous mode [ 215.562049][T10569] cgroup: fork rejected by pids controller in /syz4 [ 215.652241][T10583] â6±ÿ: renamed from team_slave_1 [ 216.054472][T10598] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.112601][T10598] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.122742][T10598] device bridge_slave_0 entered promiscuous mode [ 216.129867][T10598] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.152613][T10598] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.170205][T10598] device bridge_slave_1 entered promiscuous mode [ 216.343565][T10611] bridge0: port 3(gretap0) entered blocking state [ 216.350026][T10611] bridge0: port 3(gretap0) entered disabled state [ 216.399504][T10611] device gretap0 entered promiscuous mode [ 216.490144][T10611] bridge0: port 3(gretap0) entered blocking state [ 216.496739][T10611] bridge0: port 3(gretap0) entered forwarding state [ 216.556401][T10605] device wg2 left promiscuous mode [ 216.868729][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.882824][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.917363][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.938951][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.958425][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.965527][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.994569][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.021594][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.045668][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.052749][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.113370][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.225275][T10660] device syzkaller0 entered promiscuous mode [ 217.239646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.249922][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.797036][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.853943][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.870716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.887272][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.899146][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.923276][T10598] device veth0_vlan entered promiscuous mode [ 217.972695][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 217.985743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.014167][T10598] device veth1_macvtap entered promiscuous mode [ 218.046361][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.055861][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.086538][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.126103][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.149287][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.194091][T10762] device syzkaller0 entered promiscuous mode [ 219.472340][T10773] device syzkaller0 entered promiscuous mode [ 219.854355][T10801] device syzkaller0 entered promiscuous mode [ 219.954244][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 223.399467][ T24] audit: type=1400 audit(1776292678.750:174): avc: denied { create } for pid=10989 comm="syz.4.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 223.965276][T11021] tun1: tun_chr_ioctl cmd 1074025677 [ 223.970733][T11021] tun1: linktype set to 820 [ 224.886368][T11071] device syzkaller0 left promiscuous mode [ 224.900268][ T24] audit: type=1400 audit(1776292680.250:175): avc: denied { attach_queue } for pid=11073 comm="syz.4.3050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 227.748446][T11158] : port 1(ip6gretap0) entered blocking state [ 227.755537][T11158] : port 1(ip6gretap0) entered disabled state [ 227.762485][T11158] device ip6gretap0 entered promiscuous mode [ 227.769359][T11163] device ip6gretap0 left promiscuous mode [ 227.787797][T11163] : port 1(ip6gretap0) entered disabled state [ 228.996962][T11263] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 229.046148][T11269] device syzkaller0 entered promiscuous mode [ 229.425713][T11289] device xfrm0 entered promiscuous mode [ 231.436202][ T24] audit: type=1400 audit(1776292686.790:176): avc: denied { create } for pid=11350 comm="syz.2.3126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 236.125465][T11544] device syzkaller0 entered promiscuous mode [ 236.614349][T11556] device syzkaller0 entered promiscuous mode [ 241.514144][T11761] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.521359][T11761] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.535467][T11761] device bridge_slave_1 left promiscuous mode [ 241.548193][T11761] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.557067][T11761] device bridge_slave_0 left promiscuous mode [ 241.564613][T11761] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.139809][T11781] device syzkaller0 left promiscuous mode [ 243.194733][T11833] device veth1_macvtap left promiscuous mode [ 243.207911][T11833] device veth1_macvtap entered promiscuous mode [ 243.225608][T11833] device macsec0 entered promiscuous mode [ 244.121675][T11875] device syzkaller0 entered promiscuous mode [ 244.186173][T11871] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.195144][T11871] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.202840][T11871] device bridge_slave_0 entered promiscuous mode [ 244.218461][T11871] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.229847][T11871] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.238702][T11871] device bridge_slave_1 entered promiscuous mode [ 244.359185][T11894] device wg2 entered promiscuous mode [ 244.407554][T11871] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.414648][T11871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.422002][T11871] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.429333][T11871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.479608][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.497503][ T2544] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.510405][ T2544] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.535452][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.544333][ T2544] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.551375][ T2544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.559562][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.623941][ T2544] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.631003][ T2544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.700506][T11871] device veth0_vlan entered promiscuous mode [ 244.716033][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.725084][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.733601][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.741250][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.862418][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.939635][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.033648][T11871] device veth1_macvtap entered promiscuous mode [ 245.050723][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 245.140871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 245.154187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 245.163006][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 245.205278][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.069583][T12017] device pim6reg1 entered promiscuous mode [ 246.405497][T12031] bridge0: port 4(veth1) entered blocking state [ 246.414562][T12031] bridge0: port 4(veth1) entered disabled state [ 246.424525][T12031] device veth1 entered promiscuous mode [ 246.430263][T12031] bridge0: port 4(veth1) entered blocking state [ 246.436650][T12031] bridge0: port 4(veth1) entered forwarding state [ 246.458112][T12032] device veth1 left promiscuous mode [ 246.465839][T12032] bridge0: port 4(veth1) entered disabled state [ 246.693946][T12044] device syzkaller0 entered promiscuous mode [ 246.707381][T12044] syzkaller0: tun_net_xmit 1280 [ 246.815952][ T350] device gretap0 left promiscuous mode [ 246.835661][ T350] bridge0: port 3(gretap0) entered disabled state [ 247.167136][ T350] device veth0_to_bridge left promiscuous mode [ 247.176839][ T350] bridge0: port 4(veth0_to_bridge) entered disabled state [ 247.192536][ T350] device bridge_slave_1 left promiscuous mode [ 247.208649][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.226382][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.237979][ T350] device veth0_vlan left promiscuous mode [ 247.720640][T12087] device syzkaller0 entered promiscuous mode [ 248.094965][T12138] syz.1.3364[12138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.095020][T12138] syz.1.3364[12138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.816983][T12171] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 249.030135][T12171] device syzkaller0 entered promiscuous mode [ 250.583049][T12245] device syzkaller0 entered promiscuous mode [ 250.836448][T12253] syz.4.3394[12253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.836546][T12253] syz.4.3394[12253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.355794][T12287] device pim6reg1 left promiscuous mode [ 252.603435][T12330] device syzkaller0 entered promiscuous mode [ 252.746771][T12388] ªªªªªª™™: renamed from vlan0 [ 252.965626][T12413] device syzkaller0 left promiscuous mode [ 253.547535][T12437] tap0: tun_chr_ioctl cmd 1074025673 [ 253.600983][T12439] device lo entered promiscuous mode [ 253.656870][T12445] device syzkaller0 entered promiscuous mode [ 254.148983][T12497] device syzkaller0 entered promiscuous mode [ 254.839202][T12510] ªªªªªª™™: renamed from vlan0 [ 256.633337][T12561] device syzkaller0 entered promiscuous mode [ 256.644336][T12552] device sit0 entered promiscuous mode [ 259.076257][T12650] device syzkaller0 entered promiscuous mode [ 259.269482][T12654] device wg2 left promiscuous mode [ 259.545737][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 259.817206][T12711] IPv6: pim6reg1: Disabled Multicast RS [ 261.313952][T12801] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 261.337043][T12801] device syzkaller0 entered promiscuous mode [ 261.646600][T12814] device syzkaller0 entered promiscuous mode [ 261.889040][T12822] device syzkaller0 entered promiscuous mode [ 263.505461][T12875] device syzkaller0 entered promiscuous mode [ 265.602526][T12939] +: renamed from team_slave_1 [ 268.451783][T13056] bridge0: port 3(veth1) entered blocking state [ 268.474157][T13056] bridge0: port 3(veth1) entered disabled state [ 268.486466][T13056] device veth1 entered promiscuous mode [ 268.518046][T13056] bridge0: port 3(veth1) entered blocking state [ 268.524351][T13056] bridge0: port 3(veth1) entered forwarding state [ 268.649075][T13066] device wg2 entered promiscuous mode [ 268.712270][T13071] device sit0 left promiscuous mode [ 268.842280][T13071] device wg2 entered promiscuous mode [ 269.283653][T13123] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 269.309943][T13123] device syzkaller0 entered promiscuous mode [ 269.606489][T13147] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 269.623025][T13147] device syzkaller0 entered promiscuous mode [ 269.647664][T13151] @0Ù: renamed from bond_slave_1 [ 271.024782][T13229] device veth1_macvtap left promiscuous mode [ 271.938336][T13278] device macsec0 entered promiscuous mode [ 272.075367][T13304] device veth1_macvtap left promiscuous mode [ 272.120063][T13317] device syzkaller0 left promiscuous mode [ 272.240194][ T24] audit: type=1400 audit(1776292727.590:177): avc: denied { create } for pid=13328 comm="syz.4.3709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 272.570996][T13370] device wg2 left promiscuous mode [ 272.695799][T13373] device wg2 entered promiscuous mode [ 272.710422][T13382] device syzkaller0 entered promiscuous mode [ 275.985445][T13501] device veth0_vlan left promiscuous mode [ 275.993370][T13501] device veth0_vlan entered promiscuous mode [ 276.013155][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.032881][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.072459][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.130183][T13520] device syzkaller0 entered promiscuous mode [ 276.538743][T13567] device syzkaller0 entered promiscuous mode [ 277.997047][T13643] -: renamed from syzkaller0 [ 278.649026][T13676] device syzkaller0 left promiscuous mode [ 278.760003][T13687] device syzkaller0 entered promiscuous mode [ 279.218670][T13731] bridge0: port 4(veth1) entered blocking state [ 279.229177][T13731] bridge0: port 4(veth1) entered disabled state [ 279.240242][T13731] device veth1 entered promiscuous mode [ 279.246128][T13731] bridge0: port 4(veth1) entered blocking state [ 279.252417][T13731] bridge0: port 4(veth1) entered forwarding state [ 279.279801][T13731] device veth1 left promiscuous mode [ 279.289861][T13731] bridge0: port 4(veth1) entered disabled state [ 279.903813][T13761] syz.1.3838[13761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.903872][T13761] syz.1.3838[13761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.924379][T13761] device syzkaller0 entered promiscuous mode [ 280.092533][T13787] device syzkaller0 entered promiscuous mode [ 280.337376][T13805] device sit0 entered promiscuous mode [ 280.828267][T13837] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 280.966523][T13842] device syzkaller0 entered promiscuous mode [ 282.596286][T13936] device syzkaller0 entered promiscuous mode [ 285.403839][T14011] tap0: tun_chr_ioctl cmd 2147767520 [ 285.562385][T14011] tap0: tun_chr_ioctl cmd 2147767519 [ 287.454551][T14088] device syzkaller0 entered promiscuous mode [ 287.667737][T14108] device sit0 entered promiscuous mode [ 287.882643][T14137] device syzkaller0 entered promiscuous mode [ 287.940799][T14148] device syzkaller0 entered promiscuous mode [ 289.323225][T14240] ref_ctr_offset mismatch. inode: 0x439 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 289.578242][T14241] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.586989][T14241] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.597336][T14241] device bridge_slave_0 entered promiscuous mode [ 289.653257][T14241] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.662453][T14241] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.684495][T14241] device bridge_slave_1 entered promiscuous mode [ 290.132463][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.140872][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.187689][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.218190][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.226522][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.233581][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.241117][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.249992][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.258389][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.265440][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.273127][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.295691][T14241] device veth0_vlan entered promiscuous mode [ 290.308698][T14241] device veth1_macvtap entered promiscuous mode [ 290.493249][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 290.511579][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 290.552510][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 290.587330][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 290.629744][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.665085][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.673439][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.681644][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.689942][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 290.699059][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 290.707768][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 290.716331][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 290.724938][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 290.733804][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 291.300793][T14291] device syzkaller0 entered promiscuous mode [ 291.670610][T14304] device veth0_vlan left promiscuous mode [ 291.700168][T14304] device veth0_vlan entered promiscuous mode [ 294.433720][T14398] bridge0: port 3(veth1) entered blocking state [ 294.440014][T14398] bridge0: port 3(veth1) entered disabled state [ 294.462629][T14398] device veth1 entered promiscuous mode [ 294.468454][T14398] bridge0: port 3(veth1) entered blocking state [ 294.474841][T14398] bridge0: port 3(veth1) entered forwarding state [ 294.785228][T14398] device syzkaller0 entered promiscuous mode [ 294.827164][T14400] device syzkaller0 entered promiscuous mode [ 294.899743][T14404] device syzkaller0 entered promiscuous mode [ 296.696050][T14507] device sit0 entered promiscuous mode [ 297.105414][T14510] device syzkaller0 entered promiscuous mode [ 297.259541][T14510] device veth0_vlan left promiscuous mode [ 297.396012][T14510] device veth0_vlan entered promiscuous mode [ 297.768853][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.794334][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.829474][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.723974][T14588] device syzkaller0 entered promiscuous mode [ 299.292204][T14610] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 299.316214][T14610] syzkaller0: persist disabled [ 300.596637][T14699] nr0: port 1(macsec0) entered blocking state [ 300.603652][T14699] nr0: port 1(macsec0) entered disabled state [ 300.610192][T14699] device macsec0 entered promiscuous mode [ 300.618457][T14701] syzkaller0: tun_chr_ioctl cmd 1074025672 [ 300.625839][T14701] syzkaller0: ignored: set checksum enabled [ 300.952817][T14711] device syzkaller0 entered promiscuous mode [ 300.969904][T14718] bridge0: port 4(veth0_to_bridge) entered blocking state [ 300.977133][T14718] bridge0: port 4(veth0_to_bridge) entered disabled state [ 300.984818][T14718] device veth0_to_bridge entered promiscuous mode [ 300.991463][T14718] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 301.004014][T14718] bridge0: port 4(veth0_to_bridge) entered blocking state [ 301.011134][T14718] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 301.566068][T14775] device syzkaller0 entered promiscuous mode [ 302.524043][T14846] device aaaaaaaaaaaaaaa entered promiscuous mode [ 303.563110][T14889] device syzkaller0 entered promiscuous mode [ 305.964855][T15020] device veth0_vlan left promiscuous mode [ 306.053505][T15020] device veth0_vlan entered promiscuous mode [ 306.177998][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.192826][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 306.207881][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.328737][T15084] device syzkaller0 entered promiscuous mode [ 308.535804][T15163] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.543182][T15163] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.779925][T15190] device syzkaller0 entered promiscuous mode [ 309.002178][T15195] device wg2 entered promiscuous mode [ 309.024743][T15195] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 310.760236][T15304] device sit0 left promiscuous mode [ 311.252782][T15307] device sit0 entered promiscuous mode [ 312.436132][T15339] device wg2 entered promiscuous mode [ 313.151309][T15378] device syzkaller0 entered promiscuous mode [ 313.633917][T15412] device syzkaller0 entered promiscuous mode [ 314.478103][T15468] device syzkaller0 entered promiscuous mode [ 316.555637][T15556] IPv6: …: Disabled Multicast RS [ 319.055319][T15617] device sit0 entered promiscuous mode [ 319.706257][T15650] device syzkaller0 entered promiscuous mode [ 319.746084][T15654] tap0: tun_chr_ioctl cmd 1074812118 [ 320.613954][T15680] : port 1(ip6gretap0) entered blocking state [ 320.620207][T15680] : port 1(ip6gretap0) entered disabled state [ 320.627679][T15680] device ip6gretap0 entered promiscuous mode [ 320.653362][T15683] device ip6gretap0 left promiscuous mode [ 320.659179][T15683] : port 1(ip6gretap0) entered disabled state [ 321.387291][T15719] device sit0 left promiscuous mode [ 321.557882][T15712] device sit0 entered promiscuous mode [ 321.890670][T15735] device syzkaller0 entered promiscuous mode [ 327.008772][T15914] device syzkaller0 entered promiscuous mode [ 327.112657][T15929] @0Ù: renamed from bond_slave_1 [ 327.878195][T15989] device dummy0 left promiscuous mode [ 328.239371][T16009] device syzkaller0 entered promiscuous mode [ 329.112795][T16051] device syzkaller0 entered promiscuous mode [ 330.206556][ T24] audit: type=1400 audit(1776292785.560:178): avc: denied { create } for pid=16132 comm="syz.3.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 331.177810][T16168] device syzkaller0 entered promiscuous mode [ 331.864579][T16199] device syzkaller0 entered promiscuous mode [ 332.621870][T16260] device syzkaller0 entered promiscuous mode [ 332.962606][T16264] device sit0 left promiscuous mode [ 333.551800][T16266] device sit0 entered promiscuous mode [ 338.443669][T16513] geneve1: tun_chr_ioctl cmd 1074025672 [ 338.468624][T16513] geneve1: ignored: set checksum enabled [ 338.489388][T16508] device syzkaller0 entered promiscuous mode [ 338.502389][T16512] syzkaller0: refused to change device tx_queue_len [ 339.104499][T16556] ±ÿ: renamed from team_slave_1 [ 339.960664][T16581] device syzkaller0 entered promiscuous mode [ 341.993749][T16674] device syzkaller0 entered promiscuous mode [ 343.203961][T16717] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.211013][T16717] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.218405][T16717] device bridge_slave_0 entered promiscuous mode [ 343.225392][T16717] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.232632][T16717] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.240104][T16717] device bridge_slave_1 entered promiscuous mode [ 343.247132][T16729] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 343.253003][T16729] pim6reg0: linktype set to 768 [ 343.275321][T16729] pim6reg0: tun_chr_ioctl cmd 1074025684 [ 343.340647][T16717] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.348113][T16717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.355383][T16717] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.362431][T16717] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.448865][T11951] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.456685][T11951] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.480850][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 343.488551][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 343.498133][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 343.510131][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 343.519073][ T2544] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.526136][ T2544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 343.560293][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 343.569030][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 343.578409][ T2544] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.585470][ T2544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 343.592938][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.602578][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.610659][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 343.618897][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.640274][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 343.649020][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 343.683880][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 343.691820][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 343.701101][T16717] device veth0_vlan entered promiscuous mode [ 343.711822][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 343.719833][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 343.733602][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 343.741870][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 343.767024][T16779] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 343.773771][T16717] device veth1_macvtap entered promiscuous mode [ 343.780877][T16778] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 343.817274][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 343.825321][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 343.833966][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 343.842441][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 343.850870][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 344.597043][T16837] device syzkaller0 entered promiscuous mode [ 344.785216][ T350] nr0: port 1(macsec0) entered disabled state [ 344.794898][ T350] device veth0_to_bridge left promiscuous mode [ 344.804201][ T350] bridge0: port 4(veth0_to_bridge) entered disabled state [ 344.812530][ T350] device veth1 left promiscuous mode [ 344.818217][ T350] bridge0: port 3(veth1) entered disabled state [ 344.825089][ T350] device bridge_slave_1 left promiscuous mode [ 344.831513][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.839593][ T350] device bridge_slave_0 left promiscuous mode [ 344.845982][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.377004][T16908] device wg2 left promiscuous mode [ 345.394001][T16908] device wg2 entered promiscuous mode [ 345.400971][T16908] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 345.421670][T16913] device syzkaller0 entered promiscuous mode [ 345.493839][T16919] device syzkaller0 entered promiscuous mode [ 345.717353][T16931] device syzkaller0 left promiscuous mode [ 346.214709][T16958] device syzkaller0 entered promiscuous mode [ 346.896572][T16964] device syzkaller0 entered promiscuous mode [ 346.918361][T16967] device sit0 left promiscuous mode [ 347.757084][T17051] syz.3.4805[17051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.757136][T17051] syz.3.4805[17051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.110704][T17153] device syzkaller0 entered promiscuous mode [ 349.263526][T17176] device sit0 entered promiscuous mode [ 349.783666][T17203] device syzkaller0 entered promiscuous mode [ 349.870533][T17206] device syzkaller0 entered promiscuous mode [ 349.954040][T17206] syzkaller0: create flow: hash 2396842541 index 2 [ 349.987222][T17206] syzkaller0: delete flow: hash 2396842541 index 2 [ 350.452382][T17263] ref_ctr_offset mismatch. inode: 0x56c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 350.986129][T17313] device syzkaller0 entered promiscuous mode [ 351.727464][T17333] device syzkaller0 entered promiscuous mode [ 352.440438][T17383] device wg2 left promiscuous mode [ 353.376300][T17415] device syzkaller0 entered promiscuous mode [ 354.500991][T17462] device syzkaller0 entered promiscuous mode [ 354.550748][T17473] device syzkaller0 entered promiscuous mode [ 359.333642][T17604] device syzkaller0 entered promiscuous mode [ 361.083464][T17704] device syzkaller0 entered promiscuous mode [ 362.814050][T17769] syz.0.5008[17769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.814109][T17769] syz.0.5008[17769] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.400886][T17791] device sit0 left promiscuous mode [ 363.464607][T17791] device sit0 entered promiscuous mode [ 363.827798][T17836] device syzkaller0 entered promiscuous mode [ 364.326825][T17859] device syzkaller0 entered promiscuous mode [ 364.619221][T17896] device macsec0 entered promiscuous mode [ 366.055980][T17999] device syzkaller0 entered promiscuous mode [ 366.139949][T17996] device syzkaller0 entered promiscuous mode [ 367.096835][T18063] device syzkaller0 entered promiscuous mode [ 367.544252][T18082] device syzkaller0 entered promiscuous mode [ 368.546015][T18135] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.557749][T18135] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.700062][T18139] device bridge_slave_1 left promiscuous mode [ 368.706492][T18139] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.716990][T18139] device bridge_slave_0 left promiscuous mode [ 368.723384][T18139] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.348475][T18178] device wg2 left promiscuous mode [ 372.640105][T18395] device syzkaller0 entered promiscuous mode [ 372.915731][T18403] device syzkaller0 entered promiscuous mode [ 373.054290][T18413] device sit0 left promiscuous mode [ 373.203089][T18414] device sit0 entered promiscuous mode [ 375.182421][T18481] device veth0_vlan left promiscuous mode [ 375.339792][T18481] device veth0_vlan entered promiscuous mode [ 375.452931][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.500631][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.522687][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.562410][T18502] device lo entered promiscuous mode [ 375.591914][T18502] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 375.680381][T18508] device veth0_vlan left promiscuous mode [ 375.881050][T18508] device veth0_vlan entered promiscuous mode [ 377.368182][T18614] device syzkaller0 entered promiscuous mode [ 378.803053][T18719] batadv0: tun_chr_ioctl cmd 1074025673 [ 378.832228][T18719] batadv0: tun_chr_ioctl cmd 1074025673 [ 378.844670][T18719] batadv0: tun_chr_ioctl cmd 1074025673 [ 378.891391][T18722] device veth0_vlan left promiscuous mode [ 378.933969][T18722] device veth0_vlan entered promiscuous mode [ 379.110226][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.119457][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.127363][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.420490][T18896] device syzkaller0 entered promiscuous mode [ 381.656985][T18933] device macsec0 entered promiscuous mode [ 381.921836][T18937] device syzkaller0 entered promiscuous mode [ 382.553264][T18973] device syzkaller0 entered promiscuous mode [ 386.519358][T19191] device syzkaller0 entered promiscuous mode [ 386.539486][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 388.738284][T19252] device syzkaller0 entered promiscuous mode [ 389.616886][T19312] device syzkaller0 entered promiscuous mode [ 391.428404][T19419] device syzkaller0 entered promiscuous mode [ 394.051255][T19583] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.058607][T19583] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.068379][T19583] device bridge_slave_0 entered promiscuous mode [ 394.083462][T19583] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.106570][T19583] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.116449][T19583] device bridge_slave_1 entered promiscuous mode [ 394.461467][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 394.479741][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 394.517889][T19610] device syzkaller0 entered promiscuous mode [ 394.533725][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 394.557747][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 394.568443][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.575534][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 394.583960][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 394.592566][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 394.600900][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.608035][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 394.668541][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.677120][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 394.685474][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 394.726203][T19583] device veth0_vlan entered promiscuous mode [ 394.738748][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 394.761003][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 394.783536][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 394.791098][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 394.808027][T19583] device veth1_macvtap entered promiscuous mode [ 394.836348][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 394.877025][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 394.897056][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 395.155560][T19630] device syzkaller0 entered promiscuous mode [ 396.289759][ T24] audit: type=1400 audit(1776292851.640:179): avc: denied { create } for pid=19678 comm="syz.3.5572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 397.681208][T11951] bridge0: port 3(gretap0) entered disabled state [ 397.701895][T11951] device gretap0 left promiscuous mode [ 397.707699][T11951] bridge0: port 3(gretap0) entered disabled state [ 398.020139][T11951] device bridge_slave_1 left promiscuous mode [ 398.052321][T11951] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.086154][T11951] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.122788][T11951] device veth0_vlan left promiscuous mode [ 398.923254][T19817] syz.0.5614[19817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.923336][T19817] syz.0.5614[19817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.436596][T19822] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.455155][T19822] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.464683][T19822] device bridge_slave_0 entered promiscuous mode [ 399.473567][T19822] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.480831][T19822] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.489673][T19822] device bridge_slave_1 entered promiscuous mode [ 399.521610][T19865] device syzkaller0 entered promiscuous mode [ 399.599077][T19822] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.606181][T19822] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.613473][T19822] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.620488][T19822] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.639255][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 399.646967][ T2544] bridge0: port 1(bridge_slave_0) entered disabled state [ 399.654728][ T2544] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.679769][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 399.688072][ T2544] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.695401][ T2544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.712319][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 399.722947][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 399.736556][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.743812][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.769177][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 399.777727][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 399.786717][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 399.795425][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 399.812805][T19879] device syzkaller0 entered promiscuous mode [ 399.864574][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 399.873489][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 399.886685][T19822] device veth0_vlan entered promiscuous mode [ 399.894578][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 399.905104][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 399.913739][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 399.921435][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 399.987206][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 400.010904][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 400.028740][T19822] device veth1_macvtap entered promiscuous mode [ 400.056652][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 400.072938][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 400.081837][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 400.103144][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 400.122609][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 400.520734][T19912] device syzkaller0 entered promiscuous mode [ 400.551340][T11951] device bridge_slave_1 left promiscuous mode [ 400.570519][T11951] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.584932][T11951] device bridge_slave_0 left promiscuous mode [ 400.609045][T11951] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.619470][T11951] device veth1_macvtap left promiscuous mode [ 401.076040][T19930] device sit0 entered promiscuous mode [ 402.119616][T19974] device syzkaller0 entered promiscuous mode [ 402.946234][T19989] device syzkaller0 entered promiscuous mode [ 402.969401][T19999] Â: renamed from pim6reg1 [ 404.783831][ T24] audit: type=1400 audit(1776292860.140:180): avc: denied { create } for pid=20111 comm="syz.2.5699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 407.836908][T20219] device syzkaller0 entered promiscuous mode [ 407.927407][T20229] device bridge0 entered promiscuous mode [ 408.328407][T20247] device syzkaller0 entered promiscuous mode [ 410.498251][T20361] device sit0 left promiscuous mode [ 410.982522][T20362] device sit0 entered promiscuous mode [ 411.394331][T20373] device syzkaller0 entered promiscuous mode [ 411.409818][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 414.171718][T20492] device syzkaller0 entered promiscuous mode [ 414.178792][T20486] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 414.194553][T20486] syzkaller0: linktype set to 773 [ 417.100503][T20627] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 417.112252][T20627] pim6reg0: linktype set to 768 [ 417.684975][T20696] device syzkaller0 entered promiscuous mode [ 419.056945][T20789] device wg2 entered promiscuous mode [ 419.127361][T20789] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 419.227778][T20813] device veth0_vlan left promiscuous mode [ 419.333682][T20813] device veth0_vlan entered promiscuous mode [ 419.710076][T20842] device syzkaller0 entered promiscuous mode [ 419.845301][T20842] @ÿ: renamed from bond_slave_0 [ 420.045195][T20874] device macsec0 entered promiscuous mode [ 420.062852][T20877] device veth1_macvtap left promiscuous mode [ 420.779119][T20956] device syzkaller0 entered promiscuous mode [ 421.679392][T21017] device veth0_vlan left promiscuous mode [ 421.752872][T21017] device veth0_vlan entered promiscuous mode [ 421.840463][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.849381][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.858203][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.036533][T21051] device syzkaller0 entered promiscuous mode [ 423.151968][T21108] device syzkaller0 entered promiscuous mode [ 425.205882][T21214] device syzkaller0 entered promiscuous mode [ 425.263944][T21197] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.271018][T21197] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.278803][T21197] device bridge_slave_0 entered promiscuous mode [ 425.295965][T21197] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.303658][T21197] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.311202][T21197] device bridge_slave_1 entered promiscuous mode [ 425.402930][T21228] tap0: tun_chr_ioctl cmd 1074025677 [ 425.408726][T21228] tap0: linktype set to 6 [ 425.425914][T21223] : port 1(ip6gretap0) entered blocking state [ 425.432440][T21223] : port 1(ip6gretap0) entered disabled state [ 425.439011][T21223] device ip6gretap0 entered promiscuous mode [ 425.476908][T21197] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.483984][T21197] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.517817][T21236] device lo entered promiscuous mode [ 425.527601][T21236] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 425.582682][ T2544] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.606535][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 425.614955][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 425.645132][T21236] device syzkaller0 entered promiscuous mode [ 425.672897][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 425.681714][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 425.690748][ T2544] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.697819][ T2544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.705968][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 425.718038][ T2544] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.725208][ T2544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.732850][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 425.765857][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 425.774826][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 425.783441][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 425.790996][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 425.801140][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 425.810736][T21197] device veth0_vlan entered promiscuous mode [ 425.842683][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 425.854331][T21197] device veth1_macvtap entered promiscuous mode [ 425.884707][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 425.896099][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 426.490442][T21287] device lo entered promiscuous mode [ 426.805184][T21312] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 426.847284][ T9] device veth1_macvtap left promiscuous mode [ 426.854632][ T9] device veth0_vlan left promiscuous mode [ 427.431988][T21345] ªªªªªª™™: renamed from vlan0 [ 428.914157][T21422] device sit0 left promiscuous mode [ 430.013826][T21455] @0Ù: renamed from bond_slave_1 [ 432.253248][T21560] device syzkaller0 entered promiscuous mode [ 432.259476][T21560] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 435.864770][T21714] device syzkaller0 entered promiscuous mode [ 436.003812][T21749] device syzkaller0 entered promiscuous mode [ 436.037205][T21758] bridge0: port 3(veth1) entered blocking state [ 436.052211][T21758] bridge0: port 3(veth1) entered disabled state [ 436.059214][T21758] device veth1 entered promiscuous mode [ 436.065380][T21758] bridge0: port 3(veth1) entered blocking state [ 436.071804][T21758] bridge0: port 3(veth1) entered forwarding state [ 436.108041][T21758] device veth1 left promiscuous mode [ 436.113737][T21758] bridge0: port 3(veth1) entered disabled state [ 436.204410][T21769] device syzkaller0 entered promiscuous mode [ 438.032509][T21911] device syzkaller0 entered promiscuous mode [ 438.162574][T21922] syz.0.6221[21922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.162630][T21922] syz.0.6221[21922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.546788][T21978] device syzkaller0 entered promiscuous mode [ 439.658736][T22002] device syzkaller0 entered promiscuous mode [ 442.065398][T22220] device syzkaller0 entered promiscuous mode [ 442.481941][T22241] device syzkaller0 entered promiscuous mode [ 443.363442][T22300] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 443.373270][T22300] device syzkaller0 entered promiscuous mode [ 444.133171][T22357] device syzkaller0 entered promiscuous mode [ 444.584623][T22380] device veth0_vlan left promiscuous mode [ 444.616967][T22380] device veth0_vlan entered promiscuous mode [ 444.645218][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.656871][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 444.665094][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 446.719832][T22469] device syzkaller0 entered promiscuous mode [ 446.894106][T22481] device syzkaller0 entered promiscuous mode [ 447.221521][T22522] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.228751][T22522] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.236516][T22522] device bridge0 left promiscuous mode [ 449.799403][T22664] tap0: tun_chr_ioctl cmd 2148553947 [ 450.945462][T22719] device syzkaller0 entered promiscuous mode [ 453.283582][T22860] ref_ctr_offset mismatch. inode: 0x482 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 454.517871][T22947] ±ÿ: renamed from team_slave_1 [ 454.536947][T22947] device veth1_macvtap left promiscuous mode [ 454.640787][T22952] syzkaller0: refused to change device tx_queue_len [ 454.672082][T22959] syzkaller0: refused to change device tx_queue_len [ 456.550515][T23033] device syzkaller0 entered promiscuous mode [ 457.126011][T23086] device syzkaller0 left promiscuous mode [ 457.799508][T23141] device syzkaller0 entered promiscuous mode [ 458.649332][T23180] erspan0: refused to change device tx_queue_len [ 461.124825][T23391] nr0: port 1(macsec0) entered blocking state [ 461.130930][T23391] nr0: port 1(macsec0) entered disabled state [ 461.185452][T23391] device macsec0 entered promiscuous mode [ 462.469536][T23470] device syzkaller0 entered promiscuous mode [ 464.330823][T23590] device syzkaller0 entered promiscuous mode [ 464.384924][T23592] lo: mtu less than device minimum [ 464.814067][T23623] device syzkaller0 entered promiscuous mode [ 465.373723][T23642] device syzkaller0 entered promiscuous mode [ 465.602684][T23649] device syzkaller0 entered promiscuous mode [ 468.451787][T23665] device syzkaller0 entered promiscuous mode [ 468.461174][ T2097] syzkaller0: tun_net_xmit 48 [ 468.467658][T23665] syzkaller0: create flow: hash 2396842541 index 2 [ 468.478751][T23665] syzkaller0: delete flow: hash 2396842541 index 2 [ 468.630460][T23696] ªªªªªª™™: renamed from vlan0 [ 469.021894][T23729] syz.3.6752[23729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.021996][T23729] syz.3.6752[23729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.126199][T23735] tap0: tun_chr_ioctl cmd 1074025673 [ 470.980588][T23793] cgroup: fork rejected by pids controller in /syz0 [ 471.013406][T23801] ref_ctr_offset mismatch. inode: 0x2e2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 471.160684][T23817] device syzkaller0 entered promiscuous mode [ 475.802095][T23919] device wg2 entered promiscuous mode [ 476.103913][T23974] device syzkaller0 entered promiscuous mode [ 478.915225][T24059] device veth0_vlan left promiscuous mode [ 478.950944][T24059] device veth0_vlan entered promiscuous mode [ 478.983934][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.993126][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 479.010622][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 479.063994][T24071] device syzkaller0 entered promiscuous mode [ 480.989702][T24194] device wg2 entered promiscuous mode [ 481.326952][T24217] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 481.954603][T24231] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.961917][T24231] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.998712][T24238] device bridge_slave_1 left promiscuous mode [ 482.020179][T24238] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.077281][T24238] device bridge_slave_0 left promiscuous mode [ 482.090983][T24238] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.753564][T24279] device syzkaller0 entered promiscuous mode [ 482.768868][T24278] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.776320][T24278] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.784129][T24278] device bridge_slave_0 entered promiscuous mode [ 482.945106][T24293] device veth1_macvtap left promiscuous mode [ 482.963886][T24296] device veth1_macvtap entered promiscuous mode [ 482.972028][T24278] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.979470][T24278] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.994045][T24278] device bridge_slave_1 entered promiscuous mode [ 483.234747][T24305] device syzkaller0 entered promiscuous mode [ 483.437508][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 483.445379][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 483.452917][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 483.461702][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 483.470407][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.477537][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.486975][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 483.495695][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 483.504025][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.511056][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.518691][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 483.542515][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 483.552069][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 484.094152][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 484.132528][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 484.176039][T24330] : port 1(ip6gretap0) entered blocking state [ 484.189216][T24330] : port 1(ip6gretap0) entered disabled state [ 484.227058][T24330] device ip6gretap0 entered promiscuous mode [ 484.284307][T24331] device ip6gretap0 left promiscuous mode [ 484.295570][T24331] : port 1(ip6gretap0) entered disabled state [ 484.332955][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 484.342720][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 484.360517][T24278] device veth0_vlan entered promiscuous mode [ 484.373749][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 484.388378][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 484.407245][T24278] device veth1_macvtap entered promiscuous mode [ 484.417973][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 484.426008][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 484.444011][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 484.455339][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 484.465743][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 484.490142][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 484.502494][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 484.532874][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 484.541233][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 486.984288][ T2544] device veth1_macvtap left promiscuous mode [ 487.053050][ T2544] device veth0_vlan left promiscuous mode [ 487.543367][T24499] device macsec0 entered promiscuous mode [ 488.480807][T24531] device sit0 entered promiscuous mode [ 488.667710][T24565] bridge0: port 3(veth1) entered blocking state [ 488.683826][T24565] bridge0: port 3(veth1) entered disabled state [ 488.690516][T24565] device veth1 entered promiscuous mode [ 488.703908][T24565] bridge0: port 3(veth1) entered blocking state [ 488.710486][T24565] bridge0: port 3(veth1) entered forwarding state [ 489.615368][T24557] device veth1 left promiscuous mode [ 489.620786][T24557] bridge0: port 3(veth1) entered disabled state [ 489.680679][T24581] ªªªªªª: renamed from vlan0 [ 489.880944][T24605] device syzkaller0 entered promiscuous mode [ 489.922354][ T2034] syzkaller0: tun_net_xmit 48 [ 490.660892][T24671] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x31 [ 490.700936][T24670] device syzkaller0 entered promiscuous mode [ 490.926004][T24700] batadv0: tun_chr_ioctl cmd 1074025677 [ 490.962644][T24700] batadv0: linktype set to 804 [ 491.901872][T24775] device syzkaller0 entered promiscuous mode [ 492.276891][T24810] device sit0 entered promiscuous mode [ 492.953685][T24836] batadv0: tun_chr_ioctl cmd 1074025677 [ 492.959399][T24836] batadv0: linktype set to 776 [ 493.881332][T24863] device macsec0 entered promiscuous mode [ 494.331851][T24863] â6±ÿ: renamed from team_slave_1 [ 494.466093][T24864] device veth1_macvtap left promiscuous mode [ 494.479576][T24878] device syzkaller0 entered promiscuous mode [ 495.749918][T24927] device wg2 left promiscuous mode [ 496.171819][T24941] device syzkaller0 entered promiscuous mode [ 496.516739][T24983] device syzkaller0 entered promiscuous mode [ 496.541246][T24986] sock: sock_set_timeout: `syz.0.7098' (pid 24986) tries to set negative timeout [ 498.309956][T25161] device syzkaller0 entered promiscuous mode [ 498.469384][T25170] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.476731][T25170] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.484882][T25170] device bridge_slave_0 entered promiscuous mode [ 498.493656][T25170] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.500709][T25170] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.508655][T25170] device bridge_slave_1 entered promiscuous mode [ 498.562096][T25170] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.569288][T25170] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.576573][T25170] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.583602][T25170] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.618992][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 498.626779][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.634704][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.654555][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 498.663219][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.670404][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.678121][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.686652][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.693809][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.713832][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 498.722550][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 498.735256][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 498.757539][T25170] device veth0_vlan entered promiscuous mode [ 498.769228][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 498.777712][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 498.785314][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 498.805623][T25170] device veth1_macvtap entered promiscuous mode [ 498.820947][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 498.851413][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 498.860280][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 498.890677][T25216] device syzkaller0 entered promiscuous mode [ 498.973622][T25230] IPv6: pim6reg1: Disabled Multicast RS [ 499.229010][T25254] +: renamed from team_slave_1 [ 499.308173][T25273] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.315402][T25273] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.153454][T25309] device bridge_slave_1 left promiscuous mode [ 500.170068][T25309] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.235782][T25309] device bridge_slave_0 left promiscuous mode [ 500.256139][T25309] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.891517][T25457] device veth1_macvtap left promiscuous mode [ 503.907974][T25457] device macsec0 left promiscuous mode [ 503.921408][T25457] device veth1_macvtap entered promiscuous mode [ 503.947703][T25457] device macsec0 entered promiscuous mode [ 504.116862][T25465] syz.4.7206[25465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.116941][T25465] syz.4.7206[25465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.566827][T25483] device syzkaller0 entered promiscuous mode [ 505.493990][T25510] device syzkaller0 entered promiscuous mode [ 505.962061][T25527] device xfrm0 entered promiscuous mode [ 507.190288][T25629] -1: renamed from syzkaller0 [ 507.322853][T25645] cgroup: fork rejected by pids controller in /syz2 [ 508.917779][T25870] device wg2 left promiscuous mode [ 509.034286][T25875] device wg2 entered promiscuous mode [ 509.040144][T25875] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 513.132840][T25966] ref_ctr_offset mismatch. inode: 0xb2b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 513.561768][T25981] bridge0: port 2(bridge_slave_1) entered disabled state [ 513.578570][T25981] bridge0: port 1(bridge_slave_0) entered disabled state [ 513.747238][T25988] device bridge_slave_1 left promiscuous mode [ 513.772866][T25988] bridge0: port 2(bridge_slave_1) entered disabled state [ 513.832642][T25988] device bridge_slave_0 left promiscuous mode [ 513.873494][T25988] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.059781][T26245] lo: mtu less than device minimum [ 522.696899][T26409] device sit0 entered promiscuous mode [ 523.016982][T26421] device syzkaller0 entered promiscuous mode [ 523.044846][T26425] device syzkaller0 entered promiscuous mode [ 524.713473][T26479] device syzkaller0 entered promiscuous mode [ 524.984694][T26484] device syzkaller0 entered promiscuous mode [ 525.361809][T26510] device syzkaller0 entered promiscuous mode [ 525.584590][T26536] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.591951][T26536] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.604594][T26536] device bridge_slave_1 left promiscuous mode [ 525.610849][T26536] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.621398][T26536] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.740267][T26541] tap0: tun_chr_ioctl cmd 1074025681 [ 527.886736][T26656] bridge0: port 1(bridge_slave_0) entered blocking state [ 527.939198][T26656] bridge0: port 1(bridge_slave_0) entered disabled state [ 527.966581][T26656] device bridge_slave_0 entered promiscuous mode [ 527.999457][T26656] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.021790][T26656] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.056376][T26656] device bridge_slave_1 entered promiscuous mode [ 529.062489][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 529.075931][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 529.110412][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 529.133883][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 529.179558][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.186640][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 529.202420][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 529.210855][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 529.219414][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.226482][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.242394][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 529.250226][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 529.258576][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 529.419818][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 529.430022][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 529.574280][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 529.595674][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 529.626908][T26656] device veth0_vlan entered promiscuous mode [ 529.637015][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 529.644871][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 529.808649][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 529.822803][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 529.855600][T26656] device veth1_macvtap entered promiscuous mode [ 530.002518][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 530.014119][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 530.062694][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 530.224138][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 530.238661][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 531.694632][T26735] syz.0.7532[26735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.694746][T26735] syz.0.7532[26735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.397755][T26751] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 532.485426][T26757] syz.0.7539[26757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.485474][T26757] syz.0.7539[26757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.988570][T26811] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 533.494425][T26830] IPv6: pim6reg1: Disabled Multicast RS [ 533.510720][T26833] ±ÿ: renamed from team_slave_1 [ 534.113095][T26876] device syzkaller0 entered promiscuous mode [ 534.205501][T26904] device syzkaller0 entered promiscuous mode [ 534.846225][T27005] syz.1.7609[27005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.846281][T27005] syz.1.7609[27005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.622425][T27097] device sit0 left promiscuous mode [ 535.683191][T27108] device syzkaller0 entered promiscuous mode [ 535.773226][T27097] device sit0 entered promiscuous mode [ 535.821129][T27113] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.828356][T27113] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.887682][T27100] device bridge_slave_1 left promiscuous mode [ 535.902962][T27100] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.953049][T27100] device bridge_slave_0 left promiscuous mode [ 535.968958][T27100] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.320203][T27213] device syzkaller0 entered promiscuous mode [ 542.181052][T27506] 7B’ç÷ï: renamed from syzkaller0 [ 543.067930][T27554] device syzkaller0 entered promiscuous mode [ 545.362270][T27624] nr0: port 1(macsec0) entered blocking state [ 545.378626][T27624] nr0: port 1(macsec0) entered disabled state [ 545.431015][T27624] device macsec0 entered promiscuous mode [ 545.473242][T27621] GPL: port 1(macsec0) entered blocking state [ 545.516667][T27621] GPL: port 1(macsec0) entered disabled state [ 545.594963][T27621] device macsec0 entered promiscuous mode [ 547.119156][T27709] device syzkaller0 entered promiscuous mode [ 547.904284][T27764] device syzkaller0 entered promiscuous mode [ 548.682243][T27812] device syz_tun entered promiscuous mode [ 550.494770][T27927] device sit0 entered promiscuous mode [ 551.051118][T27943] tap0: tun_chr_ioctl cmd 1074025680 [ 551.746319][T27994] device syzkaller0 entered promiscuous mode [ 551.859367][T28012] device syzkaller0 entered promiscuous mode [ 551.963328][T28026] device lo left promiscuous mode [ 552.105010][T28061] device veth0_vlan left promiscuous mode [ 552.111957][T28061] device veth0_vlan entered promiscuous mode [ 552.131676][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 552.141131][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª™™: link becomes ready [ 552.149707][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 552.261908][T28071] device sit0 entered promiscuous mode [ 553.949049][T28156] device syzkaller0 entered promiscuous mode [ 554.283973][T28166] device wg2 left promiscuous mode [ 554.481887][T28162] device wg2 entered promiscuous mode [ 554.575625][T28162] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 554.799845][T28178] device syzkaller0 entered promiscuous mode [ 556.223516][T28298] device sit0 left promiscuous mode [ 556.247937][T28296] tap0: tun_chr_ioctl cmd 1074025677 [ 556.270725][T28296] tap0: linktype set to 270 [ 557.872758][T28417] device syzkaller0 entered promiscuous mode [ 558.035314][T28434] device syzkaller0 entered promiscuous mode [ 559.460902][T28499] device xfrm0 entered promiscuous mode [ 559.754480][T28511] device syzkaller0 entered promiscuous mode [ 559.853217][T28518] device syzkaller0 entered promiscuous mode [ 560.127696][T28523] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.152178][T28523] bridge0: port 1(bridge_slave_0) entered disabled state [ 560.197018][T28523] device bridge_slave_0 entered promiscuous mode [ 560.253897][T28523] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.260983][T28523] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.309077][T28523] device bridge_slave_1 entered promiscuous mode [ 560.689598][T28523] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.696694][T28523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.704271][T28523] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.711479][T28523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 560.844379][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 560.888828][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 560.902694][ T2544] bridge0: port 2(bridge_slave_1) entered disabled state [ 560.944547][T28578] device syzkaller0 entered promiscuous mode [ 560.960040][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 560.970644][ T2544] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.977741][ T2544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.991344][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 561.002636][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 561.039894][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 561.062046][T28523] device veth0_vlan entered promiscuous mode [ 561.077166][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 561.087718][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 561.112029][T28523] device veth1_macvtap entered promiscuous mode [ 561.122626][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 561.132763][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 561.161633][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 561.176874][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 561.191690][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 561.229385][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 561.254894][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 561.267304][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 561.279232][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 562.067436][ T49] nr0: port 1(macsec0) entered disabled state [ 562.118111][ T49] device veth1_macvtap left promiscuous mode [ 562.172468][ T49] device veth0_vlan left promiscuous mode [ 562.760580][T28673] device veth1_macvtap left promiscuous mode [ 562.766641][T28673] device macsec0 left promiscuous mode [ 563.503042][T28718] ref_ctr_offset mismatch. inode: 0x3b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 563.550846][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 563.783111][T28734] device syzkaller0 entered promiscuous mode [ 564.632623][T28766] device syzkaller0 entered promiscuous mode [ 565.014074][T28787] device syzkaller0 entered promiscuous mode [ 565.674342][T28823] ±ÿ: renamed from team_slave_1 [ 565.695725][T28829] syz.1.8147[28829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 565.695810][T28829] syz.1.8147[28829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 567.807230][T28895] device sit0 left promiscuous mode [ 567.938554][T28897] device sit0 entered promiscuous mode [ 567.954541][T28903] device sit0 entered promiscuous mode [ 568.010851][T28909] syz.2.8172[28909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 568.010906][T28909] syz.2.8172[28909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 569.212637][T28948] device syzkaller0 entered promiscuous mode [ 570.415125][T29041] device syzkaller0 left promiscuous mode [ 570.572844][T29045] device veth0_vlan left promiscuous mode [ 570.615555][T29045] device veth0_vlan entered promiscuous mode [ 570.678802][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 570.688775][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 570.702217][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 571.665989][T29083] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 571.671927][T29083] syzkaller0: linktype set to 0 [ 572.677536][T29128] device syzkaller0 entered promiscuous mode [ 573.688442][T29197] device sit0 entered promiscuous mode [ 574.089670][T29226] device syzkaller0 entered promiscuous mode [ 575.761349][T29336] device wg2 left promiscuous mode [ 575.780408][T29336] device wg2 entered promiscuous mode [ 575.802263][T29336] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 578.301565][T29465] device syzkaller0 entered promiscuous mode [ 578.517321][T29498] syzkaller0: tun_chr_ioctl cmd 1074025692 [ 579.351370][T29553] device syzkaller0 entered promiscuous mode [ 579.489943][T29568] device syzkaller0 entered promiscuous mode [ 579.497643][T29568] device syzkaller0 left promiscuous mode [ 579.872634][T29619] device syzkaller0 entered promiscuous mode [ 580.923903][T29671] gretap0: mtu less than device minimum [ 581.526886][T29687] device syzkaller0 entered promiscuous mode [ 582.009708][T29719] device veth0_vlan left promiscuous mode [ 582.096174][T29719] device veth0_vlan entered promiscuous mode [ 582.863549][T29792] device syzkaller0 entered promiscuous mode [ 582.949924][T29813] device sit0 left promiscuous mode [ 582.980678][T29813] device sit0 entered promiscuous mode [ 584.716731][T29885] device syzkaller0 entered promiscuous mode [ 584.799898][T29894] device sit0 left promiscuous mode [ 585.218129][T29895] device sit0 entered promiscuous mode [ 585.419912][T29929] bridge0: port 3(gretap0) entered blocking state [ 585.476689][T29929] bridge0: port 3(gretap0) entered disabled state [ 585.553309][T29929] device gretap0 entered promiscuous mode [ 586.091616][T29964] device pim6reg1 entered promiscuous mode [ 587.315501][T30055] @0Ù: renamed from bond_slave_1 [ 587.575906][T30065] device wg2 entered promiscuous mode [ 587.689138][T30082] syz.4.8504[30082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.689221][T30082] syz.4.8504[30082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.703142][T30079] device syzkaller0 entered promiscuous mode [ 588.824807][T30096] device wg2 entered promiscuous mode [ 589.425561][T30150] device syzkaller0 left promiscuous mode [ 590.158938][T30226] device syzkaller0 entered promiscuous mode [ 590.247792][T30236] device syzkaller0 entered promiscuous mode [ 592.773432][T30415] -1: renamed from syzkaller0 [ 594.288605][T30479] device wg2 left promiscuous mode [ 594.420380][T30491] device wg2 entered promiscuous mode [ 594.608011][T30497] +: renamed from team_slave_1 [ 599.525921][T30601] ªªªªªª: renamed from vlan0 [ 602.250973][T30699] device syzkaller0 entered promiscuous mode [ 603.043994][T30726] device syzkaller0 entered promiscuous mode [ 603.295744][T30740] : renamed from bond_slave_0 [ 603.358972][T30744] tap0: tun_chr_ioctl cmd 1074025681 [ 603.968072][T30771] device syzkaller0 entered promiscuous mode [ 604.367230][T30795] device syzkaller0 entered promiscuous mode [ 604.636092][T30838] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 604.646429][T30838] syzkaller0: persist disabled [ 605.558010][T30912] device veth0_vlan left promiscuous mode [ 605.648882][T30912] device veth0_vlan entered promiscuous mode [ 605.910878][T30923] device syzkaller0 entered promiscuous mode [ 606.552849][T31020] device syzkaller0 entered promiscuous mode [ 607.900043][T31092] IPv6: pim6reg1: Disabled Multicast RS [ 608.011372][T31101] device syzkaller0 entered promiscuous mode [ 608.041045][T31109] device veth0_vlan left promiscuous mode [ 608.048243][T31109] device veth0_vlan entered promiscuous mode [ 608.225353][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 610.381570][T31290] device veth1_to_bridge entered promiscuous mode [ 610.504749][T31290] device syzkaller0 entered promiscuous mode [ 610.816633][T31289] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 611.007073][T31289] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 611.905585][T31359] device syzkaller0 entered promiscuous mode [ 614.326847][T31449] device syzkaller0 entered promiscuous mode [ 615.353309][T31496] device syzkaller0 entered promiscuous mode [ 615.371629][T31497] geneve0: tun_chr_ioctl cmd 1074025677 [ 615.410970][T31497] geneve0: linktype set to 1 [ 615.996183][T31516] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.003687][T31516] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.011645][T31516] device bridge_slave_0 entered promiscuous mode [ 616.018956][T31516] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.026670][T31516] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.034450][T31516] device bridge_slave_1 entered promiscuous mode [ 616.231711][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 616.239493][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 616.259331][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 616.267981][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 616.278469][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.285756][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 616.342469][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 616.350581][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 616.361396][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 616.370582][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.377740][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.387458][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 616.395746][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 616.404034][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 616.412805][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 616.658904][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 616.667835][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 616.801803][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 616.838922][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 616.853914][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 616.878874][T31516] device veth0_vlan entered promiscuous mode [ 616.901256][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 616.929898][T31516] device veth1_macvtap entered promiscuous mode [ 616.949044][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 616.964890][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 616.981527][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 616.996265][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 617.192961][ T49] device veth0_vlan left promiscuous mode [ 617.869036][T31658] device sit0 left promiscuous mode [ 617.888872][T31658] device sit0 entered promiscuous mode [ 621.176469][T31785] device syzkaller0 entered promiscuous mode [ 621.728805][T31817] device syzkaller0 entered promiscuous mode [ 621.870470][T31829] @ÿ: renamed from bond_slave_0 [ 621.986603][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 622.006500][T31845] device syzkaller0 left promiscuous mode [ 622.015290][T31845] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 622.056718][T31844] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 623.180722][T31890] sock: sock_set_timeout: `syz.1.9023' (pid 31890) tries to set negative timeout [ 623.272678][T31886] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 623.395292][T31886] device syzkaller0 entered promiscuous mode [ 627.344494][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.350117][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.356108][T32038] pimreg: linktype set to 823 [ 627.360962][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.366847][T32038] pimreg: linktype set to 823 [ 627.377803][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.385566][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.391187][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.396770][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.406507][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.412384][T32038] pimreg: linktype set to 823 [ 627.417138][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.423375][T32038] pimreg: linktype set to 823 [ 627.431755][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.437460][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.444953][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.450643][T32038] pimreg: linktype set to 823 [ 627.461761][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.467393][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.473108][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.478583][T32038] pimreg: linktype set to 823 [ 627.507177][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.517780][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.524399][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.532594][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.556788][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.562535][T32038] pimreg: linktype set to 823 [ 627.568641][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.574546][T32038] pimreg: linktype set to 823 [ 627.590878][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.604150][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.609687][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.615709][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.621410][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.630147][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.639323][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.645857][T32038] pimreg: linktype set to 823 [ 627.651092][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.656745][T32038] pimreg: linktype set to 823 [ 627.669665][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.675547][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.683927][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.689486][T32038] pimreg: linktype set to 823 [ 627.703035][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.708709][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.769799][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.797815][T32038] pimreg: linktype set to 823 [ 627.840751][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.881286][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 627.911738][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 627.922232][T32038] pimreg: linktype set to 823 [ 627.965793][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 628.059638][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 628.102832][T32038] pimreg: linktype set to 823 [ 628.122977][T32038] pimreg: tun_chr_ioctl cmd 1074025677 [ 628.150345][T32038] pimreg: linktype set to 823 [ 628.192167][T32037] pimreg: tun_chr_ioctl cmd 1074025673 [ 628.207799][T32095] device sit0 left promiscuous mode [ 629.096381][T32152] device wg2 left promiscuous mode [ 629.141920][T32152] device wg2 entered promiscuous mode [ 629.199070][T32163] device syzkaller0 entered promiscuous mode [ 629.733752][T32196] device syzkaller0 entered promiscuous mode [ 630.773219][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 630.849560][T32244] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 630.902725][T32252] device wg2 left promiscuous mode [ 631.970496][T32329] geneve1: tun_chr_ioctl cmd 1074025672 [ 631.998911][T32329] geneve1: ignored: set checksum enabled [ 632.030720][T32332] geneve1: tun_chr_ioctl cmd 21731 [ 632.373053][T32341] device sit0 entered promiscuous mode [ 632.379249][T32345] syz.3.9155[32345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 632.379306][T32345] syz.3.9155[32345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 632.458800][T32348] batadv0: tun_chr_ioctl cmd 1074025677 [ 632.532354][T32348] batadv0: linktype set to 804 [ 632.591542][T32356] -: renamed from syzkaller0 [ 633.190347][T32399] : renamed from bond_slave_0 [ 633.753819][T32445] syz.1.9184[32445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.753936][T32445] syz.1.9184[32445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.978810][T32471] device syzkaller0 entered promiscuous mode [ 634.244648][T32497] device syzkaller0 entered promiscuous mode [ 634.253389][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 634.261595][T32497] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 634.271851][T32491] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 634.280569][T32491] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 634.297938][T32503] device syzkaller0 left promiscuous mode [ 634.306649][T32503] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 634.400556][T32521] device syzkaller0 entered promiscuous mode [ 634.407152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 634.418162][T32522] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 636.098713][T32640] bridge0: port 3(veth1_macvtap) entered blocking state [ 636.106242][T32640] bridge0: port 3(veth1_macvtap) entered disabled state [ 636.121147][T32633] ref_ctr_offset mismatch. inode: 0x76f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 636.161157][T32639] device syzkaller0 entered promiscuous mode [ 636.348942][T32653] device sit0 left promiscuous mode [ 636.822695][T32694] device syzkaller0 entered promiscuous mode [ 638.500656][ T313] device syzkaller0 entered promiscuous mode [ 639.894166][ T403] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.901596][ T403] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.949608][ T406] device bridge_slave_1 left promiscuous mode [ 639.962287][ T406] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.969930][ T406] device bridge_slave_0 left promiscuous mode [ 639.976318][ T406] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.034735][ T412] tun0: tun_chr_ioctl cmd 1074025676 [ 640.042200][ T412] tun0: owner set to 0 [ 642.393017][ T568] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 642.398936][ T568] pim6reg0: linktype set to 768 [ 642.580961][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 642.588924][ T574] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 642.603358][ T574] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 642.627042][ T573] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 642.635305][ T573] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 642.977123][ T600] ref_ctr_offset mismatch. inode: 0x4c7 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 643.714627][ T627] lo: mtu less than device minimum [ 643.796736][ T644] dvmrp1: tun_chr_ioctl cmd 2147767519 [ 643.910638][ T659] macsec0: mtu less than device minimum [ 645.902246][ T746] device lo entered promiscuous mode [ 647.052601][ T787] €Â0: renamed from pim6reg1 [ 648.248623][ T813] device vlan0 entered promiscuous mode [ 648.550718][ T837] device syzkaller0 left promiscuous mode [ 648.651685][ T856] device syzkaller0 entered promiscuous mode [ 648.815833][ T872] device syzkaller0 entered promiscuous mode [ 648.885359][ T879] €Â0: renamed from pim6reg1 [ 651.604008][ T970] device syzkaller0 entered promiscuous mode [ 653.173123][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 653.196644][ T1025] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 653.332027][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 653.370432][ T1038] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 655.515555][ T1110] device wg2 entered promiscuous mode [ 657.475919][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 657.491110][ T1267] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 658.731246][ T1299] device veth1_macvtap left promiscuous mode [ 658.812302][ T1299] device veth1_macvtap entered promiscuous mode [ 660.285749][ T1381] device syzkaller0 entered promiscuous mode [ 660.332037][ T1390] device syzkaller0 entered promiscuous mode [ 660.399820][ T1395] device syzkaller0 entered promiscuous mode [ 660.532742][ T1409] device syzkaller0 entered promiscuous mode [ 660.625989][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 660.721451][ T1407] device wg2 left promiscuous mode [ 660.866881][ T1413] device wg2 entered promiscuous mode [ 661.992170][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 662.004921][ T1485] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 662.639205][ T1527] device wg2 entered promiscuous mode [ 663.532527][ T1569] device syzkaller0 entered promiscuous mode [ 663.768435][ T1580] syz.3.9632[1580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.768488][ T1580] syz.3.9632[1580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.796605][ T1580] device syzkaller0 entered promiscuous mode [ 664.958066][ T1635] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.975204][ T1635] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.994210][ T1635] device bridge_slave_0 entered promiscuous mode [ 665.042199][ T1635] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.113048][ T1635] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.181646][ T1635] device bridge_slave_1 entered promiscuous mode [ 665.353931][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 665.361949][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 665.381123][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 665.390124][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 665.398515][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.405687][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.413192][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 665.421469][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 665.429812][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.436851][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.444701][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 665.452776][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 665.460824][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 665.480266][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 665.501705][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 665.510612][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 665.518639][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 665.530247][ T1635] device veth0_vlan entered promiscuous mode [ 665.548100][ T1635] device veth1_macvtap entered promiscuous mode [ 665.559286][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 665.582895][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 665.591820][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 666.498041][ T9] device gretap0 left promiscuous mode [ 666.538396][ T9] bridge0: port 3(gretap0) entered disabled state [ 666.785652][ T9] device bridge_slave_1 left promiscuous mode [ 666.829984][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.945128][ T9] device bridge_slave_0 left promiscuous mode [ 666.952286][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 668.523120][ T1843] device syzkaller0 entered promiscuous mode [ 669.417654][ T1904] device syzkaller0 entered promiscuous mode [ 669.749649][ T1956] syzkaller0: mtu less than device minimum [ 669.865219][ T1946] device wg2 left promiscuous mode [ 669.931666][ T1965] device syzkaller0 entered promiscuous mode [ 670.855462][ T2024] device syzkaller0 entered promiscuous mode [ 670.918307][ T2029] device syzkaller0 entered promiscuous mode [ 670.959730][ T2035] device syzkaller0 entered promiscuous mode [ 671.149352][ T2100] device pim6reg1 entered promiscuous mode [ 673.661877][ T2184] device sit0 left promiscuous mode [ 673.852495][ T2184] device sit0 entered promiscuous mode [ 674.832453][ T2202] device syzkaller0 entered promiscuous mode [ 675.904073][ T2229] device syzkaller0 entered promiscuous mode [ 677.502524][ T2265] bridge0: port 3(ip6gretap0) entered blocking state [ 677.509256][ T2265] bridge0: port 3(ip6gretap0) entered disabled state [ 677.522641][ T2265] device ip6gretap0 entered promiscuous mode [ 677.528820][ T2265] bridge0: port 3(ip6gretap0) entered blocking state [ 677.535552][ T2265] bridge0: port 3(ip6gretap0) entered forwarding state [ 677.567136][ T2269] device ip6gretap0 left promiscuous mode [ 677.632498][ T2269] bridge0: port 3(ip6gretap0) entered disabled state [ 677.800925][ T2286] syz.4.9824[2286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 677.800978][ T2286] syz.4.9824[2286] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 681.545602][ T2386] device syzkaller0 entered promiscuous mode [ 681.579808][ T2386] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 682.509950][ T2422] device wg2 entered promiscuous mode [ 682.618222][ T2425] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.627391][ T2425] bridge0: port 1(bridge_slave_0) entered disabled state [ 682.635701][ T2425] device bridge_slave_0 entered promiscuous mode [ 682.665945][ T2425] bridge0: port 2(bridge_slave_1) entered blocking state [ 682.683462][ T2425] bridge0: port 2(bridge_slave_1) entered disabled state [ 682.691035][ T2425] device bridge_slave_1 entered promiscuous mode [ 682.824549][ T2425] bridge0: port 2(bridge_slave_1) entered blocking state [ 682.831752][ T2425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 682.839151][ T2425] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.846391][ T2425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 682.870461][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 682.879463][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 682.887478][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 682.924474][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 682.952665][ T350] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.959726][ T350] bridge0: port 1(bridge_slave_0) entered forwarding state [ 682.997631][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 683.007766][ T350] bridge0: port 2(bridge_slave_1) entered blocking state [ 683.015097][ T350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 683.036315][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 683.049576][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 683.065808][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 683.094987][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 683.105757][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 683.113501][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 683.124066][ T2425] device veth0_vlan entered promiscuous mode [ 683.200974][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 683.227333][ T2425] device veth1_macvtap entered promiscuous mode [ 683.333810][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 683.370994][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 683.439493][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 683.542844][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 683.954339][ T2515] tun0: tun_chr_ioctl cmd 2147767506 [ 685.221344][ T2606] device syzkaller0 entered promiscuous mode [ 686.913356][ T2708] device syzkaller0 entered promiscuous mode [ 687.019375][ T2713] device syzkaller0 entered promiscuous mode [ 687.318293][ T2726] device syzkaller0 entered promiscuous mode [ 687.324451][ T2726] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 689.247355][ T2818] device veth0_vlan left promiscuous mode [ 689.262620][ T2818] device veth0_vlan entered promiscuous mode [ 689.269972][T11951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 689.280824][T11951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 689.289031][T11951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 689.319448][ T2820] device syzkaller0 entered promiscuous mode [ 689.353688][ T2823] device syzkaller0 entered promiscuous mode [ 689.813161][ T2838] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 689.821942][ T2838] device syzkaller0 entered promiscuous mode [ 690.765956][ T2883] device syzkaller0 entered promiscuous mode [ 690.901712][ T2884] : port 1(ip6gretap0) entered blocking state [ 690.920130][ T2884] : port 1(ip6gretap0) entered disabled state [ 690.931621][ T2884] device ip6gretap0 entered promiscuous mode [ 693.600183][ T3117] device syzkaller0 entered promiscuous mode [ 693.903916][ T3157] tap0: tun_chr_ioctl cmd 1074025675 [ 693.909292][ T3157] tap0: persist enabled [ 693.914690][ T3167] tap0: tun_chr_ioctl cmd 1074025673 [ 693.931345][ T3179] device syzkaller0 entered promiscuous mode [ 693.938940][ T3157] tap0: tun_chr_ioctl cmd 1074025675 [ 693.944278][ T3157] tap0: persist disabled [ 694.068643][ T3187] device syzkaller0 entered promiscuous mode [ 697.454328][ T3387] tun0: tun_chr_ioctl cmd 1074025677 [ 697.460161][ T3387] tun0: linktype set to 820 [ 697.993118][ T3392] ÿÿÿÿÿÿ: renamed from vlan1 [ 698.084047][ T3424] device syzkaller0 entered promiscuous mode [ 698.106431][ T3424] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 698.227207][ T3424] syzkaller0: mtu greater than device maximum [ 698.674638][ T3462] device wg2 entered promiscuous mode [ 698.687604][ T3462] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 700.579576][ T3550] device syzkaller0 entered promiscuous mode [ 700.895262][ T3555] device syzkaller0 entered promiscuous mode [ 701.492010][ T3591] device xfrm0 entered promiscuous mode [ 705.118108][ T3724] device syzkaller0 entered promiscuous mode [ 706.166209][ T3792] device syzkaller0 entered promiscuous mode [ 706.551183][ T3818] device ip6gretap0 left promiscuous mode [ 706.560532][ T3818] : port 1(ip6gretap0) entered disabled state [ 707.925726][ T3876] batadv0: tun_chr_ioctl cmd 21731 [ 710.357271][ T4035] device syzkaller0 entered promiscuous mode [ 710.905938][ T4060] device wg2 entered promiscuous mode [ 711.305676][ T4091] device syzkaller0 entered promiscuous mode [ 711.559598][ T4104] device syzkaller0 entered promiscuous mode [ 711.707125][ T4110] device syzkaller0 entered promiscuous mode [ 712.298678][ T4139] tun0: tun_chr_ioctl cmd 1074812118 [ 712.540199][ T4157] device syzkaller0 entered promiscuous mode [ 714.484819][ T4232] device veth0_vlan left promiscuous mode [ 714.597953][ T4232] device veth0_vlan entered promiscuous mode [ 714.769677][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 714.778047][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 714.785854][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 715.244047][ T4270] device syzkaller0 entered promiscuous mode [ 717.046892][T11951] device veth0_vlan left promiscuous mode [ 718.410205][ T4403] device syzkaller0 entered promiscuous mode [ 718.933705][ T4489] tap0: tun_chr_ioctl cmd 35108 [ 719.648291][ T4501] device syzkaller0 entered promiscuous mode [ 719.659611][ T4502] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 721.452308][ T4686] device syzkaller0 entered promiscuous mode [ 722.048191][ T4713] device syzkaller0 entered promiscuous mode [ 722.392326][ T4728] device syzkaller0 entered promiscuous mode [ 722.588772][ T4762] device syzkaller0 entered promiscuous mode [ 722.779103][ T4790] team0: tun_chr_ioctl cmd 35111 [ 724.211708][ T4870] device wg2 entered promiscuous mode [ 724.432785][ T4872] device syzkaller0 entered promiscuous mode [ 724.456215][ T4877] erspan0: refused to change device tx_queue_len [ 726.745439][ T4929] device syzkaller0 entered promiscuous mode [ 728.433012][ T5013] device sit0 entered promiscuous mode [ 729.345872][ T5024] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.353611][ T5024] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.361130][ T5024] device bridge_slave_0 entered promiscuous mode [ 729.467162][ T5024] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.475152][ T5024] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.482950][ T5024] device bridge_slave_1 entered promiscuous mode [ 729.604107][ T5024] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.611203][ T5024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.618593][ T5024] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.625758][ T5024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.654085][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 729.663034][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.678623][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.697107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 729.709182][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 729.716269][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 729.725028][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 729.733475][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 729.740520][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 729.770319][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 729.795132][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 729.840676][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 729.858383][ T5024] device veth0_vlan entered promiscuous mode [ 729.869744][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 729.878006][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 729.889253][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 729.921756][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 729.945058][ T5024] device veth1_macvtap entered promiscuous mode [ 729.977204][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 729.990007][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 731.058255][ T5123] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.155656][ T5123] bridge0: port 1(bridge_slave_0) entered disabled state [ 731.186762][ T5123] device bridge_slave_0 entered promiscuous mode [ 731.194799][ T5123] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.225873][ T5123] bridge0: port 2(bridge_slave_1) entered disabled state [ 731.242010][ T5123] device bridge_slave_1 entered promiscuous mode [ 731.392912][ T5157] syzkaller0: refused to change device tx_queue_len [ 731.449712][ T5159] device syzkaller0 entered promiscuous mode [ 731.565608][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 731.575375][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 731.605148][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 731.613547][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 731.621669][ T2544] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.628806][ T2544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.636407][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 731.645260][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 731.653525][ T2544] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.661149][ T2544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.668711][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 731.676942][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 731.711904][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 731.734215][ T399] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 731.779565][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 731.803962][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 731.837679][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 731.849379][ T5123] device veth0_vlan entered promiscuous mode [ 731.870364][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 731.946740][ T5123] device veth1_macvtap entered promiscuous mode [ 732.166498][ T5186] device sit0 entered promiscuous mode [ 732.447353][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 732.484652][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 732.506909][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 733.286923][ T5253] device sit0 entered promiscuous mode [ 734.022498][ T5295] device syzkaller0 entered promiscuous mode [ 734.988016][ T5357] device syzkaller0 entered promiscuous mode [ 735.432319][ T5386] device aaaaaaaaaaaaaaa entered promiscuous mode [ 735.460558][ T5379] syzkaller0: refused to change device tx_queue_len [ 736.166346][ T5446] device syzkaller0 entered promiscuous mode [ 736.302243][ T5444] +: renamed from team_slave_1 [ 738.014860][ T5570] device wg2 left promiscuous mode [ 738.037815][ T5576] device wg2 entered promiscuous mode [ 738.049617][ T5592] device syzkaller0 entered promiscuous mode [ 738.479428][ T5619] device syzkaller0 entered promiscuous mode [ 739.719352][ T5655] device syzkaller0 entered promiscuous mode [ 741.321828][ T5737] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.804612][ T5799] device syzkaller0 entered promiscuous mode [ 741.827320][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 742.489381][ T5839] device syzkaller0 entered promiscuous mode [ 745.778930][ T6090] device syzkaller0 entered promiscuous mode [ 748.284976][ T6203] device syzkaller0 entered promiscuous mode [ 748.666864][ T6225] device syzkaller0 entered promiscuous mode [ 748.680293][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 748.923599][ T6260] device syzkaller0 entered promiscuous mode [ 748.945493][ T6260] device syzkaller0 left promiscuous mode [ 748.985109][ T6272] device syzkaller0 entered promiscuous mode [ 749.351738][ T6331] tap0: tun_chr_ioctl cmd 1074025673 [ 749.360884][ T6329] tap0: tun_chr_ioctl cmd 35108 [ 749.370943][ T6330] tap0: tun_chr_ioctl cmd 35108 [ 749.975900][ T6368] device wg2 left promiscuous mode [ 750.093700][ T6369] device wg2 entered promiscuous mode [ 750.136069][ T6368] device syzkaller0 entered promiscuous mode [ 750.938182][ T6445] device syzkaller0 entered promiscuous mode [ 751.808310][ T6484] device aaaaaaaaaaaaaaa entered promiscuous mode [ 753.197490][ T6608] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.292264][ T6608] device bridge_slave_1 left promiscuous mode [ 753.315123][ T6608] bridge0: port 2(bridge_slave_1) entered disabled state [ 753.453188][ T6608] device bridge_slave_0 left promiscuous mode [ 753.489373][ T6608] bridge0: port 1(bridge_slave_0) entered disabled state [ 754.268730][ T6645] device wg2 left promiscuous mode [ 754.293709][ T6645] device wg2 entered promiscuous mode [ 755.162817][ T6695] device sit0 left promiscuous mode [ 755.211638][ T6698] device sit0 entered promiscuous mode [ 756.073596][ T6726] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 756.079391][ T6726] pim6reg0: linktype set to 768 [ 756.108972][ T6720] device syzkaller0 entered promiscuous mode [ 756.843715][ T6767] device syzkaller0 entered promiscuous mode [ 758.696460][ T6847] device syzkaller0 entered promiscuous mode [ 761.425648][ T6966] device syzkaller0 entered promiscuous mode [ 761.582275][ T6974] device syzkaller0 entered promiscuous mode [ 765.374399][ T7064] device syzkaller0 entered promiscuous mode [ 766.891893][ T7191] Â: renamed from pim6reg1 [ 768.274310][ T7231] device syzkaller0 entered promiscuous mode [ 768.487054][ T7239] device syzkaller0 entered promiscuous mode [ 768.513253][ T7241] device syzkaller0 left promiscuous mode [ 769.474226][ T24] audit: type=1400 audit(1776293224.830:181): avc: denied { create } for pid=7273 comm="syz.4.11229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 769.649129][ T7281] device syzkaller0 entered promiscuous mode [ 769.778387][ T7294] device syzkaller0 entered promiscuous mode [ 769.926650][ T7313] device pim6reg1 entered promiscuous mode [ 771.161456][ T7342] device syzkaller0 entered promiscuous mode [ 774.407804][ T7436] device syzkaller0 entered promiscuous mode [ 774.962011][ T7479] device veth1_macvtap left promiscuous mode [ 775.228361][ T7488] device syzkaller0 entered promiscuous mode [ 776.386119][ T7524] device xfrm0 entered promiscuous mode [ 777.515074][ T7548] device sit0 left promiscuous mode [ 777.547310][ T7548] device sit0 entered promiscuous mode [ 778.050373][ T7589] device syzkaller0 entered promiscuous mode [ 778.447598][ T7603] device sit0 left promiscuous mode [ 778.579108][ T7594] device syzkaller0 entered promiscuous mode [ 778.629628][ T7596] device sit0 entered promiscuous mode [ 778.898208][ T7611] device syzkaller0 entered promiscuous mode [ 779.130650][ T7665] device syzkaller0 entered promiscuous mode [ 779.147527][ T7665] syzkaller0: tun_net_xmit 1280 [ 779.155051][ T7665] device sit0 left promiscuous mode [ 779.263938][ T7677] device sit0 entered promiscuous mode [ 779.403330][ T7692] device syzkaller0 entered promiscuous mode [ 779.496091][ T7694] device syzkaller0 entered promiscuous mode [ 779.946915][ T7707] device sit0 left promiscuous mode [ 779.961354][ T7708] device sit0 entered promiscuous mode [ 780.066000][ T7713] device syzkaller0 entered promiscuous mode [ 780.076391][ T7713] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 781.067741][ T7760] Ÿë: port 1(vlan1) entered blocking state [ 781.142257][ T7760] Ÿë: port 1(vlan1) entered disabled state [ 781.166174][ T7760] device vlan1 entered promiscuous mode [ 781.478466][ T7808] device syzkaller0 entered promiscuous mode [ 781.668190][ T7824] device syzkaller0 entered promiscuous mode [ 781.846308][ T7839] device wg2 left promiscuous mode [ 781.881373][ T7839] device wg2 entered promiscuous mode [ 782.430621][ T7894] syz.1.11411[7894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 782.430675][ T7894] syz.1.11411[7894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 783.235039][ T7944] device syzkaller0 entered promiscuous mode [ 783.484500][ T7954] bridge0: port 3(veth1_macvtap) entered blocking state [ 783.491608][ T7954] bridge0: port 3(veth1_macvtap) entered disabled state [ 784.645437][ T7994] device syzkaller0 entered promiscuous mode [ 785.258525][ T8033] device wg2 entered promiscuous mode [ 785.531011][ T8034] device syzkaller0 entered promiscuous mode [ 785.619566][ T8032] tap0: tun_chr_ioctl cmd 1074025673 [ 786.388043][ T8078] @ÿ: renamed from bond_slave_0 [ 789.423004][ T8190] device syzkaller0 entered promiscuous mode [ 789.644597][ T8213] tap0: tun_chr_ioctl cmd 1074025681 [ 790.637898][ T8268] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 790.659855][ T8268] device syzkaller0 entered promiscuous mode [ 790.955015][ T8299] device wg2 entered promiscuous mode [ 791.607002][ T8332] device sit0 entered promiscuous mode [ 793.304279][ T8389] device team_slave_1 entered promiscuous mode [ 793.383538][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 793.434282][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 793.698975][ T8389] device syzkaller0 entered promiscuous mode [ 793.969875][ T8392] device sit0 entered promiscuous mode [ 794.687547][ T8440] device syzkaller0 entered promiscuous mode [ 794.735524][ T8449] device syzkaller0 entered promiscuous mode [ 795.644865][ T8586] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.651928][ T8586] bridge0: port 1(bridge_slave_0) entered disabled state [ 795.664277][ T8586] device bridge_slave_0 entered promiscuous mode [ 795.671690][ T8586] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.679050][ T8586] bridge0: port 2(bridge_slave_1) entered disabled state [ 795.686685][ T8586] device bridge_slave_1 entered promiscuous mode [ 795.973908][ T8586] bridge0: port 2(bridge_slave_1) entered blocking state [ 795.980983][ T8586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 795.988284][ T8586] bridge0: port 1(bridge_slave_0) entered blocking state [ 795.995317][ T8586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.035660][ T2544] bridge0: port 1(bridge_slave_0) entered disabled state [ 796.076942][ T2544] bridge0: port 2(bridge_slave_1) entered disabled state [ 796.157331][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 796.191416][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 796.286341][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 796.348268][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 796.434312][ T2544] bridge0: port 1(bridge_slave_0) entered blocking state [ 796.441390][ T2544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 796.543079][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 796.581423][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 796.643882][ T2544] bridge0: port 2(bridge_slave_1) entered blocking state [ 796.651059][ T2544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 796.726319][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 796.777828][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 796.862964][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 796.905060][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 796.938562][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 796.967365][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 797.000113][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 797.018450][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 797.053152][ T8586] device veth0_vlan entered promiscuous mode [ 797.064228][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 797.084041][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 797.107665][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 797.126139][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 797.161641][ T8586] device veth1_macvtap entered promiscuous mode [ 797.179471][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 797.190964][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 797.203949][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 797.278199][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 797.328549][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 797.467525][ T8672] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 797.478304][ T8671] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 797.749301][ T9] device bridge_slave_1 left promiscuous mode [ 797.759258][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.770205][ T9] device bridge_slave_0 left promiscuous mode [ 797.778723][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.789217][ T9] device veth1_macvtap left promiscuous mode [ 797.806753][ T9] device veth0_vlan left promiscuous mode [ 798.015382][ T8703] device sit0 left promiscuous mode [ 798.494113][ T8715] device wg2 left promiscuous mode [ 799.039250][ T8762] device syzkaller0 entered promiscuous mode [ 802.833673][ T8950] : renamed from bond_slave_0 [ 803.747815][ T9006] device sit0 left promiscuous mode [ 803.911346][ T9006] device sit0 entered promiscuous mode [ 804.718847][ T9029] device syzkaller0 entered promiscuous mode [ 804.837748][ T9052] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 804.898641][ T9052] device syzkaller0 entered promiscuous mode [ 805.393438][ T9119] device syzkaller0 entered promiscuous mode [ 805.500312][ T9121] device wg2 left promiscuous mode [ 805.581351][ T9126] device wg2 entered promiscuous mode [ 806.531427][ T9170] device syzkaller0 entered promiscuous mode [ 806.587446][ T9171] device syzkaller0 entered promiscuous mode [ 806.603394][ T9181] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.282875][ T9249] device macsec0 entered promiscuous mode [ 807.290182][ T9249] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 808.306139][ T9338] device sit0 left promiscuous mode [ 808.343033][ T9343] device team_slave_1 entered promiscuous mode [ 808.349879][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 808.368732][ T350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 809.891032][ T9413] tun0: tun_chr_ioctl cmd 1074025676 [ 810.050636][ T9413] tun0: owner set to 0 [ 813.137490][ T9577] device sit0 left promiscuous mode [ 813.176988][ T9577] device sit0 entered promiscuous mode [ 813.461601][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 813.474662][ T9592] device syzkaller0 entered promiscuous mode [ 813.859329][ T9608] ref_ctr_offset mismatch. inode: 0x5f1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 814.845426][ T9702] device syzkaller0 left promiscuous mode [ 815.406525][ T9759] erspan0: refused to change device tx_queue_len [ 816.043942][ T9801] device wg2 left promiscuous mode [ 816.132368][ T9808] device syzkaller0 entered promiscuous mode [ 818.041243][ T9914] bridge0: port 3(gretap0) entered blocking state [ 818.059303][ T9914] bridge0: port 3(gretap0) entered disabled state [ 818.079951][ T9914] device gretap0 entered promiscuous mode [ 818.091490][ T9914] bridge0: port 3(gretap0) entered blocking state [ 818.097981][ T9914] bridge0: port 3(gretap0) entered forwarding state [ 818.249065][ T9915] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.260275][ T9915] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.449466][ T9919] device bridge_slave_1 left promiscuous mode [ 818.455699][ T9919] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.463140][ T9919] device bridge_slave_0 left promiscuous mode [ 818.469273][ T9919] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.730581][ T9952] device syzkaller0 entered promiscuous mode [ 819.160661][ T9994] bridge0: port 3(gretap0) entered disabled state [ 819.167190][ T9994] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.234084][ T9994] device syzkaller0 entered promiscuous mode [ 819.542785][T10025] device syzkaller0 entered promiscuous mode [ 819.764663][T10023] device syzkaller0 entered promiscuous mode [ 823.498760][T10172] ref_ctr_offset mismatch. inode: 0x677 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 824.561076][T10220] syz.2.12046[10220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 824.561155][T10220] syz.2.12046[10220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 825.068766][ T2544] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 829.002713][T10428] ÿÿÿÿÿÿ: renamed from vlan1 [ 829.511149][T10438] device veth0_vlan left promiscuous mode [ 829.809330][T10438] device veth0_vlan entered promiscuous mode [ 830.048753][T10439] device wg2 left promiscuous mode [ 831.129069][T10481] device wg2 entered promiscuous mode [ 831.134785][T10481] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 833.729077][T10566] device sit0 left promiscuous mode [ 837.526533][T10657] device syzkaller0 entered promiscuous mode [ 840.637118][T10753] device syzkaller0 entered promiscuous mode [ 840.652632][T10753] tap0: tun_chr_ioctl cmd 1074025680 [ 843.049512][T10866] IPv6: pim6reg1: Disabled Multicast RS [ 843.883532][T10898] device syzkaller0 entered promiscuous mode [ 844.003471][T10898] syzkaller0: tun_net_xmit 1280 [ 844.327969][T10914] device caif0 entered promiscuous mode [ 845.155738][T10939] tap0: tun_chr_ioctl cmd 1074812118 [ 849.916724][T11192] device syzkaller0 entered promiscuous mode [ 850.522982][T11220] syz.2.12339[11220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 850.523103][T11220] syz.2.12339[11220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 851.404524][T11265] device syzkaller0 entered promiscuous mode [ 852.293991][T11347] ªªªªªª: renamed from veth0_vlan [ 853.224270][T11367] device syzkaller0 entered promiscuous mode [ 854.034945][T11418] tap0: tun_chr_ioctl cmd 35108 [ 856.098570][T11482] : port 1(ip6gretap0) entered blocking state [ 856.242403][T11480] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 856.272513][T11482] : port 1(ip6gretap0) entered disabled state [ 856.294694][T11482] device ip6gretap0 entered promiscuous mode [ 856.437988][T11498] device syzkaller0 entered promiscuous mode [ 857.427219][T11601] device wg2 entered promiscuous mode [ 858.691338][T11683] device syzkaller0 left promiscuous mode [ 862.029719][T11814] syz.4.12502[11814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 862.029771][T11814] syz.4.12502[11814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 862.372024][T11824] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.391016][T11824] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.398875][T11824] device bridge_slave_0 entered promiscuous mode [ 862.406001][T11824] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.413207][T11824] bridge0: port 2(bridge_slave_1) entered disabled state [ 862.420754][T11824] device bridge_slave_1 entered promiscuous mode [ 862.488094][T11824] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.495192][T11824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 862.502473][T11824] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.509492][T11824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 862.541264][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 862.551587][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.561371][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 862.573795][ T3015] ------------[ cut here ]------------ [ 862.579420][ T3015] kernel BUG at kernel/bpf/arraymap.c:993! [ 862.596537][ T3015] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 862.602775][ T3015] CPU: 1 PID: 3015 Comm: kworker/1:117 Tainted: G W syzkaller #0 [ 862.611783][ T3015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 862.621983][ T3015] Workqueue: events prog_array_map_clear_deferred [ 862.628408][ T3015] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 862.634885][ T3015] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 862.654580][ T3015] RSP: 0018:ffffc9000131fc18 EFLAGS: 00010293 [ 862.660643][ T3015] RAX: ffffffff817b4f8b RBX: ffff8881120104d0 RCX: ffff88811a264f00 [ 862.668605][ T3015] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 862.676699][ T3015] RBP: ffffc9000131fc98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 862.684669][ T3015] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 862.692635][ T3015] R13: ffff8881116b4d00 R14: 0000000000000001 R15: ffff8881116b4d00 [ 862.700603][ T3015] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 862.709642][ T3015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 862.716218][ T3015] CR2: 00007fb0f9990060 CR3: 000000013b1ac000 CR4: 00000000003506a0 [ 862.724183][ T3015] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 862.732145][ T3015] DR3: 0000200000000300 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 862.740108][ T3015] Call Trace: [ 862.743403][ T3015] ? bpf_prog_09776aaf7caf0154+0xb/0xca8 [ 862.749125][ T3015] fd_array_map_delete_elem+0x14c/0x250 [ 862.754765][ T3015] prog_array_map_clear_deferred+0x9e/0x140 [ 862.760743][ T3015] process_one_work+0x6e1/0xba0 [ 862.765615][ T3015] worker_thread+0xa6a/0x13c0 [ 862.770288][ T3015] kthread+0x346/0x3d0 [ 862.774342][ T3015] ? worker_clr_flags+0x190/0x190 [ 862.779365][ T3015] ? kthread_blkcg+0xd0/0xd0 [ 862.783975][ T3015] ret_from_fork+0x1f/0x30 [ 862.788379][ T3015] Modules linked in: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 862.802399][ T24] audit: type=1400 audit(1776293318.150:182): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[13540]" dev="pipefs" ino=13540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 863.042639][ T3015] ---[ end trace 8586104ac69f6409 ]--- [ 863.048408][ T3015] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 863.055095][ T3015] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 863.075501][ T3015] RSP: 0018:ffffc9000131fc18 EFLAGS: 00010293 [ 863.081566][ T3015] RAX: ffffffff817b4f8b RBX: ffff8881120104d0 RCX: ffff88811a264f00 [ 863.089865][ T3015] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 863.098249][ T3015] RBP: ffffc9000131fc98 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 863.106478][ T3015] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 863.114608][ T3015] R13: ffff8881116b4d00 R14: 0000000000000001 R15: ffff8881116b4d00 [ 863.122802][ T3015] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 863.131817][ T3015] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 863.138610][ T3015] CR2: 000055dbf16d7af8 CR3: 000000010ccd5000 CR4: 00000000003506a0 [ 863.146753][ T3015] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000200000000300 [ 863.154889][ T3015] DR3: 0000200000000300 DR6: 00000000ffff0ff1 DR7: 0000000000000600 [ 863.163009][ T3015] Kernel panic - not syncing: Fatal exception [ 863.169502][ T3015] Kernel Offset: disabled [ 863.173811][ T3015] Rebooting in 86400 seconds..