last executing test programs: 5.618168663s ago: executing program 2 (id=6001): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x12, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xf}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000280)=""/73}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000040008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093}, 0x21) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r0, 0x24, 0x0, 0x5, 0x0, 0xfffffd93, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@bloom_filter={0x1e, 0x5, 0x1, 0xf, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, r0, 0x3, 0x0, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffaf, 0x10, &(0x7f0000000040)}, 0x3c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8}, 0x8, 0x10, 0x0, 0x48}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001380)={r1, &(0x7f00000013c0)="b14a9abd53ad8b6561924917c21b0e864a8bcc44f7e99020ec84bf725baf01a018ece2c2b04d0d3962ebaca1e7c606a2285a9a844577ec34aeea6d8a4651885b6637fbc3851ba416ebfea65baf4c6d9c79fc97fe3ee5668ac7e489b62b0708333b8b", &(0x7f00000002c0)=""/4084}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001800)={{r3}, &(0x7f0000001780), &(0x7f00000017c0)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000080)={r3, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)=@generic={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40000000000000079100000000000004f0000000000000095001500000000007c2a3c0619ef4d5ad013fe1d19154f49c4cc35bd8b16ce49d278d63be87c8dbb0dc2a2289de9dd663a2516d0bf658b4556df2c9a343b08834a076bb0ef50a1351c13d8d056373a4ee4834b4531d784c148c74df1f86b6b7ba8061834f9afa3f320fba9ebfe082f57ec5efe4c41a3c5400d8805247642372910db18ac6a92fcd0e06cf98357e3e3c4f5c775bcd71625a1752237a5b38337fb16cc2d481ea356e9ba333a95bfe81db83995b99bf044221d64eba9"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x94) 5.098216648s ago: executing program 2 (id=6007): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000e00)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000006000000000000000100000d030000000200000003000000000000000000000d000000000000000000000003000000000100000003"], &(0x7f0000001f00)=""/4096, 0x56, 0x1000, 0x3}, 0x28) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000640)=[{&(0x7f00000000c0)="38b7a4ff45b8e174c53c3d6c0ab007d20bc3172d25cdc386dd868a9c0bfa796deb917240285b7c49076a48f869ce51bd8690a75c87494a45052e9682d8be909c4be808532316a7a744bfc460ef800881f7eb9a292d9e15dfe94a3197a3b4633e1c1f9ba216a607d5c3e237af7019c6489b99e6791cc2d7cfdaf65bb2369a106772a6f89aece2748fa12697f1dc985f08daf56f435b1683e8d566a719a5b3", 0x9e}, {&(0x7f0000000180)="138e3e20a93be57319193d09fd02eb1841ff1008a95a3e46e822158936", 0x1d}, {&(0x7f00000001c0)="55bf8a0d1291019979589201015f889b58cdfa2d5635961179bc0e6ecdf454173c58067cb4ae24d01edbdafa7c2057f410b03049c32af3de25dbe7a43c7bc13c506a9e8ae77658690699b1c9966cad9654042912325ded3c99d0071a06b5628de2e6", 0x62}, {&(0x7f0000000340)="63158924cfb9e3ff8394b9fc1bd3982570a084c13505e1e1a226aa0a5efcdfb1059d2928e59a031fe0dfcb084db84480fe790af19f3ef8822f7a0c7d4ddea21d2a0ce8221368438a3b58bd2e58424297f84ec456fac0109f05e904251fb00541f6d1653d217681e597479c50887f360424d162c3ab3ba393b27a13e3da1e9e5a3bf1acfeb305d5d8eb43051424696590645b92f79b07f3675dffbe58d967d31c8b86f6f36b42a15b31215b27325607345a4e3eea138e6ff9fb80", 0xba}, {&(0x7f0000000400)="abdfc94522fdf23ace7ca57be2f43466ad6950537a0647885b3e505c068426a9803579ff499b2fcaf894c410ac99b2c7cdb948857b4e97f7a2a3c52e801f80df283d9f5f161c6f4e98b5049033cbdb1f13fb83b7ab04d70302f85208168301f2008f17b5b4c2833b2783555a8e5cacc97a2d5e12dfba57e1dff3f6be18966f07927126f4c4b5485ea9efff543b3e23ab73ac66a4079373bf1f62bcf826e9306f809ebee1ffb90d4e648e615c8b79ac82a7fa5086fc00fbc0", 0xb8}, {&(0x7f00000004c0)="82e330a4a4ab96deac689026249abcab15", 0x11}, {&(0x7f0000000500)="0d07bcb43a253bde9556b938160763a0b63b106c66283dcaa70c20b9aff898a5d2f629aaec667c51a5a2dcb1c2a3c854c11f387bc4fb74d6dcef26cf01d5755d5613c263b11a88a40be082678b99f583728757a435c7931f849259413b74478336b2298fb84631bd44542fd2947201583cd5e04a491ef5a629f9a4024dc9d9ed7b0c7f7335708fd87dbd66aa58a86f23e29cc8aaa888cae0b1fe7e19aafd2734313bc3ba0a93da9d6adf63fe1796", 0xae}, {&(0x7f00000005c0)="5361a3b67ce55408ab7660a3556d9a981ac5ce13315d854f78b0a461e11d255bca2d107c2d2b632ca21ee551b122050407a50e5e65c1ee12304531880796d8a8615900eeb024e695c418", 0x4a}], 0x8, &(0x7f00000006c0)}, 0x20000040) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40047440, &(0x7f0000001200)) 4.939875314s ago: executing program 2 (id=6010): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000090000000760400000000000027000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc62, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r1, 0x4b, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000680), 0x0, 0xbb, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000006c0), &(0x7f0000000480), 0x8, 0x48, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) 4.937582165s ago: executing program 2 (id=6012): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x4c00, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x80047441, &(0x7f0000001200)) 4.575161355s ago: executing program 2 (id=6024): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x3, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x4044}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r5, r0, 0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r4) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000060000001a0400000100000000000000", @ANYRES32, @ANYBLOB="0000d10000000100001000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x9, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000001000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000001b"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r7, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000580)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0], 0x0, 0xcc, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000800), &(0x7f0000000880), 0x8, 0xaf, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x9, [@union={0x0, 0x8, 0x0, 0x5, 0x1, 0x74, [{0xc, 0x2, 0x2}, {0xb, 0x4, 0xa}, {0x9, 0x1}, {0x0, 0x3, 0x8}, {0x7, 0x2, 0x3}, {0xf, 0x1, 0xfffffc01}, {0x3, 0x2, 0x1}, {0xe, 0x0, 0xf}]}, @volatile, @type_tag={0x2, 0x0, 0x0, 0x12, 0x2}]}, {0x0, [0x2e, 0x2e, 0x61, 0x6f, 0x0, 0x2e, 0x2e]}}, &(0x7f0000000b00)=""/178, 0xa5, 0xb2, 0x1, 0x7, 0x10000}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f40)={r4, 0xe0, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000c80)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000cc0)=[0x0, 0x0], &(0x7f0000000d00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000d40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000d80), &(0x7f0000000dc0), 0x8, 0x2d, 0x8, 0x8, &(0x7f0000000e00)}}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001040)=@generic={&(0x7f0000000f80)='./file0\x00'}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r6}, &(0x7f0000001080), &(0x7f00000010c0)}, 0x20) r12 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001140)={0x3, 0x4, 0x4, 0xa, 0x0, r6, 0x101, '\x00', 0x0, r9, 0x1, 0x3, 0x3}, 0x50) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x8c, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x2, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r13}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x59}}]}, &(0x7f0000000280)='syzkaller\x00'}, 0x1c) r14 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001200)=@generic={&(0x7f00000011c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0x7}, @exit, @jmp={0x5, 0x0, 0x0, 0x6, 0x0, 0x80}, @jmp={0x5, 0x0, 0xd, 0x6, 0x5, 0xfffffffffffffffe}, @ldst={0x1, 0x3, 0x6, 0x6, 0x6, 0xc, 0x4}, @jmp={0x5, 0x1, 0xa, 0x3, 0x5, 0xfffffffffffffffc}, @map_val={0x18, 0xb, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffffff4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000200)='GPL\x00', 0x4, 0x89, &(0x7f00000004c0)=""/137, 0x41000, 0x42, '\x00', r8, 0x1b, r9, 0x8, &(0x7f0000000c00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000c40)={0x1, 0x1, 0xe721, 0xffffffc0}, 0x10, r10, 0x0, 0x0, &(0x7f0000001240)=[r11, r2, r12, r2, r13, r6, r14], &(0x7f0000001280), 0x10, 0x8}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b26, &(0x7f0000000000)={'wlan1\x00', @random="0202000400"}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x10}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4.053858421s ago: executing program 2 (id=6015): socketpair(0x29, 0x1, 0x6, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12644, 0x0, 0xfffffffe, 0x6, 0x40010, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x81, 0x7602, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x2, 0x4e21, @multicast2}, 0xf, &(0x7f0000000380), 0x2, &(0x7f0000000a00)=ANY=[], 0x170}, 0x4040014) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_int(r2, &(0x7f0000000140)='io.bfq.weight\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)="db17e8", 0x3}], 0x1}, 0x80000e4) ioctl$SIOCSIFHWADDR(r5, 0x541b, &(0x7f0000000340)={'syzkaller1\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x100000001) syz_clone(0xc4201100, 0x0, 0x0, &(0x7f0000000740), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x7, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000000000000711184000000adae8b00008510000002000000850000b62fc79ec6008b00000095000000000000004b73040010000000b500a5"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6}, 0x94) 2.748995946s ago: executing program 3 (id=6025): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x410, 0x2000000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="07000000040000001800000042a0"], 0x50) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x4}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000004340)={0x6, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x1, 0x40, 0x5, 0x41}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xd, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r4}, 0xc) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000540)={r2, 0x8, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff27, 0x0, 0x0}, 0x19) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000b0000000000000001000006040000000000617114"], 0x0, 0x37}, 0x28) 2.633671286s ago: executing program 1 (id=6026): perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xa}, 0xa100, 0xc8, 0xfffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) (async) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000004000000040000000d00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="0000a5a69a5f580001000000000000000000000000000100217af35b9088f6f22c513a84d4ea5020ff0000"], 0x50) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0200000004000000040000000d00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="0000a5a69a5f580001000000000000000000000000000100217af35b9088f6f22c513a84d4ea5020ff0000"], 0x50) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002cc0)='./cgroup.net/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f0000002d00)='syz0\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r3}, 0x50) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xa87, 0x4}, 0x8280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r6}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r6, &(0x7f00000000c0)="84d09a77", 0x0}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r6, &(0x7f00000000c0)="84d09a77", 0x0}, 0x20) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x89}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x88) 2.42197026s ago: executing program 1 (id=6028): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'cpu'}]}, 0x5) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000001c0), 0x12) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6349363006"], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="007a707573657420006370750806"], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x80040000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10068, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0x4) socketpair(0x2b, 0x2, 0x2, &(0x7f00000002c0)) recvmsg$unix(r4, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred={{0x1c}}], 0x20}, 0x10000) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) 1.858974533s ago: executing program 1 (id=6032): openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) (async) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3}, 0x50) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x79, 0x0, 0x0, 0x48}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x21) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f0000005c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000040)="050f018000", 0x0, 0x1}, 0x32) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910900000000000730ae8ff00000000950f4f91fc000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3f}, 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r5 = syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETQUEUE(r4, 0x400454d9, 0x0) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r6, 0xd, 0xffffffffffffffff, 0x1) (async, rerun: 64) r7 = openat$cgroup_procs(r6, &(0x7f0000000d00)='tasks\x00', 0x2, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x4, 0x2000004}, 0x50) r8 = syz_clone(0x20002000, &(0x7f0000003080)="279912c9", 0x4, 0x0, 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000005400)=r8, 0x12) (async) r9 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0xb9, 0x6c, 0x4, 0x7, 0x0, 0x8, 0x8a00, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f0000000200), 0x4}, 0x4080, 0x3, 0x0, 0x7, 0x663, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001}, r5, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xff, 0x8, 0x44, 0x81, 0x0, 0x8, 0x80083, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000140)}, 0x12400, 0x5188, 0x5, 0x7, 0x9, 0x4, 0x70e8, 0x0, 0x2, 0x0, 0x3}, r8, 0xe, r9, 0xa) 1.858542143s ago: executing program 3 (id=6033): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], 0x50) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000000)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86\xae\xa5\xea?\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x28}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1.558063863s ago: executing program 0 (id=6034): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)=@base={0x16, 0x0, 0xb4, 0x7f, 0x80, 0xffffffffffffffff, 0x4}, 0x50) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x5}, 0x8800, 0x0, 0x0, 0x4, 0x0, 0x8, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021"], 0x0, 0x40, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000280)=@generic={0x0}, 0x18) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r4, &(0x7f0000000100)='devices.deny\x00', 0x2, 0x0) openat$cgroup_type(r4, &(0x7f0000000140), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x2, 0xa, &(0x7f0000000680)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff9}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x94) 1.557662683s ago: executing program 1 (id=6035): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0300000004000000040000000a", @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r7, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000240)=r4}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17f199a68b06d83298a8cdc21ce784909b849d5550ad857d0454d8877a6db61d69f2ffcaa10350e11cb97c8adf1bc9a0c4eeceb9971e43405d621ffbc9ce000000d8ca56b50d0c010d631f6dde53a9a53608c10556e5734eb84049761451ce540c772e2d9f8004e26f7fcc059c062234d55906000000000f0000fd9ac3d09e29a9d542ca9d85a5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7e43c5cbd8000000000000080231c61ccd106cb937b450f859ce8122a79c3e40000b59b0fc46d6cec3c0802882add4e1179bd4a44f231b6d753a7be428ba953df4aece69311687f4122073a236c3a32efa04137d4524847d2638da3261c8162bb7c7824be6195a66d2e17e122040e1100000000928612a29fc691e4f1f7bd053abb885f39381f1759410b1059f05684261f332d606834669b49ec99320ca7712d7e79bd5bf5ed818ecc7640917f6a559a47db608fcf9f6c131b84e41c354c66838f72b9e12d36e996f316f0812ca83efb30c7f6c6d57c4a64590401eec22523dd712c680013e87f649a1ede7142ca9d5d8a8c9f9b440fe4331ad5532c74d9a31a5d737537f7a2caa30581253d14dd3e92af7dc836686365ae01bdec561c0402b67801267a8df97d2f85426a5963d4fa3e26cc05972c162f223f000000d999e80de00fcbcc02d0aed7bb8f7ba337d59c14f39dcd4aad4139ef6425a9367f1bd1467fc6b95a4df7669839771ce9ccd5788029901e5a79d8b9990ace8f74087f25ad50c4608800"/686], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x2000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r10, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(r11, 0x400454da, &(0x7f00000004c0)=r12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x13, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@call={0x85, 0x0, 0x0, 0x30}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0x8, 0x43, &(0x7f00000004c0)=""/67, 0x40f00, 0xe, '\x00', r12, 0x0, r8, 0x8, &(0x7f0000000540)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x4, 0x6, 0x3}, 0x10, 0x4686, r3, 0x1, &(0x7f00000005c0)=[r8, r2], &(0x7f0000000600)=[{0x2, 0x4, 0xc}], 0x10, 0x2}, 0x94) sendmsg$inet(r6, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1e0334003c5c980128876360864668f82ffdeefa000000000000ffd2acb165fe580cd568cd1f31b87b548cb74136f366da0abe01880b"], 0x3e) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r13, &(0x7f0000000280)=ANY=[], 0xffdd) 1.51663119s ago: executing program 3 (id=6036): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a500850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x20, 0xfffff030}, {0x6, 0x4, 0x0, 0x4000}]}) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x84204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x6, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {}, {0x7, 0x0, 0xb, 0x9}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{r3}, &(0x7f0000001040), &(0x7f0000001080)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 1.451351191s ago: executing program 0 (id=6038): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0xfffffe51) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffc, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="b400000000000000dd0a0000000000006301a4000000000095000000000000006681fabfa7afdea451352385fd277a26b1928972a90713774dee000000008abeded0f241d9e16380276de7f845fb77f3942b1b2f835d2704d284651cec42865a01e610e1d8ebed3bca771dd8dfc94bf8454e0ba5feb0a8fb9c709340a7"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={r1, 0x26, &(0x7f0000002040)}, 0x6d) 1.3348762s ago: executing program 1 (id=6041): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x12, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0xf}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000280)=""/73}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000040008500000095000000b7000000000000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x2, 0xf7, &(0x7f0000001e40)=""/4093}, 0x21) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r0, 0x24, 0x0, 0x5, 0x0, 0xfffffd93, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@bloom_filter={0x1e, 0x5, 0x1, 0xf, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, r0, 0x3, 0x0, 0x0, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffaf, 0x10, &(0x7f0000000040)}, 0x3c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8}, 0x8, 0x10, 0x0, 0x48}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001380)={r1, &(0x7f00000013c0)="b14a9abd53ad8b6561924917c21b0e864a8bcc44f7e99020ec84bf725baf01a018ece2c2b04d0d3962ebaca1e7c606a2285a9a844577ec34aeea6d8a4651885b6637fbc3851ba416ebfea65baf4c6d9c79fc97fe3ee5668ac7e489b62b0708333b8b", &(0x7f00000002c0)=""/4084}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001800)={{r3}, &(0x7f0000001780), &(0x7f00000017c0)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000080)={r3, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)=@generic={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b40000000000000079100000000000004f0000000000000095001500000000007c2a3c0619ef4d5ad013fe1d19154f49c4cc35bd8b16ce49d278d63be87c8dbb0dc2a2289de9dd663a2516d0bf658b4556df2c9a343b08834a076bb0ef50a1351c13d8d056373a4ee4834b4531d784c148c74df1f86b6b7ba8061834f9afa3f320fba9ebfe082f57ec5efe4c41a3c5400d8805247642372910db18ac6a92fcd0e06cf98357e3e3c4f5c775bcd71625a1752237a5b38337fb16cc2d481ea356e9ba333a95bfe81db83995b99bf044221d64eba973eac5"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x94) 1.27225857s ago: executing program 0 (id=6042): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x16, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000012850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000008000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b807200500000000", &(0x7f00000004c0)=""/18, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x23) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b807200500000000", &(0x7f00000004c0)=""/18, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x74}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) 1.269365391s ago: executing program 4 (id=6043): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa1000000000000070100"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180900000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81e6978800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15004dab"], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007d00000095"], 0x0}, 0x94) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f00000007c0)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000d00008ba2b547470800b700000000000000957ce583c6c36b43221603bec7e49c4f9c4b2390396d59a86612404efcfc13b0"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b70500000000000061103000000000000fa00000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0xba, &(0x7f0000000300)=""/186, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x0, 0x9, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r4, 0x0, 0x36, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xc, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000006008500000018000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000c8, 0x0, 0x0, 0xffffffffffff0000, 0x4}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x14, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000002000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000a48500000082000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sched_cls=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r8, 0x0, 0xe, 0x0, &(0x7f0000000900)="928e04b416cac951c35f7f4586e6", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000040)=ANY=[], &(0x7f0000000180)=""/162, 0x3e, 0xa2, 0x1}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) sendmsg$unix(r10, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x24040014) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(0xffffffffffffffff) 1.253842843s ago: executing program 4 (id=6044): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)='GPL\x00'}, 0x94) (async, rerun: 64) write$cgroup_int(r1, &(0x7f0000000080), 0x12) (rerun: 64) 1.167391188s ago: executing program 3 (id=6045): bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0x7c2}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="000000d5818f6b2d4c2a92000000000000040000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x9, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="b4050000fdff7f006110a30000000000c60000000000000095000000000000009f33ef60916e6e713f1e6b0b725ad99b817fd98cd824498949714e32f21dcc4ae5437aca55f21f3ca9e822d182054d54d53cd2b6da714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed00000000000000000000000000000000000000006c63b40e0c00000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f79829c90bd2114252581567acae715cbe1b57d5cda432c5b9443999f7d24195405f2e76ba88454cc9227069ccb7b37b41215c000000003be991e5e897284cdd6043058cec00000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r1 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') 1.115081666s ago: executing program 4 (id=6046): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], 0x50) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000000)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86\xae\xa5\xea?\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x28}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 651.085513ms ago: executing program 4 (id=6047): bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000005000000760000000000000027000000ffff00009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x23) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000d00)={0xffffffffffffffff, 0x58, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r2, &(0x7f0000000e40)={&(0x7f0000000ac0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="fa64bb8ef999263694201b2daad24e28934f76fad3a37cdba243304e23882705305cd63296e4d8a06e333edba43f70634396752ec82fb7e6c08400404053db2a8d4c06107bf3c016b8", 0x49}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="140000000000000000000000020000000100000000000000880000000000000000000000070000004424542000000002000000030000000700007ae500000006000000070000000d000080000100440faa661a8299a949dbc00ba3d4330094040100863c000000030007afe8dea722070e28a80db2afb5c12649cc1cf107046f8100062498cf860a05af18d400128b12b4e24d7467cda9ad13ca7a5aef6a00001400000000000000000000000200000072000000000000001c000000000000000000000008000000", @ANYRES32=r3, @ANYBLOB="da000001ac1e010100000000"], 0xd8}, 0x4000024) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) write$cgroup_devices(r0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b2388a8"], 0xffdd) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000400000000000000000000000071122700000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x30, 0xfc, 0x0, 0x4, 0x0, 0x2, 0x980, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_bp, 0x1062a5, 0x1, 0x890, 0x5, 0x0, 0xfffffffe, 0x3, 0x0, 0x1, 0x0, 0xd7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={0x1, 0x58, &(0x7f0000000ec0)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000800)=@generic={&(0x7f00000007c0)='./file0\x00'}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880)=@generic={&(0x7f0000000840)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004010000080000000000", @ANYRES32=0x1, @ANYBLOB='3y\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000200"/28], 0x50) close(r4) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00000005000000010001000a00000001"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f00000013c0), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7ff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 647.016483ms ago: executing program 0 (id=6057): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000180000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0], 0x50) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000000)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86\xae\xa5\xea?\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x28}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 503.675797ms ago: executing program 1 (id=6048): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152}, 0x94) openat$cgroup_int(r0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x10, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc5bf) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee', 0x0}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x60000000, 0x38, 0x26, &(0x7f0000000500)="2077e7dedda60fb505e6394d02d95ae1583b0f97782b80bb0e15fd51433a497e67474911a70c77e53c2086485135099591ce5d5bd6fc4e68", 0x0, 0x0, 0x0, 0xfffffffd}, 0x50) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000180)='cpu<=0||!') syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB="00d20023582a12c581c468000000001dbff9dc0059427b6508957926d1510591116e0640e77e2c5bbf38f9c370226180c693ba504a54d2b83b8f3e08abbf469ac93e06cdcc4eb634cd1ffd70f81498b9ea4a35dc5b", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0x4) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000480)={r8, r4}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r7}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x14}}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 339.793234ms ago: executing program 0 (id=6049): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x3}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0xd, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xaa99}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fffffff}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x15}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000010400"/20, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x42, &(0x7f00000007c0)=r6, 0x47) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x7, 0x1, 0x0, 0x6, 0x4, [{0x7}]}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x2e]}}, 0x0, 0x36}, 0x28) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000100), 0x237}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x1f00, 0xf, 0x2f, &(0x7f00000007c0)="9f44948721919580684010a49e66", 0x0, 0x7ff, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@fallback=r7, 0x10, 0x0, 0x8000, &(0x7f00000000c0)=[0x0], 0x1, 0x0, &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x11, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4}}, {{0x6, 0x0, 0xb}, {0x65}}, [@map_fd={0x18, 0x3, 0x1, 0x0, r2}], {{0x7, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r2, 0x58, &(0x7f0000000600)}, 0x10) 223.465643ms ago: executing program 4 (id=6050): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x2, 0x7, 0x140, 0x1, 0x10000}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffff7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x54b2ac04}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000003c0)={r2, r1}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b70500000000000061103000000000000fa00000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x2, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x0, 0x0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x25) 164.959473ms ago: executing program 3 (id=6051): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180900000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000230c00000008000009000000000000090300000000302e302e5f5f"], 0x0, 0x2c, 0x0, 0x0, 0x7f, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESHEX, @ANYBLOB='C'], 0x48) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x9) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180900000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000100000000000000000000850000007500000095"], 0x0}, 0x94) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000230c00000008000009000000000000090300000000302e302e5f5f"], 0x0, 0x2c, 0x0, 0x0, 0x7f, 0x10000}, 0x28) (async) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRESHEX, @ANYBLOB='C'], 0x48) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_int(r1, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) (async) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) (async) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 164.643783ms ago: executing program 4 (id=6052): bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0x12, 0x4, 0x8, 0x1}, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@base={0x12, 0x4, 0x8, 0x1}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x1000, &(0x7f00000014c0)=""/4096}, 0x3b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x3, 0xa, 0x0, &(0x7f0000000000)) (async) socketpair(0x3, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000800)='~+\xb5\x90\x8a\xb7\x87$\"\x98i\xa9\xf2\x19\xd6\xd0\x12L!\xd1\x85n\xce\xd7\xa7\xf0\xa7\xb3\xd1\x93\x9a\xe4\x87\xaa\x9f\x96\xfa\xb4C\a\x00\x00\x00:_\x115\x16?\xae\x0e\xd5\xe4K\xb0\x97') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a000000050000000300000004"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x9, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r5, 0x4) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYRES64=r3, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0xf2, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) (async) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600), 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) (async) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r9}, &(0x7f0000000540), &(0x7f0000000580)=r10}, 0x20) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x88541, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETIFINDEX(r11, 0x400454da, 0x0) (async) ioctl$TUNSETIFINDEX(r11, 0x400454da, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r9, &(0x7f0000000780)}, 0x20) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r9, &(0x7f0000000780)}, 0x20) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000940)}, 0x0, 0x2, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000e8bd03ff137f0d66000000000000000071102a00000000000100000700000000cd5e02efd19a2f78ebe27bb71ab3e19a43ddc042f7d9d880359c827879aa4640b3c0eea958ab402c62065011d5cd1589bafefd7c6923b6ac5519ab6d6bb70ddbbbb3ef609e33d1b0863e90fe1090a8e1bcabd0e4e8d9f5f21ffa000b04d3d846659427d7d1c20a3bea5852e71665f5b236e33ca842b77f47018852731632cabb04101ae566d0195a7c6bceaa57534f33b5337a32a84ff3c3a296b088905ed2afa062"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x16, 0x1e, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfdaf, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0x4, 0x2, 0x0, r3}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_val={0x18, 0xb, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x9}, @ldst={0x0, 0x0, 0x7, 0x0, 0xb, 0xfffffffffffffffc, 0x1}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', r7, @flow_dissector=0x11, r8, 0x8, &(0x7f0000000640)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0xc, 0x5, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000006c0)=[r9], 0x0, 0x10, 0x5}, 0x94) perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x8, 0x0, 0x0, 0x0, 0x100000001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f00000009c0)=ANY=[@ANYRES16=r1, @ANYRES32, @ANYBLOB="00000000000000006608000000000000180000000800000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) 14.437428ms ago: executing program 0 (id=6053): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000002c0)=0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000001840)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1b}}, {}, [@snprintf={{}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x5}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x1, 0xb, 0x8, 0xa, 0x4}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x0}, {0x7, 0x0, 0x0, 0x0}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x62, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0xb, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r0, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x3}, {0x7, 0x3}]}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x5, 0x4}]}]}, {0x0, [0x30]}}, &(0x7f0000000540)=""/98, 0x53, 0x62, 0x1, 0x8, 0x10000}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@generic={0xae, 0xc, 0x9, 0x3, 0xfc94}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='GPL\x00', 0xb, 0x19, &(0x7f00000001c0)=""/25, 0x41100, 0x20, '\x00', r2, 0x1b, r3, 0x8, &(0x7f0000000680)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xc, 0x7f, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000700)=[r1, r1], &(0x7f0000000740)=[{0x3, 0x2, 0xa, 0x2}, {0x0, 0x4, 0xa, 0x9}], 0x10, 0x78}, 0x94) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r4) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r5, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200), 0x8) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'tunl0\x00', @local}) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x50) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x51, 0x1, 0x0, 0x0, 0x0, 0xd, 0x14, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}, 0xc18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x35a11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x500, 0x2}, 0x1075, 0x6, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1c0000000000000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0xffffffed) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 0s ago: executing program 3 (id=6054): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007b000000850000004000000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000700000003000000000000080000000000ac2e"], 0x0, 0x2b, 0x0, 0x1}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="16000000d3ec66ecc053c5da2e5f"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="16000000d3ec66ecc053c5da2e5f"], 0x48) kernel console output (not intermixed with test programs): DEV_CHANGE): bridge_slave_0: link becomes ready [ 25.188604][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.195629][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.226514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.234490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.243190][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 25.252305][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 25.260537][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.267566][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.275028][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.283322][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.291580][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.298629][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.306303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.314319][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.322509][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.330696][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.338715][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.346753][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.354599][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.362851][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.370796][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 25.379131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 25.387453][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.394457][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.401927][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.409928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.417989][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.426096][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.433952][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 25.442040][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.449982][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 25.458085][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 25.478488][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.486795][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.495120][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.503366][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.516449][ T280] device veth0_vlan entered promiscuous mode [ 25.524236][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.532108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.540209][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.548914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.557485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.565182][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.576281][ T276] device veth0_vlan entered promiscuous mode [ 25.586460][ T280] device veth1_macvtap entered promiscuous mode [ 25.594691][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.603381][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.611787][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.619773][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.627908][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.635857][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.643726][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.651447][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.658928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.666438][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.679285][ T276] device veth1_macvtap entered promiscuous mode [ 25.687014][ T275] device veth0_vlan entered promiscuous mode [ 25.698605][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 25.706938][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 25.715462][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.723494][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.732269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.741392][ T277] device veth0_vlan entered promiscuous mode [ 25.749945][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 25.758090][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.766203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.774082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.781877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.789485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.797209][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.809234][ T278] device veth0_vlan entered promiscuous mode [ 25.816166][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.824392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.832734][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.841897][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.850343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.858907][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.867235][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.875501][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.890201][ T275] device veth1_macvtap entered promiscuous mode [ 25.900971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.909329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 25.917877][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 25.926139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 25.939432][ T277] device veth1_macvtap entered promiscuous mode [ 25.946413][ T280] request_module fs-gadgetfs succeeded, but still no fs? [ 25.958809][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 25.967486][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 25.976508][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 25.984703][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 25.993347][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.001743][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.014224][ T278] device veth1_macvtap entered promiscuous mode [ 26.022434][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 26.036549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.049836][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.058505][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.113109][ T302] device syzkaller0 entered promiscuous mode [ 26.129363][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.141587][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.150393][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.159269][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.236286][ T308] ------------[ cut here ]------------ [ 26.251709][ T308] trace type BPF program uses run-time allocation [ 26.258604][ T308] WARNING: CPU: 1 PID: 308 at kernel/bpf/verifier.c:10509 check_map_prog_compatibility+0x5d6/0x740 [ 26.269867][ T308] Modules linked in: [ 26.273780][ T308] CPU: 1 PID: 308 Comm: syz.0.1 Not tainted syzkaller #0 [ 26.281164][ T308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 26.295753][ T308] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 26.302921][ T308] Code: 85 e9 14 fe ff ff e8 a9 d1 ef ff 31 c0 e9 15 fe ff ff e8 9d d1 ef ff c6 05 a4 b5 4b 05 01 48 c7 c7 80 cf 25 85 e8 0a 02 05 03 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 26.328069][ T308] RSP: 0018:ffffc90007a37448 EFLAGS: 00010246 [ 26.334238][ T308] RAX: 3c479450c2b3c900 RBX: 0000000000000001 RCX: 0000000000080000 [ 26.394741][ T310] cgroup: syz.3.4 (310) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 26.422869][ T308] RDX: ffffc90001d3d000 RSI: 0000000000002ea6 RDI: 0000000000002ea7 [ 26.431264][ T310] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 26.515626][ T308] RBP: ffffc90007a37490 R08: ffff8881f7152fbf R09: 1ffff1103ee2a5f7 [ 26.653093][ T308] R10: dffffc0000000000 R11: ffffed103ee2a5f8 R12: ffff888128654000 [ 26.666596][ T337] device syzkaller0 entered promiscuous mode [ 26.734731][ C0] hrtimer: interrupt took 19674 ns [ 26.754951][ T308] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810dfe3000 [ 26.774029][ T308] FS: 00007f7c878f36c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 26.855048][ T308] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.902144][ T308] CR2: 00007f4e38711f00 CR3: 000000010ceed000 CR4: 00000000003506a0 [ 26.917731][ T308] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.951722][ T308] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.960091][ T308] Call Trace: [ 26.963491][ T308] ? __fdget+0x1a1/0x230 [ 26.985062][ T308] resolve_pseudo_ldimm64+0x55e/0x1060 [ 26.990641][ T308] ? bpf_check+0xdb10/0xdb10 [ 26.995354][ T308] ? kvmalloc_node+0x88/0x130 [ 27.000114][ T308] bpf_check+0x9058/0xdb10 [ 27.005274][ T308] ? bpf_get_btf_vmlinux+0x60/0x60 [ 27.010464][ T308] ? is_bpf_text_address+0x177/0x190 [ 27.016041][ T308] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.021585][ T308] ? __kernel_text_address+0xa0/0x100 [ 27.027235][ T308] ? unwind_get_return_address+0x4d/0x90 [ 27.032953][ T308] ? stack_trace_save+0xf0/0xf0 [ 27.039373][ T308] ? arch_stack_walk+0xee/0x140 [ 27.044488][ T308] ? stack_trace_save+0xa6/0xf0 [ 27.049832][ T308] ? stack_trace_snprint+0xf0/0xf0 [ 27.063896][ T308] ? __kasan_slab_alloc+0x69/0xf0 [ 27.072814][ T308] ? pcpu_chunk_refresh_hint+0x7e7/0x930 [ 27.079829][ T308] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.090686][ T308] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.096566][ T308] ? __kasan_kmalloc+0xec/0x110 [ 27.106630][ T308] ? __kasan_kmalloc+0xda/0x110 [ 27.111714][ T308] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 27.130744][ T308] ? selinux_bpf_prog_alloc+0x51/0x140 [ 27.136321][ T308] ? security_bpf_prog_alloc+0x62/0x90 [ 27.141959][ T308] ? bpf_prog_load+0x9d8/0x14a0 [ 27.147184][ T308] ? __se_sys_bpf+0x49a/0x740 [ 27.152056][ T308] ? __x64_sys_bpf+0x7b/0x90 [ 27.157460][ T308] ? do_syscall_64+0x31/0x40 [ 27.162141][ T308] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.168451][ T308] ? memset+0x35/0x40 [ 27.173201][ T308] ? bpf_obj_name_cpy+0x193/0x1e0 [ 27.185971][ T308] bpf_prog_load+0xfca/0x14a0 [ 27.192659][ T308] ? map_freeze+0x320/0x320 [ 27.197901][ T308] ? selinux_bpf+0xc7/0xf0 [ 27.203329][ T308] ? security_bpf+0x82/0xa0 [ 27.216369][ T308] __se_sys_bpf+0x49a/0x740 [ 27.220912][ T308] ? __x64_sys_bpf+0x90/0x90 [ 27.228084][ T308] ? __kasan_check_read+0x11/0x20 [ 27.233362][ T308] __x64_sys_bpf+0x7b/0x90 [ 27.245755][ T308] do_syscall_64+0x31/0x40 [ 27.251744][ T308] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 27.257982][ T308] RIP: 0033:0x7f7c88eb9819 [ 27.262465][ T308] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 27.282351][ T308] RSP: 002b:00007f7c878f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 27.291106][ T308] RAX: ffffffffffffffda RBX: 00007f7c89133090 RCX: 00007f7c88eb9819 [ 27.299228][ T308] RDX: 0000000000000094 RSI: 0000200000000580 RDI: 0000000000000005 [ 27.307558][ T308] RBP: 00007f7c88f4fc91 R08: 0000000000000000 R09: 0000000000000000 [ 27.315611][ T308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 27.323671][ T308] R13: 00007f7c89133128 R14: 00007f7c89133090 R15: 00007ffe4bfd8c68 [ 27.331721][ T308] ---[ end trace eebb40c6e5757e6f ]--- [ 27.801906][ T378] device syzkaller0 entered promiscuous mode [ 27.863024][ T374] device veth1_macvtap left promiscuous mode [ 28.013946][ T375] device veth1_macvtap entered promiscuous mode [ 28.037923][ T375] device macsec0 entered promiscuous mode [ 28.689000][ T24] kauditd_printk_skb: 44 callbacks suppressed [ 28.689010][ T24] audit: type=1400 audit(1776303238.539:118): avc: denied { create } for pid=410 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 29.258388][ T24] audit: type=1400 audit(1776303239.109:119): avc: denied { write } for pid=431 comm="syz.1.38" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.825209][ T24] audit: type=1400 audit(1776303240.679:120): avc: denied { read } for pid=492 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 30.902071][ T489] device veth0_vlan left promiscuous mode [ 30.940952][ T24] audit: type=1400 audit(1776303240.789:121): avc: denied { cpu } for pid=494 comm="syz.3.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.004164][ T489] device veth0_vlan entered promiscuous mode [ 31.462776][ T24] audit: type=1400 audit(1776303241.309:122): avc: denied { create } for pid=535 comm="syz.4.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.858567][ T558] device syzkaller0 entered promiscuous mode [ 32.245380][ T588] device syzkaller0 entered promiscuous mode [ 32.542346][ T24] audit: type=1400 audit(1776303242.389:123): avc: denied { create } for pid=602 comm="syz.4.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 32.561729][ T600] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 33.376383][ T632] device syzkaller0 entered promiscuous mode [ 33.506557][ T630] device wg2 entered promiscuous mode [ 33.606917][ T24] audit: type=1400 audit(1776303243.459:124): avc: denied { attach_queue } for pid=637 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 33.737916][ T24] audit: type=1400 audit(1776303243.589:125): avc: denied { create } for pid=656 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 33.968384][ T674] device syzkaller0 entered promiscuous mode [ 34.591614][ T717] syz.3.108[717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.591684][ T717] syz.3.108[717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.291061][ T24] audit: type=1400 audit(1776303245.139:126): avc: denied { create } for pid=738 comm="syz.4.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 35.350202][ T742] Â: renamed from pim6reg1 [ 36.118963][ T794] device syzkaller0 entered promiscuous mode [ 36.793641][ T24] audit: type=1400 audit(1776303246.639:127): avc: denied { create } for pid=833 comm="syz.2.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 37.588241][ T875] bridge0: port 3(veth1_macvtap) entered blocking state [ 37.604998][ T875] bridge0: port 3(veth1_macvtap) entered disabled state [ 37.894494][ T24] audit: type=1400 audit(1776303247.739:129): avc: denied { create } for pid=885 comm="syz.4.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 37.938903][ T24] audit: type=1400 audit(1776303247.739:128): avc: denied { write } for pid=882 comm="syz.2.160" name="cgroup.subtree_control" dev="cgroup2" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 37.962727][ T24] audit: type=1400 audit(1776303247.739:130): avc: denied { open } for pid=882 comm="syz.2.160" path="" dev="cgroup2" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 38.037937][ T913] Â: renamed from pim6reg1 [ 38.184477][ T24] audit: type=1400 audit(1776303248.029:131): avc: denied { create } for pid=922 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 38.576513][ T940] syz.0.179[940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.576568][ T940] syz.0.179[940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.928101][ T24] audit: type=1400 audit(1776303248.779:132): avc: denied { create } for pid=948 comm="syz.3.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 41.717078][ T24] audit: type=1400 audit(1776303251.569:133): avc: denied { create } for pid=1056 comm="syz.3.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 43.482607][ T1103] device syzkaller0 entered promiscuous mode [ 44.052051][ T1186] syz.3.253 uses obsolete (PF_INET,SOCK_PACKET) [ 44.063465][ T1181] device veth0_vlan left promiscuous mode [ 44.120158][ T1181] device veth0_vlan entered promiscuous mode [ 44.352344][ T1184] device syzkaller0 entered promiscuous mode [ 44.394265][ T1208] bridge0: port 3(veth1_macvtap) entered blocking state [ 44.401742][ T1208] bridge0: port 3(veth1_macvtap) entered disabled state [ 44.593193][ T24] audit: type=1400 audit(1776303254.439:134): avc: denied { create } for pid=1232 comm="syz.0.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 44.932328][ T1275] syz.4.282[1275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.932392][ T1275] syz.4.282[1275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.042291][ T1290] batadv0: tun_chr_ioctl cmd 1074025692 [ 45.059765][ T1290] batadv0: tun_chr_ioctl cmd 1074025677 [ 45.080805][ T1290] batadv0: linktype set to 804 [ 45.331772][ T24] audit: type=1400 audit(1776303255.179:135): avc: denied { create } for pid=1348 comm="syz.1.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 45.486889][ T1414] device veth0_vlan left promiscuous mode [ 45.520033][ T1414] device veth0_vlan entered promiscuous mode [ 45.656394][ T1435] device syzkaller0 entered promiscuous mode [ 45.979998][ T1471] syz.4.331[1471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.980065][ T1471] syz.4.331[1471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.153212][ T1486] device syzkaller0 entered promiscuous mode [ 46.203968][ T1490] device syzkaller0 entered promiscuous mode [ 46.326961][ T1503] device syzkaller0 entered promiscuous mode [ 46.335899][ T1503] syzkaller0: create flow: hash 3432300603 index 0 [ 46.346230][ T691] syzkaller0: tun_net_xmit 48 [ 46.485216][ T1503] syzkaller0 (unregistered): delete flow: hash 3432300603 index 0 [ 46.552244][ T1515] device sit0 entered promiscuous mode [ 46.887033][ T1560] device sit0 entered promiscuous mode [ 46.997177][ T24] audit: type=1400 audit(1776303256.849:136): avc: denied { create } for pid=1573 comm="syz.3.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 47.058047][ T24] audit: type=1400 audit(1776303256.869:137): avc: denied { create } for pid=1573 comm="syz.3.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.396929][ T1585] device dummy0 entered promiscuous mode [ 47.662742][ T1621] device veth1_macvtap left promiscuous mode [ 47.679693][ T1621] device veth1_macvtap entered promiscuous mode [ 47.690515][ T1621] device macsec0 entered promiscuous mode [ 48.527105][ T1690] device syzkaller0 entered promiscuous mode [ 49.265017][ T1733] Ÿë: port 1(veth0_to_team) entered blocking state [ 49.271724][ T1733] Ÿë: port 1(veth0_to_team) entered disabled state [ 49.283798][ T1733] device veth0_to_team entered promiscuous mode [ 49.991675][ T1785] IPv6: pim6reg1: Disabled Multicast RS [ 50.586807][ T24] audit: type=1400 audit(1776303260.409:138): avc: denied { create } for pid=1847 comm="syz.3.450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 50.645484][ T1854] device syzkaller0 entered promiscuous mode [ 51.282543][ T24] audit: type=1400 audit(1776303261.129:139): avc: denied { create } for pid=1887 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 51.327313][ T24] audit: type=1400 audit(1776303261.179:140): avc: denied { create } for pid=1901 comm="syz.1.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 51.474949][ T1902] device wg2 left promiscuous mode [ 52.045020][ T1928] device GPL entered promiscuous mode [ 52.812906][ T24] audit: type=1400 audit(1776303262.659:141): avc: denied { create } for pid=1973 comm="syz.4.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 52.874902][ T24] audit: type=1400 audit(1776303262.659:142): avc: denied { create } for pid=1973 comm="syz.4.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 52.934334][ T1982] ³þ: renamed from bond_slave_0 [ 53.930491][ T24] audit: type=1400 audit(1776303263.779:143): avc: denied { ioctl } for pid=2033 comm="syz.1.502" path="socket:[21030]" dev="sockfs" ino=21030 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.005182][ T2250] cgroup: fork rejected by pids controller in /syz1 [ 58.501504][ T2389] device sit0 entered promiscuous mode [ 58.861845][ T24] audit: type=1400 audit(1776303268.709:144): avc: denied { create } for pid=2404 comm="syz.4.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 59.541921][ T2415] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.594906][ T2415] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.604191][ T2415] device bridge_slave_0 entered promiscuous mode [ 59.643496][ T2440] device syzkaller0 entered promiscuous mode [ 59.665471][ T2415] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.675035][ T2415] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.682442][ T2415] device bridge_slave_1 entered promiscuous mode [ 59.774554][ T24] audit: type=1400 audit(1776303269.619:145): avc: denied { create } for pid=2415 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.795296][ T24] audit: type=1400 audit(1776303269.619:146): avc: denied { write } for pid=2415 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.815946][ T24] audit: type=1400 audit(1776303269.619:147): avc: denied { read } for pid=2415 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 59.856877][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.864391][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.874804][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.917086][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.975150][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.982218][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.095073][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.297966][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.306328][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.314379][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.321409][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.331505][ T7] device bridge_slave_1 left promiscuous mode [ 60.337728][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.345158][ T7] device bridge_slave_0 left promiscuous mode [ 60.351274][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.359152][ T7] device veth1_macvtap left promiscuous mode [ 60.365192][ T7] device veth0_vlan left promiscuous mode [ 60.964980][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.002362][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.046545][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.063261][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.079885][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 61.098225][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 61.122420][ T2415] device veth0_vlan entered promiscuous mode [ 61.256712][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 61.267920][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 61.284829][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 61.302782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 61.395107][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 61.408782][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 61.464389][ T2415] device veth1_macvtap entered promiscuous mode [ 61.642132][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 61.674613][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 61.693544][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 61.712339][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 61.742869][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 62.029584][ T2526] @0Ù: renamed from bond_slave_1 [ 62.046378][ T2524] ±ÿ: renamed from team_slave_1 [ 63.264758][ T2571] device syzkaller0 entered promiscuous mode [ 63.272103][ T2570] device wg2 entered promiscuous mode [ 63.941312][ T2607] Ÿë: port 1(vlan1) entered blocking state [ 63.996292][ T2607] Ÿë: port 1(vlan1) entered disabled state [ 64.045373][ T2607] device vlan1 entered promiscuous mode [ 64.090491][ T2616] bridge0: port 3(veth0_vlan) entered blocking state [ 64.158372][ T2616] bridge0: port 3(veth0_vlan) entered disabled state [ 64.215847][ T2616] bridge0: port 3(veth0_vlan) entered blocking state [ 64.222561][ T2616] bridge0: port 3(veth0_vlan) entered forwarding state [ 65.066327][ T2641] device syzkaller0 entered promiscuous mode [ 65.463594][ T2670] device sit0 left promiscuous mode [ 65.825272][ T2698] device pim6reg1 entered promiscuous mode [ 66.160983][ T2716] device syzkaller0 entered promiscuous mode [ 71.010327][ T24] audit: type=1400 audit(1776303280.859:148): avc: denied { create } for pid=2780 comm="syz.0.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 71.748275][ T2795] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.755511][ T2795] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.816779][ T2788] device bridge_slave_1 left promiscuous mode [ 71.842182][ T2788] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.960007][ T2788] device bridge_slave_0 left promiscuous mode [ 72.022655][ T2788] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.651809][ T2860] bridge0: port 3(veth0_vlan) entered disabled state [ 72.658596][ T2860] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.665777][ T2860] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.721812][ T2850] bridge0: port 3(veth0_vlan) entered disabled state [ 72.812348][ T2850] device bridge_slave_1 left promiscuous mode [ 72.870318][ T2850] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.915645][ T2850] device bridge_slave_0 left promiscuous mode [ 72.932135][ T2850] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.338980][ T2878] syz.4.706[2878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.339032][ T2878] syz.4.706[2878] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.091449][ T2981] device syzkaller0 entered promiscuous mode [ 76.356706][ T3042] device wg2 entered promiscuous mode [ 76.658530][ T3054] cgroup: fork rejected by pids controller in /syz0 [ 77.536667][ T24] audit: type=1400 audit(1776303287.389:149): avc: denied { create } for pid=3228 comm="syz.0.767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 77.930904][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 77.946963][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 79.158255][ T24] audit: type=1400 audit(1776303289.009:150): avc: denied { create } for pid=3282 comm="syz.0.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 80.348092][ T3347] device sit0 entered promiscuous mode [ 83.006897][ T3407] device syzkaller0 entered promiscuous mode [ 84.434228][ T3455] device wg2 left promiscuous mode [ 84.582469][ T3461] device wg2 entered promiscuous mode [ 84.645577][ T3465] device syzkaller0 entered promiscuous mode [ 84.663947][ T24] audit: type=1400 audit(1776303294.509:151): avc: denied { create } for pid=3474 comm="syz.4.840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 84.768274][ T3484] device syzkaller0 entered promiscuous mode [ 88.056919][ T3600] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 88.943620][ T3672] device syzkaller0 entered promiscuous mode [ 88.985853][ T3674] device syzkaller0 left promiscuous mode [ 89.466424][ T3683] device syzkaller0 entered promiscuous mode [ 90.532180][ T3740] device syzkaller0 entered promiscuous mode [ 91.801609][ T3848] device wg2 left promiscuous mode [ 91.871745][ T3840] device wg2 entered promiscuous mode [ 94.438860][ T4005] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.446060][ T4005] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.487215][ T4005] device bridge_slave_1 left promiscuous mode [ 94.493377][ T4005] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.525266][ T4005] device bridge_slave_0 left promiscuous mode [ 94.538399][ T4005] bridge0: port 1(bridge_slave_0) entered disabled state [ 97.639857][ T4088] device bridge0 entered promiscuous mode [ 98.532531][ T4105] geneve1: tun_chr_ioctl cmd 1074025672 [ 98.538630][ T4105] geneve1: ignored: set checksum enabled [ 98.836658][ T4108] device wg2 entered promiscuous mode [ 98.853942][ T4108] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 99.270904][ T4130] device syzkaller0 entered promiscuous mode [ 99.547266][ T4164] device pim6reg1 entered promiscuous mode [ 100.198118][ T24] audit: type=1400 audit(1776303310.049:152): avc: denied { create } for pid=4209 comm="syz.3.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 100.355236][ T4225] device syzkaller0 entered promiscuous mode [ 100.556923][ T4241] device veth1_macvtap left promiscuous mode [ 100.727046][ T4242] device veth1_macvtap entered promiscuous mode [ 100.741218][ T4242] device macsec0 entered promiscuous mode [ 101.051467][ T4243] device syzkaller0 entered promiscuous mode [ 101.153210][ T24] audit: type=1400 audit(1776303310.999:153): avc: denied { create } for pid=4254 comm="syz.4.1076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 101.690114][ T4302] device syzkaller0 entered promiscuous mode [ 102.605003][ T4347] device syzkaller0 entered promiscuous mode [ 103.542926][ T4400] device syzkaller0 entered promiscuous mode [ 104.424080][ T4458] tap0: tun_chr_ioctl cmd 1074025677 [ 104.429804][ T4458] tap0: linktype set to 805 [ 104.437234][ T4463] device pimreg0 entered promiscuous mode [ 104.443653][ T4458] tap0: tun_chr_ioctl cmd 1074025681 [ 104.452047][ T4458] tap0: tun_chr_ioctl cmd 1074025698 [ 104.766423][ T4504] device syzkaller0 entered promiscuous mode [ 104.788135][ T4502] device wg2 left promiscuous mode [ 104.798179][ T4502] device wg2 entered promiscuous mode [ 104.818311][ T4504] device sit0 entered promiscuous mode [ 105.955481][ T24] audit: type=1400 audit(1776303315.799:154): avc: denied { create } for pid=4548 comm="syz.4.1172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 106.800457][ T24] audit: type=1400 audit(1776303316.649:155): avc: denied { create } for pid=4572 comm="syz.1.1177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 107.146841][ T4576] tap0: tun_chr_ioctl cmd 1074025677 [ 107.152203][ T4576] tap0: linktype set to 6 [ 107.174571][ T4569] device sit0 left promiscuous mode [ 107.767160][ T4611] -1: renamed from syzkaller0 [ 108.488600][ T4635] device syzkaller0 entered promiscuous mode [ 108.686173][ T1396] syzkaller0: tun_net_xmit 48 [ 110.632408][ T4741] device syzkaller0 entered promiscuous mode [ 111.174227][ T4799] device wg2 left promiscuous mode [ 111.892878][ T4821] device syzkaller0 entered promiscuous mode [ 112.433096][ T4890] device syzkaller0 entered promiscuous mode [ 112.849609][ T4900] device syzkaller0 entered promiscuous mode [ 114.294037][ T5025] device syzkaller0 left promiscuous mode [ 114.827290][ T24] audit: type=1400 audit(1776303324.679:156): avc: denied { create } for pid=5072 comm="syz.3.1325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 115.270277][ T24] audit: type=1400 audit(1776303325.119:157): avc: denied { read } for pid=5092 comm="syz.1.1331" dev="nsfs" ino=4026533077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 115.387714][ T24] audit: type=1400 audit(1776303325.119:158): avc: denied { open } for pid=5092 comm="syz.1.1331" path="net:[4026533077]" dev="nsfs" ino=4026533077 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 115.488946][ T5091] device syzkaller0 entered promiscuous mode [ 115.528240][ T5094] syz.0.1330[5094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.528294][ T5094] syz.0.1330[5094] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.605773][ T5125] device wg2 left promiscuous mode [ 116.980529][ T24] audit: type=1400 audit(1776303326.829:159): avc: denied { ioctl } for pid=5138 comm="syz.1.1343" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 117.779097][ T5159] device syzkaller0 entered promiscuous mode [ 119.286839][ T5220] device syzkaller0 entered promiscuous mode [ 119.365426][ T5229] device syzkaller0 entered promiscuous mode [ 119.524680][ T5246] device syzkaller0 entered promiscuous mode [ 121.244603][ T5368] syzkaller0: tun_chr_ioctl cmd 2147767519 [ 121.463649][ T5383] device syzkaller0 entered promiscuous mode [ 121.480036][ T1403] syzkaller0: tun_net_xmit 48 [ 121.493904][ T5384] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 121.510150][ T5385] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 121.565480][ T5383] syzkaller0: tun_net_xmit 1280 [ 121.569896][ T5384] syzkaller0: tun_net_xmit 1280 [ 122.209130][ T5402] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.217451][ T5402] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.232812][ T5402] device bridge_slave_0 entered promiscuous mode [ 122.258066][ T5402] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.266576][ T5402] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.274078][ T5402] device bridge_slave_1 entered promiscuous mode [ 122.454960][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.462526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.473805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.482998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.492618][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.499676][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.516860][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.525498][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.533659][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.540721][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.548720][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 122.557131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.565661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 122.573774][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.582451][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.617524][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 122.626006][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 122.644771][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 122.653226][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 122.661493][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 122.669426][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 122.705216][ T5402] device veth0_vlan entered promiscuous mode [ 122.730574][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 122.752585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 122.785445][ T5402] device veth1_macvtap entered promiscuous mode [ 122.799493][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 122.807476][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 122.825508][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.847110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 122.895316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 122.991740][ T5462] device wg2 entered promiscuous mode [ 123.298918][ T5491] device sit0 left promiscuous mode [ 123.369418][ T416] device veth1_macvtap left promiscuous mode [ 123.395192][ T416] device veth0_vlan left promiscuous mode [ 123.771748][ T5491] device syzkaller0 entered promiscuous mode [ 123.870724][ T5495] device dummy0 entered promiscuous mode [ 123.898082][ T5504] device sit0 entered promiscuous mode [ 124.099055][ T5519] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.106250][ T5519] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.039359][ T5580] device aaaaaaaaaaaaaaa entered promiscuous mode [ 125.161494][ T5599] device syzkaller0 entered promiscuous mode [ 125.537846][ T5613] device syzkaller0 entered promiscuous mode [ 125.774632][ T5651] bridge0: port 3(gretap0) entered blocking state [ 125.781399][ T5651] bridge0: port 3(gretap0) entered disabled state [ 125.792019][ T5651] device gretap0 entered promiscuous mode [ 125.827065][ T5651] bridge0: port 3(gretap0) entered blocking state [ 125.833549][ T5651] bridge0: port 3(gretap0) entered forwarding state [ 126.031264][ T5665] syz.2.1495[5665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.046632][ T5668] device syzkaller0 entered promiscuous mode [ 126.076944][ T5665] syz.2.1495[5665] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.154114][ T5762] device syzkaller0 entered promiscuous mode [ 127.907960][ T5856] bridge0: port 3(veth0_to_bridge) entered blocking state [ 127.919747][ T5856] bridge0: port 3(veth0_to_bridge) entered disabled state [ 127.937480][ T5856] device veth0_to_bridge entered promiscuous mode [ 128.115328][ T5881] -1: renamed from syzkaller0 [ 128.234659][ T5894] device syzkaller0 left promiscuous mode [ 128.693166][ T5928] Ÿë: port 1(veth0_to_team) entered blocking state [ 128.703721][ T5928] Ÿë: port 1(veth0_to_team) entered disabled state [ 128.717929][ T5928] device veth0_to_team entered promiscuous mode [ 129.221574][ T24] audit: type=1400 audit(1776303339.069:160): avc: denied { create } for pid=5968 comm="syz.0.1586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 130.465795][ T6019] device syzkaller0 entered promiscuous mode [ 131.147187][ T6116] device syzkaller0 entered promiscuous mode [ 131.543421][ T6151] device syzkaller0 entered promiscuous mode [ 131.552158][ T6152] nr0: port 1(macsec0) entered blocking state [ 131.599141][ T6152] nr0: port 1(macsec0) entered disabled state [ 131.642276][ T6151] syzkaller0: create flow: hash 3263665978 index 2 [ 131.724459][ T6151] syzkaller0: delete flow: hash 3263665978 index 2 [ 131.891006][ T6173] â6±ÿ: renamed from team_slave_1 [ 132.998706][ T6270] batadv0: tun_chr_ioctl cmd 2148553947 [ 133.005865][ T6272] device syzkaller0 entered promiscuous mode [ 133.066117][ T6276] device syzkaller0 entered promiscuous mode [ 133.113939][ T6286] device sit0 left promiscuous mode [ 133.127237][ T6286] device sit0 entered promiscuous mode [ 133.384070][ T6306] device syzkaller0 entered promiscuous mode [ 134.110938][ T6319] device veth0_vlan left promiscuous mode [ 134.230114][ T6319] device veth0_vlan entered promiscuous mode [ 135.197582][ T6402] device wg2 entered promiscuous mode [ 136.656696][ T6464] device syzkaller0 entered promiscuous mode [ 136.813713][ T24] audit: type=1400 audit(1776303346.659:161): avc: denied { setattr } for pid=6490 comm="syz.3.1746" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 137.558764][ T6529] device syzkaller0 entered promiscuous mode [ 138.150649][ T6537] device syzkaller0 entered promiscuous mode [ 138.670572][ T6583] device syzkaller0 entered promiscuous mode [ 139.333910][ T6633] device syzkaller0 entered promiscuous mode [ 141.062513][ T6719] device syzkaller0 entered promiscuous mode [ 141.248313][ T6717] device wg2 left promiscuous mode [ 142.353661][ T6767] device syzkaller0 entered promiscuous mode [ 143.553683][ T6820] device wg2 entered promiscuous mode [ 146.049469][ T6945] device wg2 entered promiscuous mode [ 146.309848][ T6949] device wg2 left promiscuous mode [ 146.357188][ T6947] device wg2 entered promiscuous mode [ 147.342114][ T24] audit: type=1400 audit(1776303357.189:162): avc: denied { create } for pid=6984 comm="syz.3.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 149.049056][ T7033] device wg2 left promiscuous mode [ 149.230822][ T7031] device wg2 entered promiscuous mode [ 149.469305][ T7054] syzkaller0: refused to change device tx_queue_len [ 150.483804][ T7119] batadv0: tun_chr_ioctl cmd 1074025677 [ 150.489810][ T7119] batadv0: linktype set to 804 [ 151.624452][ T7170] erspan0: refused to change device tx_queue_len [ 151.828243][ T7173] device syzkaller0 entered promiscuous mode [ 153.013186][ T7315] device veth0_vlan left promiscuous mode [ 153.101532][ T7315] device veth0_vlan entered promiscuous mode [ 153.639372][ T7324] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.649755][ T7324] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.662964][ T7324] device bridge_slave_0 entered promiscuous mode [ 153.677180][ T7324] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.684325][ T7324] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.692391][ T7324] device bridge_slave_1 entered promiscuous mode [ 153.824553][ T7324] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.831604][ T7324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.838963][ T7324] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.846010][ T7324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.867298][ T7340] device syzkaller0 entered promiscuous mode [ 153.922119][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.929675][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.937084][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 153.944632][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 153.958341][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 153.966865][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.973891][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.981484][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 153.994865][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.001905][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.022886][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 154.063213][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 154.085137][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 154.099769][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.108260][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.115908][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 154.149085][ T7324] device veth0_vlan entered promiscuous mode [ 154.186657][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.218116][ T7324] device veth1_macvtap entered promiscuous mode [ 154.240751][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 154.270985][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.786402][ T7382] device syzkaller0 entered promiscuous mode [ 156.005668][ T49] device veth0_to_team left promiscuous mode [ 156.015011][ T49] Ÿë: port 1(veth0_to_team) entered disabled state [ 156.106195][ T49] device veth0_to_bridge left promiscuous mode [ 156.137178][ T49] bridge0: port 3(veth0_to_bridge) entered disabled state [ 156.151243][ T49] device bridge_slave_1 left promiscuous mode [ 156.162864][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.188664][ T49] device bridge_slave_0 left promiscuous mode [ 156.228160][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.253031][ T49] device veth1_macvtap left promiscuous mode [ 156.265773][ T49] device veth0_vlan left promiscuous mode [ 156.675752][ T7496] device syzkaller0 entered promiscuous mode [ 156.766935][ T7496] tap0: tun_chr_ioctl cmd 35108 [ 156.807222][ T7514] device wg2 entered promiscuous mode [ 158.810993][ T7597] device pim6reg1 entered promiscuous mode [ 161.344768][ T7691] device sit0 left promiscuous mode [ 161.582650][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 161.591300][ T7716] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 161.610186][ T7718] tap0: tun_chr_ioctl cmd 1074025677 [ 161.619961][ T7718] tap0: linktype set to 805 [ 161.748918][ T7718] tap0: tun_chr_ioctl cmd 35108 [ 161.805799][ T7732] ip6tnl0: mtu greater than device maximum [ 161.943656][ T7747] device veth1_macvtap left promiscuous mode [ 161.970876][ T7747] device veth1_macvtap entered promiscuous mode [ 162.045599][ T7747] device macsec0 entered promiscuous mode [ 162.083057][ T7764] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 162.478565][ T7769] device syzkaller0 entered promiscuous mode [ 162.489683][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 162.605744][ T7771] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 163.134548][ T7832] device syzkaller0 left promiscuous mode [ 163.561662][ T7872] device wg2 left promiscuous mode [ 163.578420][ T7872] device wg2 entered promiscuous mode [ 164.482912][ T7943] IPv6: pim6reg1: Disabled Multicast RS [ 164.567243][ T7946] device syzkaller0 entered promiscuous mode [ 165.154921][ T8010] device veth1_macvtap left promiscuous mode [ 165.206239][ T8010] device veth1_macvtap entered promiscuous mode [ 165.213186][ T8010] device macsec0 entered promiscuous mode [ 165.223113][ T8010] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.257548][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.209230][ T8130] device wg2 left promiscuous mode [ 167.347548][ T8124] device wg2 entered promiscuous mode [ 167.757494][ T8167] device syzkaller0 entered promiscuous mode [ 168.505266][ T8232] syz.3.2208[8232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.505342][ T8232] syz.3.2208[8232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.089725][ T8254] device syzkaller0 entered promiscuous mode [ 169.455309][ T8246] device syzkaller0 entered promiscuous mode [ 169.872858][ T8278] device syzkaller0 entered promiscuous mode [ 170.120704][ T8288] device syzkaller0 entered promiscuous mode [ 170.617739][ T8332] device syzkaller0 entered promiscuous mode [ 170.686255][ T8342] : port 1(ip6gretap0) entered blocking state [ 170.692478][ T8342] : port 1(ip6gretap0) entered disabled state [ 170.700615][ T8342] device ip6gretap0 entered promiscuous mode [ 170.780056][ T8350] device veth0_vlan left promiscuous mode [ 170.787734][ T8350] device veth0_vlan entered promiscuous mode [ 170.819050][ T8350] device wg2 left promiscuous mode [ 171.755890][ T8433] device syzkaller0 entered promiscuous mode [ 172.845144][ T8460] device veth1_macvtap left promiscuous mode [ 172.851498][ T8460] device macsec0 left promiscuous mode [ 172.878557][ T8460] device veth1_macvtap entered promiscuous mode [ 172.892578][ T8460] device macsec0 entered promiscuous mode [ 174.144858][ T8533] device syzkaller0 left promiscuous mode [ 174.168301][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 174.185173][ T8526] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 175.080777][ T8569] device syzkaller0 entered promiscuous mode [ 175.098094][ T8582] tun0: tun_chr_ioctl cmd 1074812118 [ 175.111516][ T8581] tun0: tun_chr_ioctl cmd 1074025673 [ 176.073581][ T8600] device syzkaller0 entered promiscuous mode [ 177.707344][ T24] audit: type=1400 audit(1776303387.559:163): avc: denied { create } for pid=8706 comm="syz.1.2350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 178.556367][ T8737] device syzkaller0 entered promiscuous mode [ 179.375636][ T8769] device syzkaller0 entered promiscuous mode [ 179.452541][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 181.632663][ T8865] ~W: renamed from syzkaller0 [ 181.752016][ T8879] device wg2 left promiscuous mode [ 182.236066][ T8897] device syzkaller0 entered promiscuous mode [ 183.291798][ T8959] device wg2 left promiscuous mode [ 184.137456][ T9079] tap0: tun_chr_ioctl cmd 21731 [ 184.155075][ T9080] tap0: tun_chr_ioctl cmd 21731 [ 184.168586][ T9079] tap0: tun_chr_ioctl cmd 1074025680 [ 184.382726][ T9104] device syzkaller0 entered promiscuous mode [ 186.299228][ T9206] device syzkaller0 entered promiscuous mode [ 187.899487][ T9286] device syzkaller0 entered promiscuous mode [ 188.053208][ T9295] device syzkaller0 entered promiscuous mode [ 190.242217][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 190.252237][ T9417] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 190.389823][ T9423] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 190.422910][ T9423] device syzkaller0 entered promiscuous mode [ 190.617180][ T9413] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 190.772595][ T9457] device syzkaller0 entered promiscuous mode [ 190.788595][ T9457] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 192.003211][ T9505] device syzkaller0 entered promiscuous mode [ 192.976938][ T9563] device syzkaller0 entered promiscuous mode [ 193.261391][ T9582] device syzkaller0 entered promiscuous mode [ 193.947544][ T9640] ±ÿ: renamed from team_slave_1 [ 194.556214][ T9678] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.672099][ T9730] device syzkaller0 entered promiscuous mode [ 198.918730][ T9991] device wg2 left promiscuous mode [ 199.156284][ T9991] device wg2 entered promiscuous mode [ 200.065601][T10061] : port 1(ip6gretap0) entered blocking state [ 200.071987][T10061] : port 1(ip6gretap0) entered disabled state [ 200.094895][T10061] device ip6gretap0 entered promiscuous mode [ 200.302581][T10081] device veth1_macvtap left promiscuous mode [ 201.671533][ T24] audit: type=1400 audit(1776303411.519:164): avc: denied { create } for pid=10130 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 202.024435][T10151] device syzkaller0 left promiscuous mode [ 202.149046][T10158] device wg2 entered promiscuous mode [ 202.755053][T10209] device syzkaller0 entered promiscuous mode [ 203.675736][T10252] device syzkaller0 left promiscuous mode [ 203.749837][ T24] audit: type=1400 audit(1776303413.599:165): avc: denied { append } for pid=10261 comm="syz.0.2796" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 203.836115][T10267] device syzkaller0 entered promiscuous mode [ 203.843019][T10270] device syzkaller0 entered promiscuous mode [ 203.933039][T10282] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.056416][T10285] device bridge_slave_1 left promiscuous mode [ 204.098099][T10285] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.235155][T10285] device bridge_slave_0 left promiscuous mode [ 204.326492][T10285] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.561798][T10391] +: renamed from team_slave_1 [ 205.933080][ T24] audit: type=1400 audit(1776303415.779:166): avc: denied { mounton } for pid=10410 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 206.007662][T10410] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.014699][T10410] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.022269][T10410] device bridge_slave_0 entered promiscuous mode [ 206.034494][T10410] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.041967][T10410] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.049488][T10410] device bridge_slave_1 entered promiscuous mode [ 206.123148][T10410] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.130244][T10410] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.137611][T10410] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.144637][T10410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.185411][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.195110][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.202444][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.221755][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.230117][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.237174][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.245821][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.254297][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.261479][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.289592][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.298082][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.319888][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.331960][T10410] device veth0_vlan entered promiscuous mode [ 206.343276][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.351610][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.359631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.372829][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.383287][T10410] device veth1_macvtap entered promiscuous mode [ 206.460111][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.469943][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.497752][ T24] audit: type=1400 audit(1776303416.349:167): avc: denied { unmount } for pid=10410 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 206.541796][T10440] : port 1(syz_tun) entered blocking state [ 206.575014][T10440] : port 1(syz_tun) entered disabled state [ 206.581346][T10440] device syz_tun entered promiscuous mode [ 207.290272][T10492] geneve1: tun_chr_ioctl cmd 1074025672 [ 207.344426][T10492] geneve1: ignored: set checksum enabled [ 209.833737][T10611] syz.2.2897 (10611) used obsolete PPPIOCDETACH ioctl [ 211.420741][T10700] : port 1(ip6gretap0) entered blocking state [ 211.437509][T10700] : port 1(ip6gretap0) entered disabled state [ 211.494622][T10700] device ip6gretap0 entered promiscuous mode [ 211.664432][T10704] device ip6gretap0 left promiscuous mode [ 211.685230][T10704] : port 1(ip6gretap0) entered disabled state [ 211.706335][T10709] device wg2 entered promiscuous mode [ 211.999750][T10715] device veth1_macvtap left promiscuous mode [ 212.017643][T10715] device veth1_macvtap entered promiscuous mode [ 212.023959][T10715] device macsec0 entered promiscuous mode [ 212.040616][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.197176][T10722] device syzkaller0 entered promiscuous mode [ 214.008130][T10747] device aaaaaaaaaaaaaaa entered promiscuous mode [ 214.054378][T10758] cgroup: fork rejected by pids controller in /syz3 [ 214.840429][T10887] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.852074][T10887] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.861905][T10887] device bridge_slave_0 entered promiscuous mode [ 214.943795][T10887] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.951031][T10887] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.958793][T10887] device bridge_slave_1 entered promiscuous mode [ 215.034338][T10887] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.041437][T10887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.048731][T10887] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.055767][T10887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.079729][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.089112][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.096901][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.119301][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.135995][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.143070][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.152738][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.161162][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.168222][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.176196][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.184282][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.224152][T10887] device veth0_vlan entered promiscuous mode [ 215.293237][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.315837][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.354695][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.498108][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.512818][T10887] device veth1_macvtap entered promiscuous mode [ 215.660998][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.685422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.712910][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.721361][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.739954][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.763645][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 215.782226][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 215.811542][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 215.855781][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.261053][ T24] audit: type=1400 audit(1776303426.109:168): avc: denied { create } for pid=10964 comm="syz.2.2976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 216.295896][T10962] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.303083][T10962] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.317733][T10962] device bridge_slave_0 entered promiscuous mode [ 216.386262][T10962] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.393329][T10962] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.457215][T10962] device bridge_slave_1 entered promiscuous mode [ 216.584650][T10962] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.591839][T10962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.599310][T10962] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.606607][T10962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.626906][ T7] device bridge_slave_1 left promiscuous mode [ 216.633681][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.641909][ T7] device bridge_slave_0 left promiscuous mode [ 216.648773][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.657640][ T7] device veth1_macvtap left promiscuous mode [ 216.663715][ T7] device veth0_vlan left promiscuous mode [ 217.204376][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.211993][ T416] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.220233][ T416] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.264804][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.278006][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.322569][ T342] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.329748][ T342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.345202][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.354002][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.363235][ T342] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.370322][ T342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.392821][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.402642][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.476279][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.579284][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.599481][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.623740][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 217.665011][T10962] device veth0_vlan entered promiscuous mode [ 217.682386][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.775676][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.884015][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.977711][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.080027][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.107065][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.148682][T10962] device veth1_macvtap entered promiscuous mode [ 218.164710][T11013] device wg2 entered promiscuous mode [ 218.306416][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.339081][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.347746][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.356486][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.401663][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 218.530577][ T7] device ip6gretap0 left promiscuous mode [ 218.545033][ T7] : port 1(ip6gretap0) entered disabled state [ 219.267980][ T7] bridge0: port 3(gretap0) entered disabled state [ 219.334826][ T7] device gretap0 left promiscuous mode [ 219.340343][ T7] bridge0: port 3(gretap0) entered disabled state [ 219.609875][ T7] nr0: port 1(macsec0) entered disabled state [ 219.629054][ T7] device veth0_to_team left promiscuous mode [ 219.638250][ T7] Ÿë: port 1(veth0_to_team) entered disabled state [ 219.659306][ T7] device bridge_slave_1 left promiscuous mode [ 219.679289][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.698840][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.719946][ T7] device veth1_macvtap left promiscuous mode [ 219.739129][ T7] device veth0_vlan left promiscuous mode [ 220.828891][T11147] device syzkaller0 entered promiscuous mode [ 222.783499][T11260] device syzkaller0 entered promiscuous mode [ 223.411631][T11291] device syzkaller0 entered promiscuous mode [ 223.937801][T11305] sock: sock_set_timeout: `syz.2.3068' (pid 11305) tries to set negative timeout [ 224.579351][ T280] device syz_tun left promiscuous mode [ 224.584869][ T280] : port 1(syz_tun) entered disabled state [ 224.927505][T11319] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.985364][T11319] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.992830][T11319] device bridge_slave_0 entered promiscuous mode [ 225.072205][T11319] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.174077][T11319] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.205046][T11319] device bridge_slave_1 entered promiscuous mode [ 225.227069][T11349] device syzkaller0 entered promiscuous mode [ 225.544160][T11319] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.551249][T11319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.558578][T11319] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.565616][T11319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.870939][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.921928][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.987817][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.015075][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 226.033246][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.082660][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.091400][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.098464][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.106865][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.115481][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.123818][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.130862][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.168704][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.177962][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.198388][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.210813][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.236450][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 226.248271][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 226.464396][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 226.476856][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 226.522960][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 226.555727][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 226.760772][T11380] device wg2 entered promiscuous mode [ 226.800907][T11319] device veth0_vlan entered promiscuous mode [ 226.861469][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 226.876078][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 226.950043][T11319] device veth1_macvtap entered promiscuous mode [ 227.484604][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 227.513257][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 227.542855][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 227.564585][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 227.617495][T11427] device syzkaller0 entered promiscuous mode [ 227.704175][T11427] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.716562][T11427] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.932682][T11450] device syzkaller0 entered promiscuous mode [ 228.041337][T11456] @0Ù: renamed from bond_slave_1 [ 228.831997][T11493] device syzkaller0 entered promiscuous mode [ 228.909789][ T1371] syzkaller0: tun_net_xmit 48 [ 228.924685][T11479] device syzkaller0 entered promiscuous mode [ 229.149969][ T49] device bridge_slave_1 left promiscuous mode [ 229.175554][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.210736][ T49] device bridge_slave_0 left promiscuous mode [ 229.221437][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.237270][ T49] device veth1_macvtap left promiscuous mode [ 229.539165][T11527] device syzkaller0 entered promiscuous mode [ 229.923121][T11540] device syzkaller0 entered promiscuous mode [ 230.317542][T11556] syzkaller0: refused to change device tx_queue_len [ 236.061918][T11860] device syzkaller0 entered promiscuous mode [ 236.640785][T11877] device syzkaller0 entered promiscuous mode [ 237.551179][T11898] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.561093][T11898] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.570400][T11898] device bridge_slave_0 entered promiscuous mode [ 237.577693][T11898] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.584726][T11898] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.592444][T11898] device bridge_slave_1 entered promiscuous mode [ 237.954831][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.963523][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.006171][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.014812][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.025339][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.032370][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.041890][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.050493][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.058819][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.065923][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.073420][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.082319][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.103838][ T342] device ip6gretap0 left promiscuous mode [ 238.109981][ T342] : port 1(ip6gretap0) entered disabled state [ 238.124476][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 238.133693][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.161005][T11898] device veth0_vlan entered promiscuous mode [ 238.182040][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.206204][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 238.217808][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.231988][T11898] device veth1_macvtap entered promiscuous mode [ 238.242817][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 238.291398][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 238.348729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 238.417972][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 238.435100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.694856][T11995] : port 1(ip6gretap0) entered blocking state [ 238.762654][T11995] : port 1(ip6gretap0) entered disabled state [ 238.794124][T11995] device ip6gretap0 entered promiscuous mode [ 238.821217][T11996] device ip6gretap0 left promiscuous mode [ 238.827416][T11996] : port 1(ip6gretap0) entered disabled state [ 239.449146][ T342] device vlan1 left promiscuous mode [ 239.454841][ T342] Ÿë: port 1(vlan1) entered disabled state [ 239.462173][ T342] device veth1_macvtap left promiscuous mode [ 239.469769][ T342] device veth0_vlan left promiscuous mode [ 240.399122][T12082] device syzkaller0 entered promiscuous mode [ 240.914215][T12102] bridge0: port 3(gretap0) entered blocking state [ 240.921355][T12102] bridge0: port 3(gretap0) entered disabled state [ 240.934363][T12102] device gretap0 entered promiscuous mode [ 240.940344][T12102] bridge0: port 3(gretap0) entered blocking state [ 240.946812][T12102] bridge0: port 3(gretap0) entered forwarding state [ 241.019168][T12104] device syzkaller0 entered promiscuous mode [ 241.236958][T12117] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.244129][T12117] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.319859][T12116] device bridge_slave_1 left promiscuous mode [ 241.335981][T12116] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.474341][T12116] device bridge_slave_0 left promiscuous mode [ 241.497557][T12116] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.405984][T12151] syz.2.3311[12151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.406042][T12151] syz.2.3311[12151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.091302][T12227] device syzkaller0 entered promiscuous mode [ 244.939111][T12288] device syzkaller0 entered promiscuous mode [ 245.153808][T12298] device bridge_slave_1 left promiscuous mode [ 245.164935][T12298] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.183986][T12298] device bridge_slave_0 left promiscuous mode [ 245.193916][T12298] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.425055][T12370] @ÿ: renamed from bond_slave_0 [ 247.546343][T12380] device syzkaller0 entered promiscuous mode [ 247.841970][T12408] device syzkaller0 entered promiscuous mode [ 248.006044][T12416] device syzkaller0 entered promiscuous mode [ 248.068763][T12414] device syzkaller0 entered promiscuous mode [ 248.958207][T12450] device wg2 left promiscuous mode [ 249.699224][T12482] device syzkaller0 entered promiscuous mode [ 251.707437][T12554] device wg2 left promiscuous mode [ 252.227325][T12587] device syzkaller0 entered promiscuous mode [ 252.417752][T12593] device sit0 entered promiscuous mode [ 253.329434][T12630] device syzkaller0 entered promiscuous mode [ 254.553833][T12723] syz.0.3491[12723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.553888][T12723] syz.0.3491[12723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.572194][T12789] batadv0: tun_chr_ioctl cmd 1074025673 [ 255.589435][T12788] batadv0: tun_chr_ioctl cmd 21731 [ 255.598264][T12789] device veth0_vlan left promiscuous mode [ 255.604563][T12789] device veth0_vlan entered promiscuous mode [ 255.711081][T12795] device syzkaller0 entered promiscuous mode [ 256.464700][T12818] device syzkaller0 entered promiscuous mode [ 256.792614][T12838] device syzkaller0 entered promiscuous mode [ 256.921924][T12851] device aaaaaaaaaaaaaaa entered promiscuous mode [ 258.821553][T12903] device syzkaller0 entered promiscuous mode [ 259.320074][T12896] device syzkaller0 entered promiscuous mode [ 259.557894][T12915] device syzkaller0 entered promiscuous mode [ 260.766011][T12945] device syzkaller0 entered promiscuous mode [ 261.263832][T12964] device syzkaller0 entered promiscuous mode [ 261.280228][T12964] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 261.417931][T12970] device wg2 entered promiscuous mode [ 266.477938][T13195] device syzkaller0 entered promiscuous mode [ 266.673031][T13206] batadv0: tun_chr_ioctl cmd 1074025677 [ 266.679314][T13206] batadv0: linktype set to 804 [ 267.593879][T13269] device syzkaller0 entered promiscuous mode [ 268.173123][T13284] device syzkaller0 entered promiscuous mode [ 268.949401][T13318] tun0: tun_chr_ioctl cmd 1074812118 [ 270.468612][T13347] device syzkaller0 entered promiscuous mode [ 272.321870][T13460] device syzkaller0 entered promiscuous mode [ 273.462402][T13475] device syzkaller0 entered promiscuous mode [ 274.021786][T13497] FAULT_INJECTION: forcing a failure. [ 274.021786][T13497] name failslab, interval 1, probability 0, space 0, times 1 [ 274.063670][T13497] CPU: 0 PID: 13497 Comm: syz.3.3725 Tainted: G W syzkaller #0 [ 274.072536][T13497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 274.082591][T13497] Call Trace: [ 274.085891][T13497] __dump_stack+0x21/0x24 [ 274.090210][T13497] dump_stack_lvl+0x1a7/0x208 [ 274.094874][T13497] ? thaw_kernel_threads+0x220/0x220 [ 274.100137][T13497] ? show_regs_print_info+0x18/0x18 [ 274.105313][T13497] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 274.111875][T13497] dump_stack+0x15/0x1c [ 274.116004][T13497] should_fail+0x3c1/0x510 [ 274.120489][T13497] ? map_get_next_key+0x213/0x4c0 [ 274.125489][T13497] __should_failslab+0xa4/0xe0 [ 274.130229][T13497] should_failslab+0x9/0x20 [ 274.134711][T13497] __kmalloc_track_caller+0x5f/0x320 [ 274.140063][T13497] memdup_user+0x25/0xb0 [ 274.144281][T13497] map_get_next_key+0x213/0x4c0 [ 274.149105][T13497] ? security_bpf+0x82/0xa0 [ 274.153580][T13497] __se_sys_bpf+0x35b/0x740 [ 274.158056][T13497] ? __x64_sys_bpf+0x90/0x90 [ 274.162626][T13497] ? debug_smp_processor_id+0x17/0x20 [ 274.167972][T13497] __x64_sys_bpf+0x7b/0x90 [ 274.172366][T13497] do_syscall_64+0x31/0x40 [ 274.176766][T13497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 274.182639][T13497] RIP: 0033:0x7fd970d5e819 [ 274.187042][T13497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 274.206638][T13497] RSP: 002b:00007fd96f7b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 274.215041][T13497] RAX: ffffffffffffffda RBX: 00007fd970fd7fa0 RCX: 00007fd970d5e819 [ 274.222999][T13497] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 274.230954][T13497] RBP: 00007fd96f7b9090 R08: 0000000000000000 R09: 0000000000000000 [ 274.238907][T13497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 274.246859][T13497] R13: 00007fd970fd8038 R14: 00007fd970fd7fa0 R15: 00007ffe9055d4a8 [ 274.953563][T13519] device syzkaller0 entered promiscuous mode [ 276.415336][T13612] device syzkaller0 entered promiscuous mode [ 277.127670][T13660] @0Ù: renamed from bond_slave_1 [ 277.288417][T13739] FAULT_INJECTION: forcing a failure. [ 277.288417][T13739] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 277.301658][T13739] CPU: 0 PID: 13739 Comm: syz.3.3785 Tainted: G W syzkaller #0 [ 277.310500][T13739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 277.320543][T13739] Call Trace: [ 277.323826][T13739] __dump_stack+0x21/0x24 [ 277.328153][T13739] dump_stack_lvl+0x1a7/0x208 [ 277.332825][T13739] ? show_regs_print_info+0x18/0x18 [ 277.338012][T13739] ? trie_get_next_key+0x22a/0x700 [ 277.343108][T13739] ? kfree+0x1e4/0x270 [ 277.347165][T13739] dump_stack+0x15/0x1c [ 277.351305][T13739] should_fail+0x3c1/0x510 [ 277.355709][T13739] should_fail_usercopy+0x1a/0x20 [ 277.360725][T13739] _copy_to_user+0x20/0x90 [ 277.365220][T13739] map_get_next_key+0x388/0x4c0 [ 277.370063][T13739] __se_sys_bpf+0x35b/0x740 [ 277.374551][T13739] ? __x64_sys_bpf+0x90/0x90 [ 277.379147][T13739] ? debug_smp_processor_id+0x17/0x20 [ 277.384504][T13739] __x64_sys_bpf+0x7b/0x90 [ 277.388904][T13739] do_syscall_64+0x31/0x40 [ 277.393315][T13739] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.399193][T13739] RIP: 0033:0x7fd970d5e819 [ 277.403605][T13739] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 277.423636][T13739] RSP: 002b:00007fd96f7b9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 277.432041][T13739] RAX: ffffffffffffffda RBX: 00007fd970fd7fa0 RCX: 00007fd970d5e819 [ 277.439999][T13739] RDX: 0000000000000020 RSI: 0000200000000080 RDI: 0000000000000004 [ 277.448059][T13739] RBP: 00007fd96f7b9090 R08: 0000000000000000 R09: 0000000000000000 [ 277.456023][T13739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 277.463983][T13739] R13: 00007fd970fd8038 R14: 00007fd970fd7fa0 R15: 00007ffe9055d4a8 [ 278.179590][T13782] FAULT_INJECTION: forcing a failure. [ 278.179590][T13782] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.192751][T13782] CPU: 1 PID: 13782 Comm: syz.2.3799 Tainted: G W syzkaller #0 [ 278.201579][T13782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 278.211612][T13782] Call Trace: [ 278.214886][T13782] __dump_stack+0x21/0x24 [ 278.219233][T13782] dump_stack_lvl+0x1a7/0x208 [ 278.223894][T13782] ? thaw_kernel_threads+0x220/0x220 [ 278.229158][T13782] ? vsnprintf+0x189c/0x1990 [ 278.233731][T13782] ? show_regs_print_info+0x18/0x18 [ 278.238906][T13782] dump_stack+0x15/0x1c [ 278.243057][T13782] should_fail+0x3c1/0x510 [ 278.247447][T13782] should_fail_usercopy+0x1a/0x20 [ 278.252447][T13782] _copy_to_user+0x20/0x90 [ 278.256840][T13782] simple_read_from_buffer+0xe9/0x160 [ 278.262189][T13782] proc_fail_nth_read+0x1a6/0x220 [ 278.267194][T13782] ? proc_fault_inject_write+0x310/0x310 [ 278.272797][T13782] ? rw_verify_area+0x1c0/0x360 [ 278.277617][T13782] ? proc_fault_inject_write+0x310/0x310 [ 278.283224][T13782] vfs_read+0x209/0xa60 [ 278.287357][T13782] ? kernel_read+0x70/0x70 [ 278.291745][T13782] ? __kasan_check_write+0x14/0x20 [ 278.296829][T13782] ? mutex_lock+0x92/0xf0 [ 278.301132][T13782] ? mutex_trylock+0xa0/0xa0 [ 278.305692][T13782] ? __fget_files+0x2c4/0x320 [ 278.310348][T13782] ? __fdget_pos+0x2d2/0x380 [ 278.314908][T13782] ? ksys_read+0x71/0x250 [ 278.319210][T13782] ksys_read+0x149/0x250 [ 278.323425][T13782] ? vfs_write+0xdc0/0xdc0 [ 278.327817][T13782] ? debug_smp_processor_id+0x17/0x20 [ 278.333196][T13782] __x64_sys_read+0x7b/0x90 [ 278.337676][T13782] do_syscall_64+0x31/0x40 [ 278.342068][T13782] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 278.347933][T13782] RIP: 0033:0x7fd5ed2a404e [ 278.352759][T13782] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 278.372346][T13782] RSP: 002b:00007fd5ebd3dfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 278.380743][T13782] RAX: ffffffffffffffda RBX: 00007fd5ebd3e6c0 RCX: 00007fd5ed2a404e [ 278.388696][T13782] RDX: 000000000000000f RSI: 00007fd5ebd3e0a0 RDI: 0000000000000004 [ 278.396648][T13782] RBP: 00007fd5ebd3e090 R08: 0000000000000000 R09: 0000000000000000 [ 278.404596][T13782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.412543][T13782] R13: 00007fd5ed55d038 R14: 00007fd5ed55cfa0 R15: 00007ffc68589b88 [ 279.301545][T13851] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 279.355834][T13851] device syzkaller0 entered promiscuous mode [ 279.947337][T13902] device wg2 entered promiscuous mode [ 280.206105][T13922] syz.0.3842[13922] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.466617][T13943] device syzkaller0 entered promiscuous mode [ 280.624700][T13955] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 280.639885][T13955] syzkaller0: Linktype set failed because interface is up [ 280.652792][ T1393] syzkaller0: tun_net_xmit 48 [ 282.318922][T14035] device wg2 entered promiscuous mode [ 283.604471][T14116] device syzkaller0 entered promiscuous mode [ 283.741168][T14138] device syzkaller0 entered promiscuous mode [ 284.956101][T14209] syz.3.3922[14209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.956183][T14209] syz.3.3922[14209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.832970][T14311] device sit0 entered promiscuous mode [ 286.982644][T14314] IPv6: pim6reg1: Disabled Multicast RS [ 287.255524][T14331] GPL: port 1(ip6gretap0) entered blocking state [ 287.264794][T14331] GPL: port 1(ip6gretap0) entered disabled state [ 287.285271][T14331] device ip6gretap0 entered promiscuous mode [ 287.297412][T14322] device ip6gretap0 left promiscuous mode [ 287.309677][T14322] GPL: port 1(ip6gretap0) entered disabled state [ 288.388864][T14390] device wg2 entered promiscuous mode [ 290.376633][T14465] device veth0_vlan left promiscuous mode [ 290.395149][T14465] device veth0_vlan entered promiscuous mode [ 290.481695][T14464] device wg2 left promiscuous mode [ 291.845715][T14575] device wg2 left promiscuous mode [ 291.958537][T14575] device wg2 entered promiscuous mode [ 297.121458][T14789] device syzkaller0 entered promiscuous mode [ 297.438918][T14797] device syzkaller0 entered promiscuous mode [ 298.677725][T14831] device syzkaller0 entered promiscuous mode [ 298.701829][T14831] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 298.722892][T14833] device syzkaller0 entered promiscuous mode [ 298.729691][T14833] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 298.772550][T14831] device team_slave_1 entered promiscuous mode [ 298.809847][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 298.823558][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 298.862392][T14847] tun0: tun_chr_ioctl cmd 1074025675 [ 298.874361][T14847] tun0: persist enabled [ 298.879614][T14847] tun0: tun_chr_ioctl cmd 1074025675 [ 298.895002][T14847] tun0: persist enabled [ 298.908818][T14847] device syzkaller0 entered promiscuous mode [ 299.126270][T14844] device syzkaller0 entered promiscuous mode [ 299.201239][T14852] tap0: tun_chr_ioctl cmd 1074025677 [ 299.266968][T14852] tap0: linktype set to 769 [ 299.780035][T14886] FAULT_INJECTION: forcing a failure. [ 299.780035][T14886] name failslab, interval 1, probability 0, space 0, times 0 [ 299.894931][T14886] CPU: 1 PID: 14886 Comm: syz.1.4119 Tainted: G W syzkaller #0 [ 299.903818][T14886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 299.913969][T14886] Call Trace: [ 299.917259][T14886] __dump_stack+0x21/0x24 [ 299.921582][T14886] dump_stack_lvl+0x1a7/0x208 [ 299.926246][T14886] ? thaw_kernel_threads+0x220/0x220 [ 299.931527][T14886] ? show_regs_print_info+0x18/0x18 [ 299.936728][T14886] ? unwind_get_return_address+0x4d/0x90 [ 299.942369][T14886] ? stack_trace_save+0xf0/0xf0 [ 299.947219][T14886] dump_stack+0x15/0x1c [ 299.951367][T14886] should_fail+0x3c1/0x510 [ 299.955781][T14886] ? __get_vm_area_node+0x113/0x450 [ 299.960973][T14886] __should_failslab+0xa4/0xe0 [ 299.965730][T14886] should_failslab+0x9/0x20 [ 299.970230][T14886] kmem_cache_alloc_trace+0x3a/0x2e0 [ 299.975511][T14886] __get_vm_area_node+0x113/0x450 [ 299.980533][T14886] __vmalloc_node_range+0xe0/0x790 [ 299.985635][T14886] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 299.991261][T14886] ? _kstrtoull+0x3c0/0x4d0 [ 299.995763][T14886] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 300.001308][T14886] __vmalloc+0x79/0x90 [ 300.005372][T14886] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 300.010931][T14886] bpf_prog_alloc_no_stats+0x3b/0x250 [ 300.016300][T14886] ? bpf_prog_alloc+0x17/0x1f0 [ 300.021058][T14886] bpf_prog_alloc+0x21/0x1f0 [ 300.025637][T14886] bpf_prog_load+0x7c4/0x14a0 [ 300.030308][T14886] ? map_freeze+0x320/0x320 [ 300.034824][T14886] ? vfs_write+0xb27/0xdc0 [ 300.039248][T14886] ? selinux_bpf+0xc7/0xf0 [ 300.043664][T14886] ? security_bpf+0x82/0xa0 [ 300.048162][T14886] __se_sys_bpf+0x49a/0x740 [ 300.052657][T14886] ? __x64_sys_bpf+0x90/0x90 [ 300.057248][T14886] ? debug_smp_processor_id+0x17/0x20 [ 300.062613][T14886] __x64_sys_bpf+0x7b/0x90 [ 300.067138][T14886] do_syscall_64+0x31/0x40 [ 300.071561][T14886] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 300.077446][T14886] RIP: 0033:0x7fcbeed3b819 [ 300.081866][T14886] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 300.101467][T14886] RSP: 002b:00007fcbed775028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 300.109882][T14886] RAX: ffffffffffffffda RBX: 00007fcbeefb5090 RCX: 00007fcbeed3b819 [ 300.117856][T14886] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 300.125824][T14886] RBP: 00007fcbed775090 R08: 0000000000000000 R09: 0000000000000000 [ 300.133806][T14886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.141778][T14886] R13: 00007fcbeefb5128 R14: 00007fcbeefb5090 R15: 00007ffce6960838 [ 300.225216][T14886] syz.1.4119: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 300.255200][T14886] CPU: 1 PID: 14886 Comm: syz.1.4119 Tainted: G W syzkaller #0 [ 300.264076][T14886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 300.274132][T14886] Call Trace: [ 300.277423][T14886] __dump_stack+0x21/0x24 [ 300.281747][T14886] dump_stack_lvl+0x1a7/0x208 [ 300.286417][T14886] ? show_regs_print_info+0x18/0x18 [ 300.291641][T14886] ? pr_cont_kernfs_name+0xe3/0xf0 [ 300.296743][T14886] dump_stack+0x15/0x1c [ 300.300890][T14886] warn_alloc+0x1dc/0x200 [ 300.305222][T14886] ? __get_vm_area_node+0x113/0x450 [ 300.310409][T14886] ? zone_watermark_ok_safe+0x250/0x250 [ 300.315951][T14886] ? __get_vm_area_node+0x345/0x450 [ 300.321143][T14886] __vmalloc_node_range+0x27d/0x790 [ 300.326337][T14886] ? _kstrtoull+0x3c0/0x4d0 [ 300.330847][T14886] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 300.336383][T14886] __vmalloc+0x79/0x90 [ 300.340441][T14886] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 300.345976][T14886] bpf_prog_alloc_no_stats+0x3b/0x250 [ 300.351337][T14886] ? bpf_prog_alloc+0x17/0x1f0 [ 300.356099][T14886] bpf_prog_alloc+0x21/0x1f0 [ 300.360679][T14886] bpf_prog_load+0x7c4/0x14a0 [ 300.365346][T14886] ? map_freeze+0x320/0x320 [ 300.369838][T14886] ? vfs_write+0xb27/0xdc0 [ 300.374258][T14886] ? selinux_bpf+0xc7/0xf0 [ 300.378675][T14886] ? security_bpf+0x82/0xa0 [ 300.383261][T14886] __se_sys_bpf+0x49a/0x740 [ 300.387759][T14886] ? __x64_sys_bpf+0x90/0x90 [ 300.392351][T14886] ? debug_smp_processor_id+0x17/0x20 [ 300.397726][T14886] __x64_sys_bpf+0x7b/0x90 [ 300.402140][T14886] do_syscall_64+0x31/0x40 [ 300.406548][T14886] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 300.412427][T14886] RIP: 0033:0x7fcbeed3b819 [ 300.416834][T14886] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 300.436453][T14886] RSP: 002b:00007fcbed775028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 300.445200][T14886] RAX: ffffffffffffffda RBX: 00007fcbeefb5090 RCX: 00007fcbeed3b819 [ 300.453162][T14886] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 300.461116][T14886] RBP: 00007fcbed775090 R08: 0000000000000000 R09: 0000000000000000 [ 300.469067][T14886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.477101][T14886] R13: 00007fcbeefb5128 R14: 00007fcbeefb5090 R15: 00007ffce6960838 [ 300.488171][T14886] Mem-Info: [ 300.491457][T14886] active_anon:41 inactive_anon:18842 isolated_anon:0 [ 300.491457][T14886] active_file:23196 inactive_file:3621 isolated_file:0 [ 300.491457][T14886] unevictable:0 dirty:225 writeback:0 [ 300.491457][T14886] slab_reclaimable:7852 slab_unreclaimable:86218 [ 300.491457][T14886] mapped:29345 shmem:162 pagetables:676 bounce:0 [ 300.491457][T14886] free:1537394 free_pcp:1333 free_cma:0 [ 300.528549][T14886] Node 0 active_anon:164kB inactive_anon:75368kB active_file:92784kB inactive_file:14484kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:117380kB dirty:900kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:10656kB all_unreclaimable? no [ 300.558963][T14886] DMA32 free:2983636kB min:62644kB low:78304kB high:93964kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2986532kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2896kB local_pcp:1432kB free_cma:0kB [ 300.588076][T14886] lowmem_reserve[]: 0 3941 3941 [ 300.593016][T14886] Normal free:3166196kB min:84808kB low:106008kB high:127208kB reserved_highatomic:0KB active_anon:164kB inactive_anon:75368kB active_file:92784kB inactive_file:14484kB unevictable:0kB writepending:900kB present:5242880kB managed:4036112kB mlocked:0kB pagetables:2704kB bounce:0kB free_pcp:2436kB local_pcp:1040kB free_cma:0kB [ 300.624254][T14886] lowmem_reserve[]: 0 0 0 [ 300.628799][T14886] DMA32: 7*4kB (UM) 5*8kB (M) 5*16kB (M) 8*32kB (UM) 9*64kB (UM) 6*128kB (UM) 6*256kB (UM) 5*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 724*4096kB (M) = 2983636kB [ 300.644917][T14886] Normal: 721*4kB (UME) 588*8kB (UME) 643*16kB (UME) 901*32kB (UME) 495*64kB (UM) 159*128kB (UME) 90*256kB (UME) 24*512kB (UME) 19*1024kB (UM) 5*2048kB (UM) 733*4096kB (UM) = 3166132kB [ 300.663353][T14886] 26979 total pagecache pages [ 300.668112][T14886] 0 pages in swap cache [ 300.672253][T14886] Swap cache stats: add 0, delete 0, find 0/0 [ 300.678443][T14886] Free swap = 124996kB [ 300.693117][T14886] Total swap = 124996kB [ 300.697335][T14886] 2097051 pages RAM [ 300.701171][T14886] 0 pages HighMem/MovableOnly [ 300.705883][T14886] 341390 pages reserved [ 300.714261][T14886] 0 pages cma reserved [ 301.911851][T14935] device syzkaller0 entered promiscuous mode [ 303.413240][T15009] device syzkaller0 entered promiscuous mode [ 303.984962][ T24] audit: type=1400 audit(1776303513.839:169): avc: denied { create } for pid=15028 comm="syz.1.4162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 304.442901][T15058] device syzkaller0 entered promiscuous mode [ 304.537170][T15071] device syzkaller0 entered promiscuous mode [ 304.562097][T15071] syzkaller0: tun_net_xmit 1280 [ 304.568589][T15071] syzkaller0: create flow: hash 139776256 index 2 [ 304.597484][T15070] syzkaller0: delete flow: hash 139776256 index 2 [ 306.287362][T15186] device syzkaller0 entered promiscuous mode [ 306.358883][T15199] syz.4.4212[15199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.358938][T15199] syz.4.4212[15199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.533393][T15204] device syzkaller0 entered promiscuous mode [ 308.261987][T15302] device syzkaller0 entered promiscuous mode [ 308.580247][T15308] device xfrm0 entered promiscuous mode [ 309.457813][T15356] device wg2 left promiscuous mode [ 309.713530][T15374] device syzkaller0 entered promiscuous mode [ 309.991162][T15398] tap0: tun_chr_ioctl cmd 1074025677 [ 309.996882][T15398] tap0: linktype set to 805 [ 310.231674][T15413] device syzkaller0 entered promiscuous mode [ 310.298119][ T1376] syzkaller0: tun_net_xmit 48 [ 310.929901][T15437] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 311.627819][T15474] device syzkaller0 entered promiscuous mode [ 315.773646][T15600] device sit0 entered promiscuous mode [ 320.270102][T15711] bridge0: port 3(gretap0) entered blocking state [ 320.344113][T15711] bridge0: port 3(gretap0) entered disabled state [ 320.450652][T15711] device gretap0 entered promiscuous mode [ 320.456599][T15711] bridge0: port 3(gretap0) entered blocking state [ 320.463050][T15711] bridge0: port 3(gretap0) entered forwarding state [ 320.922166][T15729] device syzkaller0 entered promiscuous mode [ 321.428740][T15743] bridge0: port 3(gretap0) entered disabled state [ 321.443828][T15743] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.460730][T15743] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.708802][T15743] device gretap0 left promiscuous mode [ 321.732773][T15743] bridge0: port 3(gretap0) entered disabled state [ 321.847903][T15743] device bridge_slave_1 left promiscuous mode [ 321.859987][T15743] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.927457][T15743] device bridge_slave_0 left promiscuous mode [ 321.940619][T15743] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.127864][T15761] device veth0_vlan left promiscuous mode [ 322.135680][T15761] device veth0_vlan entered promiscuous mode [ 330.502362][T16047] device pimreg0 entered promiscuous mode [ 333.513481][T16168] device syzkaller0 entered promiscuous mode [ 335.583026][ T24] audit: type=1400 audit(1776303545.429:170): avc: denied { associate } for pid=16291 comm="syz.3.4534" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 336.906288][T16355] device syzkaller0 entered promiscuous mode [ 337.214854][T16364] device sit0 left promiscuous mode [ 337.227175][T16366] device wg2 left promiscuous mode [ 337.573414][T16377] device wg2 left promiscuous mode [ 337.603531][T16377] device wg2 entered promiscuous mode [ 337.665265][T16376] @ÿ: renamed from bond_slave_0 [ 341.648692][T16573] device syzkaller0 entered promiscuous mode [ 341.819703][T16597] device veth0_to_bond entered promiscuous mode [ 342.302563][T16663] device syzkaller0 entered promiscuous mode [ 342.507655][T16680] device wg2 left promiscuous mode [ 342.597305][T16688] device wg2 entered promiscuous mode [ 343.389503][T16705] device wg2 entered promiscuous mode [ 343.759464][T16727] device macsec0 entered promiscuous mode [ 344.642583][T16745] -1: renamed from syzkaller0 [ 344.726596][T16756] device syzkaller0 entered promiscuous mode [ 345.150953][T16779] device syzkaller0 entered promiscuous mode [ 347.127925][T16899] : renamed from bond_slave_0 [ 347.682419][T16928] device syzkaller0 entered promiscuous mode [ 347.744014][T16926] +: renamed from team_slave_1 [ 348.537846][T16950] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.545124][T16950] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.557236][T16950] device bridge_slave_0 entered promiscuous mode [ 348.564222][T16950] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.571697][T16950] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.579373][T16950] device bridge_slave_1 entered promiscuous mode [ 349.311249][T16967] pimreg: tun_chr_ioctl cmd 1074025677 [ 349.414249][T16967] pimreg: linktype set to 823 [ 349.573401][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 349.595332][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.615162][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.628481][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.646500][ T416] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.653575][ T416] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.679459][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.708565][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.779643][ T416] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.786708][ T416] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.894891][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.933452][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.963226][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.000972][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.009100][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 350.075369][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 350.094061][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 350.102559][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 350.111497][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.119745][T16950] device veth0_vlan entered promiscuous mode [ 350.138305][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.149581][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 350.216195][T16950] device veth1_macvtap entered promiscuous mode [ 350.335553][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 350.402061][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 350.512317][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.678679][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 350.753637][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 350.846335][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 350.937290][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 350.996061][T16988] cgroup: fork rejected by pids controller in /syz2 [ 351.670619][ T9] device veth0_vlan left promiscuous mode [ 351.720420][ T24] audit: type=1400 audit(1776303561.569:171): avc: denied { create } for pid=17012 comm="syz.3.4742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 352.089614][T17021] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.118679][T17021] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.175358][T17021] device bridge_slave_0 entered promiscuous mode [ 352.369709][T17021] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.437472][T17021] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.444958][T17021] device bridge_slave_1 entered promiscuous mode [ 352.951563][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.984107][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.064895][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.144004][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.154811][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.162043][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.195810][T17060] device wg2 left promiscuous mode [ 353.319406][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 353.327271][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.335664][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.343927][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.350972][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.364813][T17063] device wg2 entered promiscuous mode [ 353.399167][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.408780][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.426509][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.441317][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.449488][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.457859][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.593794][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.675212][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.697036][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.705078][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.713733][T17021] device veth0_vlan entered promiscuous mode [ 353.999788][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 354.008193][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 354.035675][T17021] device veth1_macvtap entered promiscuous mode [ 354.058057][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 354.073619][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 354.082076][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 354.256249][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 354.274059][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.829981][T17136] device syzkaller0 entered promiscuous mode [ 354.836314][T17136] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 354.859474][ T9] device veth1_macvtap left promiscuous mode [ 354.865676][ T9] device veth0_vlan left promiscuous mode [ 356.741193][T17259] device syzkaller0 entered promiscuous mode [ 357.511697][T17292] device syzkaller0 entered promiscuous mode [ 357.995491][T17332] device syzkaller0 entered promiscuous mode [ 359.303583][T17401] device syzkaller0 entered promiscuous mode [ 361.712144][T17526] device syzkaller0 entered promiscuous mode [ 362.499830][T17556] device syzkaller0 entered promiscuous mode [ 362.888908][T17580] device syzkaller0 entered promiscuous mode [ 363.219318][T17592] device syzkaller0 entered promiscuous mode [ 364.421010][T17658] bridge0: port 3(veth0_vlan) entered blocking state [ 364.438236][T17658] bridge0: port 3(veth0_vlan) entered disabled state [ 364.451288][T17658] bridge0: port 3(veth0_vlan) entered blocking state [ 364.458074][T17658] bridge0: port 3(veth0_vlan) entered forwarding state [ 364.638279][T17670] device sit0 entered promiscuous mode [ 365.879665][ T24] audit: type=1400 audit(1776303575.729:172): avc: denied { create } for pid=17701 comm="syz.0.4939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 366.321747][T17719] device wg2 entered promiscuous mode [ 366.397939][T17723] device wg2 left promiscuous mode [ 366.417618][T17723] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 368.781126][T17853] device bridge0 entered promiscuous mode [ 372.181296][T18017] device syzkaller0 entered promiscuous mode [ 373.180417][T18090] device sit0 left promiscuous mode [ 373.836925][T18142] tun0: tun_chr_ioctl cmd 1074025677 [ 373.860170][T18142] tun0: linktype set to 820 [ 373.891848][T18142] -: renamed from syzkaller0 [ 375.495378][T18345] device sit0 left promiscuous mode [ 375.596825][T18348] device syzkaller0 entered promiscuous mode [ 375.839145][T18358] device sit0 entered promiscuous mode [ 376.481970][T18385] device veth0_vlan left promiscuous mode [ 376.505387][T18385] device veth0_vlan entered promiscuous mode [ 376.534866][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.545349][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.573305][ T416] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 378.602347][T18492] : port 1(ip6gretap0) entered blocking state [ 378.616806][T18492] : port 1(ip6gretap0) entered disabled state [ 378.636148][T18492] device ip6gretap0 entered promiscuous mode [ 378.682555][T18489] device ip6gretap0 left promiscuous mode [ 378.697577][T18489] : port 1(ip6gretap0) entered disabled state [ 379.113451][T18516] device syzkaller0 entered promiscuous mode [ 379.130841][T18530] device syzkaller0 entered promiscuous mode [ 379.294542][T18545] device syzkaller0 entered promiscuous mode [ 379.832126][T18596] device syzkaller0 entered promiscuous mode [ 380.391312][T18628] device sit0 entered promiscuous mode [ 381.349034][T18685] device syzkaller0 entered promiscuous mode [ 381.425396][T18699] device syzkaller0 entered promiscuous mode [ 381.996091][T18744] nr0: port 1(macsec0) entered blocking state [ 382.002175][T18744] nr0: port 1(macsec0) entered disabled state [ 382.008968][T18744] device macsec0 entered promiscuous mode [ 383.031669][T18818] device syzkaller0 entered promiscuous mode [ 383.381102][T18820] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.397209][T18825] device syzkaller0 entered promiscuous mode [ 383.896419][T18849] tun0: tun_chr_ioctl cmd 1074025678 [ 383.906270][T18849] tun0: group set to 1 [ 385.617237][T18920] device veth1_macvtap left promiscuous mode [ 386.697716][T18956] device wg2 left promiscuous mode [ 388.176052][T19068] pimreg: tun_chr_ioctl cmd 1074025677 [ 388.205302][T19068] pimreg: linktype set to 823 [ 389.222333][T19154] device sit0 entered promiscuous mode [ 390.031967][T19177] device sit0 left promiscuous mode [ 391.242677][T19257] -1: renamed from syzkaller0 [ 391.326591][T19260] device syzkaller0 entered promiscuous mode [ 391.348417][T19260] syzkaller0: create flow: hash 3263665978 index 2 [ 391.373267][T13713] syzkaller0: tun_net_xmit 48 [ 391.494864][T19260] syzkaller0: delete flow: hash 3263665978 index 2 [ 392.240218][T19290] device syzkaller0 entered promiscuous mode [ 392.293560][T19313] device syzkaller0 entered promiscuous mode [ 394.553759][T19384] device syzkaller0 entered promiscuous mode [ 394.995980][T19396] device sit0 entered promiscuous mode [ 395.421048][T19400] device syzkaller0 entered promiscuous mode [ 396.001889][T19414] device syzkaller0 entered promiscuous mode [ 396.078096][T19417] device syzkaller0 left promiscuous mode [ 398.937803][ T24] audit: type=1400 audit(1776303608.789:173): avc: denied { create } for pid=19507 comm="syz.3.5464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 399.689974][T19526] device syzkaller0 entered promiscuous mode [ 404.979137][T19708] device sit0 left promiscuous mode [ 405.150885][T19708] device sit0 entered promiscuous mode [ 407.312908][T19776] syz.1.5535[19776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.312964][T19776] syz.1.5535[19776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 408.743466][T19818] device syzkaller0 entered promiscuous mode [ 409.304384][T19834] device veth0_to_bond left promiscuous mode [ 410.325583][T19893] device syzkaller0 entered promiscuous mode [ 410.960433][T19922] -1: renamed from syzkaller0 [ 410.986862][ T24] audit: type=1400 audit(1776303620.839:174): avc: denied { create } for pid=19927 comm="syz.1.5580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 413.146535][T20004] bridge0: port 3(veth0_vlan) entered disabled state [ 413.344888][T20004] bridge0: port 3(veth0_vlan) entered blocking state [ 413.351609][T20004] bridge0: port 3(veth0_vlan) entered forwarding state [ 414.037562][T20059] device sit0 left promiscuous mode [ 414.064893][T20059] device sit0 entered promiscuous mode [ 414.120716][T20059] device syzkaller0 entered promiscuous mode [ 414.178290][T20081] @ÿ: renamed from bond_slave_0 [ 414.429344][T20091] device syzkaller0 entered promiscuous mode [ 414.810168][T20094] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.902379][T20094] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.914253][T20094] device bridge_slave_0 entered promiscuous mode [ 414.921657][T20094] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.929281][T20094] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.936875][T20094] device bridge_slave_1 entered promiscuous mode [ 415.105971][T20094] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.113048][T20094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 415.120337][T20094] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.127364][T20094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 415.275550][T17489] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.285059][T17489] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.541031][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 415.559325][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 415.654567][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 415.663253][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 415.672125][T17489] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.679194][T17489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 415.687500][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 415.695899][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 415.704178][T17489] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.711222][T17489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 415.787927][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 415.797736][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 415.895382][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 415.906938][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 415.928842][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 416.003100][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 416.054800][T20094] device veth0_vlan entered promiscuous mode [ 416.068260][T20156] device syzkaller0 entered promiscuous mode [ 416.118542][T20156] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 416.195155][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 416.205408][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 416.260413][T20094] device veth1_macvtap entered promiscuous mode [ 416.311659][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 416.342183][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 416.404479][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 416.434821][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 416.463566][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 416.527746][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 416.538276][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 416.605137][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 416.671781][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 417.147712][T20202] tap0: tun_chr_ioctl cmd 1074025677 [ 417.156341][T20202] tap0: linktype set to 769 [ 418.276250][T20242] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 418.304544][T20242] device syzkaller0 entered promiscuous mode [ 418.373744][T20248] erspan0: refused to change device tx_queue_len [ 418.399441][T20249] erspan0: refused to change device tx_queue_len [ 418.759615][T20262] device syzkaller0 entered promiscuous mode [ 418.825998][T20263] device syzkaller0 entered promiscuous mode [ 419.976422][T20368] device syzkaller0 entered promiscuous mode [ 420.353890][T20382] device syzkaller0 entered promiscuous mode [ 420.879246][T20423] device syzkaller0 entered promiscuous mode [ 421.203661][T20462] @ÿ: renamed from bond_slave_0 [ 421.346811][T20473] syz.1.5736[20473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.346863][T20473] syz.1.5736[20473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.542219][T20488] device syzkaller0 entered promiscuous mode [ 422.389085][T20534] device syzkaller0 entered promiscuous mode [ 422.902805][T20538] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.944753][T20538] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.952300][T20538] device bridge_slave_0 entered promiscuous mode [ 423.070413][T20538] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.078834][T20538] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.088521][T20538] device bridge_slave_1 entered promiscuous mode [ 423.875723][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 423.896745][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 423.930232][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 423.946255][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 423.961114][T17489] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.968209][T17489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.054457][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 424.062939][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 424.071179][T17489] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.078275][T17489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.086099][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 424.094225][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 424.102544][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 424.110759][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 424.153673][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 424.244170][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 424.260809][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 424.285190][T17489] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 424.326714][T20578] device wg2 entered promiscuous mode [ 424.410568][T20538] device veth0_vlan entered promiscuous mode [ 424.470067][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 424.481564][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 424.530908][T20538] device veth1_macvtap entered promiscuous mode [ 424.554612][T20588] syzkaller0: refused to change device tx_queue_len [ 424.595612][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 424.620224][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 424.646137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 424.697153][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 424.715708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 424.795350][ T342] device veth1_macvtap left promiscuous mode [ 426.864564][T20715] -1: renamed from syzkaller0 [ 426.949169][T20717] device syzkaller0 entered promiscuous mode [ 427.105204][T20722] device syzkaller0 entered promiscuous mode [ 427.421794][T20731] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.437703][T20731] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.694994][T20750] device bridge_slave_1 left promiscuous mode [ 427.706094][T20750] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.718959][T20750] device bridge_slave_0 left promiscuous mode [ 427.729585][T20750] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.808662][T20758] device syzkaller0 entered promiscuous mode [ 428.747100][T20831] device syzkaller0 entered promiscuous mode [ 428.916858][T20834] device syzkaller0 entered promiscuous mode [ 428.931199][T20843] tap0: tun_chr_ioctl cmd 35108 [ 429.710076][T20866] @ÿ: renamed from bond_slave_0 [ 429.986719][T20871] device lo entered promiscuous mode [ 431.493816][T20917] syz.4.5864[20917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 431.493872][T20917] syz.4.5864[20917] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.349627][T20953] syz.3.5876[20953] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.987649][T20987] device veth0_vlan left promiscuous mode [ 433.061327][T20987] device veth0_vlan entered promiscuous mode [ 433.100379][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 433.115326][ T342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 433.128826][T20990] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.136046][T20990] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.143526][T20990] device bridge_slave_0 entered promiscuous mode [ 433.160988][T20990] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.168129][T20990] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.175746][T20990] device bridge_slave_1 entered promiscuous mode [ 433.318550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 433.327390][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 433.386490][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 433.396054][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 433.413506][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.420599][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.445158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 433.456817][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 433.466593][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.473640][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.482332][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 433.490970][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 433.558398][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 433.566935][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 433.575075][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 433.582558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 433.591496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 433.757860][T20990] device veth0_vlan entered promiscuous mode [ 433.788679][T20990] device veth1_macvtap entered promiscuous mode [ 433.803825][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 433.842859][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 433.852525][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 433.862825][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 433.881755][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 436.293095][T21105] device syzkaller0 entered promiscuous mode [ 436.926304][T17489] bridge0: port 3(gretap0) entered disabled state [ 436.946852][T17489] device gretap0 left promiscuous mode [ 436.952335][T17489] bridge0: port 3(gretap0) entered disabled state [ 437.827955][T17489] device bridge_slave_1 left promiscuous mode [ 437.834126][T17489] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.895718][T17489] device bridge_slave_0 left promiscuous mode [ 437.922165][T17489] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.951579][T17489] device veth0_vlan left promiscuous mode [ 439.469647][T21189] device syzkaller0 entered promiscuous mode [ 439.505327][T21189] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 440.389770][T21246] tap0: tun_chr_ioctl cmd 1074812118 [ 441.252048][T21287] device sit0 left promiscuous mode [ 441.545104][T21288] device syzkaller0 entered promiscuous mode [ 441.571330][T21301] device syzkaller0 entered promiscuous mode [ 441.673497][T21313] ³þ: renamed from bond_slave_0 [ 442.994998][T21367] â6±ÿ: renamed from team_slave_1 [ 443.064961][T21374] device syzkaller0 entered promiscuous mode [ 445.791440][T21453] device wg2 entered promiscuous mode [ 446.127385][T21467] device syzkaller0 entered promiscuous mode [ 447.685156][T21512] device syzkaller0 entered promiscuous mode [ 448.670519][T21558] device syzkaller0 entered promiscuous mode [ 449.176116][T21572] ------------[ cut here ]------------ [ 449.253695][T21572] kernel BUG at kernel/bpf/arraymap.c:993! [ 449.325328][T21572] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 449.331429][T21572] CPU: 0 PID: 21572 Comm: syz.4.6052 Tainted: G W syzkaller #0 [ 449.340263][T21572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 449.350414][T21572] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 449.356643][T21572] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 449.376249][T21572] RSP: 0018:ffffc90000b67c88 EFLAGS: 00010293 [ 449.382307][T21572] RAX: ffffffff817b4f8b RBX: ffff8881182914d0 RCX: ffff888127a08000 [ 449.390269][T21572] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 449.398230][T21572] RBP: ffffc90000b67d08 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 449.406192][T21572] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 449.414158][T21572] R13: ffff888112e87a80 R14: 0000000000000001 R15: ffff888112e87a00 [ 449.422129][T21572] FS: 00007efc3895b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 449.431044][T21572] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 449.437616][T21572] CR2: 00007ffc5f04fc40 CR3: 0000000134990000 CR4: 00000000003506b0 [ 449.445579][T21572] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000200000000300 [ 449.453539][T21572] DR3: 0000200000000300 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 449.461491][T21572] Call Trace: [ 449.464772][T21572] ? bpf_prog_178c55262a54958c+0xb/0x37c [ 449.470394][T21572] fd_array_map_delete_elem+0x14c/0x250 [ 449.475996][T21572] map_delete_elem+0x336/0x510 [ 449.480752][T21572] __se_sys_bpf+0x40b/0x740 [ 449.485248][T21572] ? __x64_sys_bpf+0x90/0x90 [ 449.489877][T21572] ? __kasan_check_read+0x11/0x20 [ 449.494891][T21572] __x64_sys_bpf+0x7b/0x90 [ 449.499419][T21572] do_syscall_64+0x31/0x40 [ 449.503879][T21572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 449.509763][T21572] RIP: 0033:0x7efc39f00819 [ 449.514172][T21572] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 449.533763][T21572] RSP: 002b:00007efc3895b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 449.542258][T21572] RAX: ffffffffffffffda RBX: 00007efc3a179fa0 RCX: 00007efc39f00819 [ 449.550216][T21572] RDX: 0000000000000020 RSI: 00002000000007c0 RDI: 0000000000000003 [ 449.558178][T21572] RBP: 00007efc39f96c91 R08: 0000000000000000 R09: 0000000000000000 [ 449.566134][T21572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 449.574125][T21572] R13: 00007efc3a17a038 R14: 00007efc3a179fa0 R15: 00007fffae1861b8 [ 449.582151][T21572] Modules linked in: [ 449.605344][T21572] ---[ end trace eebb40c6e5757e70 ]--- [ 449.610984][T21572] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 449.617292][T21572] Code: 63 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 d8 63 e9 ff 0f 0b e9 78 f9 ff ff e8 cc 63 e9 ff 0f 0b e8 c5 63 e9 ff <0f> 0b e8 be 63 e9 ff 0f 0b e8 b7 63 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 449.689772][T21572] RSP: 0018:ffffc90000b67c88 EFLAGS: 00010293 [ 449.695999][T21572] RAX: ffffffff817b4f8b RBX: ffff8881182914d0 RCX: ffff888127a08000 [ 449.706817][T21572] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 449.715012][T21572] RBP: ffffc90000b67d08 R08: ffffffff864ea647 R09: 1ffffffff0c9d4c8 [ 449.723048][T21572] R10: dffffc0000000000 R11: fffffbfff0c9d4c9 R12: 00000000fffffff0 [ 449.731292][T21572] R13: ffff888112e87a80 R14: 0000000000000001 R15: ffff888112e87a00 [ 449.739753][T21572] FS: 00007efc3895b6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 449.757346][T21572] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 449.777652][T21572] CR2: 0000000000000000 CR3: 0000000134990000 CR4: 00000000003506a0 [ 449.795090][T21572] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 449.803125][T21572] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 449.813269][T21572] Kernel panic - not syncing: Fatal exception [ 449.819639][T21572] Kernel Offset: disabled [ 449.823950][T21572] Rebooting in 86400 seconds..