last executing test programs: 10.275147175s ago: executing program 2 (id=9806): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x7fe2, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r4, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r4, &(0x7f0000000080)="cf42b14ddd273c0a7aea66b81d461a052633598b98cd4adb61f74df1c81e1bbf02bafd3be8f9d7bda863004d1d78da6bd8b127346eb5dbf3305385e7fa7277ad0086a68d642ea000b0ed17ab70766c7304", &(0x7f0000000100)=""/227}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x35}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8, 0x9, 0x0, 0x3500}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 8.547940685s ago: executing program 3 (id=9902): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async, rerun: 64) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002300)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x3f, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x48) (async, rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)) (async, rerun: 64) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x31}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) (async, rerun: 64) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (async, rerun: 64) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001a80)={r2, 0x39, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0xf, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x107a654, 0x0, 0x0, 0x0, 0x1}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000b4a8b1541206000000e9c79077fa15ba36eca61299de54cf77c9062430bc068829afff36b31fa7e35ce95d04"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000005000000fd0900008500000041000000", @ANYRES32, @ANYBLOB="feffffff000002d2aa7eacdc8d3a000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000180), 0x800, r4}, 0x38) 8.395135494s ago: executing program 2 (id=9806): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x7fe2, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r4, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r4, &(0x7f0000000080)="cf42b14ddd273c0a7aea66b81d461a052633598b98cd4adb61f74df1c81e1bbf02bafd3be8f9d7bda863004d1d78da6bd8b127346eb5dbf3305385e7fa7277ad0086a68d642ea000b0ed17ab70766c7304", &(0x7f0000000100)=""/227}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x35}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8, 0x9, 0x0, 0x3500}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.627069046s ago: executing program 3 (id=9911): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000640000006400000003000000070000000000000c0300000001000000020000130500000007000000090000000800000001000000f9ffffffffffffff080000000000000e04f0ffff0f0000000000001204000000000000"], &(0x7f0000000380)=""/4096, 0x7f, 0x1000, 0x1, 0x80000000}, 0x28) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB='1-2:5/', @ANYRESDEC], 0x31) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x100, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f00000005c0), 0x2, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f0000000340), 0x2, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = gettid() syz_open_procfs$namespace(r5, &(0x7f0000000180)='ns/pid\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r7}, &(0x7f0000000040), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r6, &(0x7f0000000440)="87acc76f9cb7013874a92f40a2788cea83c4d13f606f88d69bb2ce5c06b0f89949e8ca675df31d30281f3a75b22017ae96348fb70395bd6314358a70ee44d28747f488b0ca257c7f53d479f674cb63b4768bb7b09b2df747d5c1998a5905ad6c35c47f2a8f53d9b6d63cc40274189189cee20d62cf09352217ef", 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0xc, &(0x7f00000000c0), 0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x15, &(0x7f0000000580)=ANY=[@ANYBLOB="18000011ff00", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000d433e0ff00000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x2, 0x42, &(0x7f0000000280)=""/66, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x0, 0xb, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f00000006c0)=[{0x1, 0x1, 0x9}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x10000}, 0x94) 6.56859811s ago: executing program 4 (id=9915): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x2, 0x3, 0x26, 0x0, 0x100, 0x220, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0xd}, 0x10, 0x36c2, 0x6, 0x0, 0x80, 0xdf3, 0x5, 0x0, 0x0, 0x0, 0x1}, r1, 0xb, r0, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000180)=r3, 0x4) sendmsg$inet(r5, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='GPL\x00') perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, @perf_config_ext, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0xc, &(0x7f0000001180)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{}, &(0x7f00000003c0), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid_for_children\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000002c0)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0), 0xfffffdef) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r9 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r8}, 0x8) ioctl$SIOCSIFHWADDR(r9, 0x541b, &(0x7f0000000180)={'veth0_virt_wifi\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.508687893s ago: executing program 1 (id=9918): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x43b00000, 0x0, 0x5b, 0x0, 0x0, 0x0) (async) r3 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000380), 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 6.485191085s ago: executing program 2 (id=9806): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x7fe2, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r4, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r4, &(0x7f0000000080)="cf42b14ddd273c0a7aea66b81d461a052633598b98cd4adb61f74df1c81e1bbf02bafd3be8f9d7bda863004d1d78da6bd8b127346eb5dbf3305385e7fa7277ad0086a68d642ea000b0ed17ab70766c7304", &(0x7f0000000100)=""/227}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x35}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8, 0x9, 0x0, 0x3500}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.578517535s ago: executing program 0 (id=9919): bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0xe, 0x0, 0x0, 0x7602, 0x0, 0x140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x7602, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x30084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x2, @perf_config_ext={0x0, 0x1}, 0x10, 0x1, 0x0, 0xb, 0x7, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 4.578080405s ago: executing program 1 (id=9920): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x94) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xd, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) socketpair(0x2a, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r3, r4}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r4, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000005c0)={0x0, 0xba, 0x10}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r4, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%pI4 \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x10, &(0x7f00000002c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x827}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@jmp={0x5, 0x1, 0x2, 0x7, 0x1, 0x18, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0xdc, &(0x7f0000000380)=""/220, 0x41000, 0xc, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0xa, 0xe, 0x1}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000006c0)=[r4, r4, r4, r4, r4, r4, r5, r7, r8], &(0x7f0000000700)=[{0x2, 0x2, 0x2, 0xa}, {0x0, 0x5, 0x2, 0xb}, {0x5, 0x5, 0xd, 0xb}], 0x10, 0x949}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x1, 0x0, r2, 0x6, '\x00', r6, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x50) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 4.576876625s ago: executing program 3 (id=9921): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000009c0), 0xc0802, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000a00)={'nr0\x00', 0x20}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000140)={'bond_slave_1\x00', @local}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x13, 0x13, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000700000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0x0, 0x10, 0xfffffef3, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x5562, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000280)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000002000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x40, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x7}, 0x481a, 0x0, 0x0, 0x7, 0x0, 0x0, 0xf792, 0x0, 0xffffffff, 0x0, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r6, &(0x7f00000004c0)=ANY=[], 0xfdef) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000640)=0x1) close(r1) 4.576586695s ago: executing program 4 (id=9922): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00 \x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="7a0a00ff0000000071104e0000000000950d00000000000000800ce4fec932d6326d33527587032d2d4ea9da80a0828332f52f4b295f9217389b80b3eba35e48036857ab32eed3ee4a9fbdd6ebcf7aac9d4324c946da0d69237cee916f2937287b2ae776dac4ebc213ccd1cb12f2fe2679abc44f3a88452392b163654664aab9b36c67796b340bb8dcf98e9acd39ae64369faee1d461e9a11cdba9148b3914a401e0c1bcdb22bab237bdfa0f08bb661745e1101f276cd8bdef3ea8d7744eb8a27f9a22026972266e63084d415a832cc0e9f4174c89d9b2e1fd33025cb5b26350c2da96a29f4e"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) syz_clone(0x4080b000, 0x0, 0x0, &(0x7f0000000e40), 0x0, 0x0) 4.424068204s ago: executing program 2 (id=9806): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x7fe2, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r4, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r4, &(0x7f0000000080)="cf42b14ddd273c0a7aea66b81d461a052633598b98cd4adb61f74df1c81e1bbf02bafd3be8f9d7bda863004d1d78da6bd8b127346eb5dbf3305385e7fa7277ad0086a68d642ea000b0ed17ab70766c7304", &(0x7f0000000100)=""/227}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x35}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8, 0x9, 0x0, 0x3500}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.486638786s ago: executing program 0 (id=9923): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)="5a1fb117c0e6ea9b53ba534181f20462749b397a2a4150e1fd8ece8f8dc5871709c7571dd88a7b22ece675398c29b00127404315b69b273170ff127e6903e1c8ebcaaf"}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000180)={'pim6reg\x00'}) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000001c0)={'b', ' *:* ', 'rm\x00'}, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb9, &(0x7f00000002c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x28, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x3, 0x7, 0xf, 0x21010, r1, 0x10001, '\x00', r2, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0xf}, 0x50) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@ptr={0x5, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x30, 0x61, 0x2e, 0x0, 0x30, 0x0]}}, &(0x7f00000007c0)=""/190, 0x2c, 0xbe, 0x1, 0x4, 0x10000, @value=r0}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xf, 0x1a, &(0x7f0000000580)=@raw=[@map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xfffffffc}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0xa, 0x1, 0x0, r4}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}], &(0x7f0000000680)='GPL\x00', 0x7ff, 0xaa, &(0x7f00000006c0)=""/170, 0x40f00, 0x0, '\x00', 0x0, @cgroup_device=0x6, r5, 0x8, &(0x7f00000008c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000900)={0x0, 0x10, 0xa4f, 0x6}, 0x10, r3, 0xffffffffffffffff, 0x4, &(0x7f0000000940)=[r4, 0x1, r4, r4], &(0x7f0000000980)=[{0x1, 0x5, 0xf, 0xc}, {0x0, 0x5, 0x7, 0xb}, {0x3, 0x4, 0x0, 0x8}, {0x2, 0x3, 0x0, 0x5}]}, 0x94) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f0000000a80)=0x8) socketpair(0x1e, 0x3, 0x7, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000b00)) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001d00)={0x6, 0x15, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x40}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ldst={0x2, 0x1, 0x1, 0xb, 0x3, 0x40, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x63b8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, &(0x7f0000000c00)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000c40)=""/4096, 0x41100, 0x4, '\x00', r2, 0x25, r5, 0x8, &(0x7f0000001c40)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001c80)={0x2, 0xa, 0xff, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001cc0)=[r4], 0x0, 0x10, 0xffff8001}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000001fc0)={r8, 0x0, 0xcc, 0x0, &(0x7f0000001dc0)="084cde58ddcf7b9b797175ef4a825eb8f8ff959e7c83efcc3b0c8933ba5d09bf899f288e5ece437fa2a5e51b994f06d7dafdb0947865f0426e4441aba1a76f53764da74f54808c5653b763fa251de2de0895cfb1ee085bab009fd2a7bcf3d80969987d72be9faec61f5de89320f3029eee72d1a888f5e3b63efa7542e1d695b6418a44d5f67d1a82dd466f68c05bf8935e7aa424f95dafb14e593a88db4f655f6fc2413d87e952b6c6f53bf797d93dfb19103e04137965648d025df927a0a494fa1167063d619ccf42452981", 0x0, 0x6, 0x0, 0xef, 0x0, &(0x7f0000001ec0)="9c270421f3e60bca3b9e142f5a600f95ab5e13024fd4715f5b557fef449a8a8d6d0be69dfd6d450b37ab31a502eeadc00058cd0685a1171d668b503de20757490a0aeb71175bb8f93fbd972eca6fff88d5a3b640c3a229a33aea699a31d203b14b7392f33dccbe108b1fa14a4caa44cd9752985d99b459c1c7da179aac4c3558edb3acce2754a41516b87f5a12129640e8f221994e727a283606db579531d5a98305a7142d6157a053140b4fccbb801e81714b7d0ce6575fa59f7fddb815ba53055415068b3be1696df2f5500636b4ab56190796c846d639de5a57731e464eaaead6b7b2341ea4daeaf97fcae975cb", 0x0, 0x2, 0x0, 0xa}, 0x50) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000002040)=0x3) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000002080)={'batadv_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000020c0)={'veth1_macvtap\x00'}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000002100)={'netdevsim0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3f}}) r9 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000002140), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000002180)={r9, r6, 0x0, r6}, 0x10) sendmsg$inet(r7, &(0x7f0000002580)={&(0x7f00000021c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000002480)=[{&(0x7f0000002200)="940f9be0355a6407524827b7d246723aa31ae229ca6c1597e6628deb512803014d0ed35305bd0aa786e16c5a429fdc8f8ad4d4589c0565995e75b29668187df5d13260ddb6c3c1698a847dd1910637fbdefc1db95c4673ab3882dfb3ada62bdb8621f2ad50a517523421ffba1634b761a0298910df44836a12564aa404b7ddf4a1a95c4ab01ad7c428e8866a7c1e96401518ba51f7a1526808a969514cac578866017feae866ccbb0b18b3debf1c2da7bc7d92be96180de0fd93b39d371c957969c2e19e7c7b94e9faa9b57d61ae7df4119797daf3d264e064f6a686bc5da8f7378c", 0xe2}, {&(0x7f0000002300)="8f33d0e2f31d40d3e2509ba0884fecfa413597212e46a200920a50f7c8e1a6529a7cd872aca590fefe37974b2f", 0x2d}, {&(0x7f0000002340)="e7a5d7994585f376e2d292dcee678c6e9703672f44fb414412efde19e7bb1f885dabbd545508c0ff58b5940ee4e7e6eedcee58bbf8c32511904f84d128c792b26047c7109fb1df28315a4b072dc9d9397bc8e5f6b58fc60b0d4bca5b64d90768a4aa6b673bac3b9c7fa1a957f030bfc58a9b9d72a81f907a3d95374c15c7a3995b05ad7bda1da50e570890bfe0022f1d19e4f0917d5d9a39465de3c5d2c8e02c441dd338e8e7782d61615e9d6ee1321d08cdb578533d30f2516ed97644b1b938b9ba2aba9e30981c0aea59b4497efa284861a8e5273ff5e31e2305e32763807eab39aeb4", 0xe4}, {&(0x7f0000002440)="ec986c7a1205cd795eb33ba757d85b98", 0x10}], 0x4, &(0x7f00000024c0)=[@ip_retopts={{0x88, 0x0, 0x7, {[@cipso={0x86, 0x3c, 0x3, [{0x2, 0x8, "8fdfea8b9786"}, {0x2, 0x11, "d765c3e8b910a66e36bfe5abf000cd"}, {0x7, 0xf, "fe8bb34a159367eb9b9da18b93"}, {0x0, 0x8, "23985a3aa9cd"}, {0x0, 0x4, "936d"}, {0x4, 0x2}]}, @timestamp={0x44, 0x10, 0xa1, 0x0, 0x8, [0x9a, 0x7, 0x1ab]}, @timestamp={0x44, 0x2c, 0xb3, 0x0, 0x2, [0x200, 0x36c, 0x8, 0x3, 0xfc4, 0x3, 0x80000000, 0x9, 0x4, 0x3]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xa2}}], 0xb8}, 0x8091) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000027c0)={0x11, 0x4, &(0x7f00000025c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000002600)='GPL\x00', 0x2, 0x92, &(0x7f0000002640)=""/146, 0x40f00, 0x49, '\x00', r2, 0x0, r5, 0x8, &(0x7f0000002700)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000002740)={0x4, 0x3, 0xbdbac559, 0x100}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f0000002780)=[{0x2, 0x3, 0x8, 0x3}, {0x3, 0x2, 0x9, 0x1}, {0x4, 0x6, 0xb, 0x1}, {0x4, 0x4, 0x6, 0x3}], 0x10, 0x704}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002b40)={0x18, 0x2, &(0x7f0000002880)=@raw=[@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x83}], &(0x7f00000028c0)='syzkaller\x00', 0x6, 0xe9, &(0x7f0000002900)=""/233, 0x0, 0x52, '\x00', r2, 0x0, r5, 0x8, &(0x7f0000002a00)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000002a40)={0x4, 0xe, 0x1, 0xfffffffc}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000002a80)=[r1], &(0x7f0000002ac0)=[{0x5, 0x3, 0x9, 0x7}, {0x0, 0x2, 0x10, 0x7}, {0x3, 0x2, 0xc, 0x4}, {0x2, 0x3, 0x3, 0xb}, {0x4, 0x1, 0x0, 0x8}], 0x10, 0x7}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000002c00), 0x60040, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002c40)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_int(r10, &(0x7f0000002c80)='cpuset.mem_hardwall\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000002cc0), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000002d00), 0x1000, 0x0) 2.486237306s ago: executing program 1 (id=9924): sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xc, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xc, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e000000040000000400000001"], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e000000040000000400000001"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x62a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid_for_children\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.stat\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000791200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (async) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f0000001380), &(0x7f0000000000)=""/10, 0x2}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 2.478943246s ago: executing program 3 (id=9925): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESHEX=r0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.478339326s ago: executing program 4 (id=9926): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x14, 0x0, 0x0, &(0x7f0000001d80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x40000001, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{}, {0x27}}, [@printk={@p, {}, {0x5, 0x1, 0xb, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x40007}, {0x56}}], {{0x4, 0x1, 0x2, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000001000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001740)=[{&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000180)=""/52, 0x34}, {&(0x7f0000000440)=""/240, 0xf0}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/48, 0x30}, {&(0x7f0000001580)=""/164, 0xa4}, {&(0x7f0000001640)=""/232, 0xe8}], 0x7, &(0x7f00000017c0)=""/45, 0x2d}, 0x21) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x9, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0x3b}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0xfc, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x8b001, 0x0, 0xfffffffd, 0x6, 0x1ff, 0x0, 0x3, 0x0, 0xfffffffe, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0xa) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1) (async) sendmsg$inet(r3, &(0x7f0000001d40)={&(0x7f0000001840)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000001c80)=[{&(0x7f0000001880)="047a084ea6eae2d0cb6951e0bf0a59753b081bfc", 0x14}, {&(0x7f00000018c0)="24114fa7aab59472370cae41ef87fed5418ba24433ec0769dc13c627b9b60da707969e8d4740f37761b83cb52b5ca6161a1f0b264b559a28d6a9b537c1203d77d1c59f3e481993030c01bee90ac16c208e58af7292701eecb239bd25b6802ded20096cbdde0eaea5c261fe457d264b9b039109802b5d81ac8f80f8afddacfd4720204a282828d6b55f", 0x89}, {&(0x7f0000001980)="483b57bcdfc38ff608f4367456d2cdc6474808", 0x13}, {&(0x7f00000019c0)="8df69300c0a953f02d1ad0e016dd904fb9777b1e4346d1b1ec4513597881", 0x1e}, {&(0x7f0000001a00)="c548773df480e237e5f5fbda0cd01c568877a403f0f32e0cdd844ac3af01cf313785a85c7630087b4424d3c3b57f8471eba190b7e49c64c069099abbec2423adcc8cf5ce9cdb4c0e627e88a417a9957e7593c1c37385d148a9fbda3d5258cda38e0cd7fdf53574a696d56262cdc68becc807b844d71e39b58b374a8b3249342ea6dec020a9a92ecb6cafad6eabc9a5d3d5f4550e3a7a21387f2f947e1029c47a1c95e48ad03b4e3dbd3b4d2aaac4d1b9c0683afc4191c39c733492e1fae3a233c9019d90c9caf14f5fb8ffba596b302a69095064a34d98fa641b4e46c26e88d3f84e61bd3922a9586edfd28c276e42ec0b", 0xf1}, {&(0x7f0000001b00)="1ae7e3d475328bef93343ec968d6b814c2531a13b513769ae546d393db47087af6b37840526579eb377341e87e257c642febb798b0e4dea780fc93f861bd0250921370b17225022d7fb9ee7edffa", 0x4e}, {&(0x7f0000001b80)="7f05ea33243eeb16dc20736a2eca26ae8c7ff9974a70d09a45a6eb100ed5f8058ca09a256fdfc6659eaa76b278f3c75d368856ad9564aca856e1c1efcd92a758dc98420331222c5bfdb2860e65e91995e4b149c8e07c3793bc184d7e8b89c84547296227", 0x64}, {&(0x7f0000001c00)="bf9bcb08ad089c4d66e30175f77348f53141625e01005bb15eface79c7cfdba9fb19eec87e1e9cc5667280291080f6768b1f0b6f72839c5370a50c810426876fd41b1efa66686d4d6f73e0ce0fee0cbfad30daffcb1aa776107be529529b7e27f3253dbff4c55865a4", 0x69}], 0x8, &(0x7f0000001d00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x18}, 0x30040045) 2.450952088s ago: executing program 0 (id=9927): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) (async) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) (async, rerun: 32) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x143842, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000180)=r3) r4 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000300)='@\'{-!:&.^\x00') (async, rerun: 64) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='!=[\\\\}#\x00') ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r5) (async) r7 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r7, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f00000002c0), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x97, &(0x7f0000000380)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xd, 0x4}, 0x50) (async, rerun: 64) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async, rerun: 64) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async, rerun: 32) write$cgroup_devices(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1e03d3ffbc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) (async, rerun: 32) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x9, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) 2.408140201s ago: executing program 3 (id=9928): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa105000000000000000000f8ffffffb702000008000000b7030000000000008500000006000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8901, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.406093431s ago: executing program 4 (id=9929): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0900000006000000e27f00000200000000002000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000980)=ANY=[], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x19, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000007000000000000000700000085200000030000008520000001000003852000000400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000700000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000180000000300000000000000050000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x80, 0xdf, &(0x7f0000000300)=""/223, 0x41100, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0x10, 0xcb, 0x2}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000440)=[0xffffffffffffffff, r0], &(0x7f0000000480)=[{0x3, 0x4, 0x7, 0x9}, {0x5, 0x3, 0x2, 0x6}, {0x4, 0x4, 0x2, 0x6}, {0x5, 0x4, 0x8, 0xa}, {0x1, 0x2, 0x10, 0x2}, {0x3, 0x2, 0xa, 0x8}], 0x10, 0xfffffff9}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001580)={r3, 0x58, &(0x7f0000001500)}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x12, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000010000000000000000000000711815000000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x3, {0x4e22}}, 0x10, 0x0}, 0x0) r5 = gettid() r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000063868a0c2a68b1963bca5a80711664a76f40f6c8fd1af107f60179b8e9b3ddc0ea901ff42916eb8e3c5e8cf5eb3a1fce22f08bfa418fea1a5af0020f3fcf604b5f550b035da6ebbe1aa94eb5bc3f6c6e6ed3354acfc344959228fe557fd38536cf667e2a24307dc5d1384352a4e3487c8dfeb128a800cabcc5e00d7cae1edc7534884dee1fffeab25164c59fc0d9b2d0c430128b20c8b7c7430965b3063ac260abbc0e800"/194, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f00000001c0)={&(0x7f0000000500)=@abs={0x1, 0x2f}, 0x6e, 0x0}, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x32120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x3870, 0x9, 0x400, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}, r5, 0xffffffffffffffff, r1, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r10, &(0x7f0000000600)={&(0x7f00000002c0), 0x6e, &(0x7f0000000340)=[{&(0x7f0000000000)=""/35, 0x23}], 0x1, &(0x7f0000000580)=[@rights={{0x10}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}, 0x80012021) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) 2.397305771s ago: executing program 1 (id=9930): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0xf7, 0x9, 0x4, 0x3, 0x0, 0x3, 0x4228, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x212, 0x1, @perf_config_ext={0x0, 0xff}, 0x2, 0x8, 0xa638, 0x8, 0x9, 0x80000001, 0xa, 0x0, 0x1, 0x0, 0xfff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0xfc, 0x1f, 0x8f, 0x8, 0x0, 0x9, 0x80080, 0x6, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000140), 0xb}, 0x402, 0x9, 0x6, 0x9, 0x2, 0x4, 0x9, 0x0, 0xfffffff6, 0x0, 0x9}, r0, 0x9, 0xffffffffffffffff, 0x1) write$cgroup_devices(r0, &(0x7f0000000200)={'b', ' *:* ', 'rw\x00'}, 0x9) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x4700, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000300)={0x1, 0x80, 0x9, 0x2, 0x6, 0x9, 0x0, 0x100000001, 0x2, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xcbf4, 0x2, @perf_bp={&(0x7f00000002c0), 0x2}, 0x80, 0x8, 0x48, 0x0, 0x0, 0x77, 0x2, 0x0, 0x5, 0x0, 0xb449}) socketpair(0x2b, 0x5, 0xc, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000400)={0x5, 0x80, 0x7f, 0x3, 0x4, 0x40, 0x0, 0x800, 0x32024, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8f, 0x4, @perf_bp={&(0x7f00000003c0), 0x8}, 0x1, 0xc, 0x3, 0x0, 0x7f, 0x126f72fb, 0x4, 0x0, 0x5, 0x0, 0x89}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x34680775) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000004c0)={0x4, 0x80, 0xe, 0x6, 0x9, 0x3, 0x0, 0x8000000000000001, 0x880, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000480), 0x4}, 0x100080, 0x504, 0x5, 0x2, 0x6, 0x6, 0xde, 0x0, 0xfffffbcb, 0x0, 0x2b5}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r0, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x5, '\x00', r5, 0xffffffffffffffff, 0x1, 0x3, 0x1}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000007c0)={r6, &(0x7f0000000680)="dbdb724e70dae67c33c7ce62fd9a82f8a79c6c52eba5ca88c50a2940a359dd27408edeb2844fa72cab9b9263a8ecec1935d46f5fd9e0accc6b98a0506af070d0f1af2fbb43b2a314c1d536bc5d3c6498b4c91301711ff9f25201a61d306b81c02504dea3f3c6322e3da5d63685bf3ad20c5d0e8866b90bbf8119a58d81aa203152b08ac9b48fa919239180d9d2e4fd4b0a5def85352b38a25e9122f0544791039c67e43af4a9bfc2ec01fb5e69d4eb76391edd716a9a19d9702494e40b36921c24d8357c5f010d4eecf9117c1dbf53e1d19286e8219daa7a9bd32287219ba9590196", &(0x7f0000000780)=""/55, 0x4}, 0x20) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000800)={r0}, 0x8) ioctl$TUNSETSNDBUF(r7, 0x400454d4, &(0x7f0000000840)=0x9) sendmsg$inet(r4, &(0x7f0000000d40)={&(0x7f0000000880)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000000c80)=[{&(0x7f00000008c0)="de143eff6f1797e8b6014ebdfce327501f663d7ce59f9c1b09b4c61c7bcc93f6f22513fef25716588eedef9d24f6e590bca5855c284ee3f35f18f5124867f98a7fe9a6669cfed044447301099da81809f35eec37006f2c3e8e5f3fcb1092ca53ef94ba3aa3613090cfdc1e313238636d8c9ae8faedcfd8643b8edb53c47367b5d21d6b32b7886cf2d4a286f8e01266840a31c408fc0022b5ed07f662f9099b4a944a5af6b55fca90609b5a3ca7e8a12492d6df584ee2fe540136ef6a167055abfbf53be489ddb317dbae2be1f4", 0xcd}, {&(0x7f00000009c0)="8be50f7eec24442f4f98fddd0d5db08e6ffecf986ffae9b4127dc702e332e2c13e2ee90d0a446e57b3edbe9ccaf2ca827ca0e9d2413136651f64b8a7bf4d34a6db43027ea3e72bd815add893a0007425ed32bcf7fca88633234569f9a93439cfe5d4328fca78aacf7ef93858009efac76b9818d4cd03345f2627e65810e3eaf2311c56f95241c9580a4e9c41adf7863f4a813c9fbc4f1658ea2af2a274fd7fe388c4031914840efcfc677d6e9b22a8345e3bc9a43ea073ed2610c597b001d8ff6a9b", 0xc2}, {&(0x7f0000000ac0)="d7825f44d549a3284b9426a90e0f68fcc33251f292dd2ce7b9436e57f158e25d6e6b8a127941e7bd5108d2764361a80cdd8c187893b7c93cfb6ea1b558e4c119b41655756dd11c363cd0705ef2c9497396e4071b51945b46e14826c88ddc41030a14c3253712ac0e19c5fee61764666d0b51bd43acff3bb98a45ab530f27d2f3dedcb101f38640c95bf78ea871db72b6633beebc851d647541acea41becfe92cb52622", 0xa3}, {&(0x7f0000000b80)="afdf24e84baf224603995d37017e4e13fb686d24d9d1e9a15e6ff75defc9148edc170cb0c8066f1bc510e92a7f5a580b9925d547a5a587fe223f586a200cb0466d6e07f371099bc2f5702adc9ceaeb05a26480b265dae498f2f32193d2061c230effa98b57e91001cd6b741bc6d245dfe64c4055878496460fd72802c0b1315eeebeb10c3302112cfc448dff3a6730aa732021bf946c5f3d4f78e542c8a754e77c3ca3b040be218a9b4985a6eaf8fb65b12f9cc0dba122fbc64a954bd10e12b38d64e22cdc70228391a1ce9b745f7f73ba94af3d58d5c56fb2496b6053f4331715ac0f3540a08ef3b1b0a7f6b8602cd47b80361d8273", 0xf6}], 0x4, &(0x7f0000000cc0)=[@ip_tos_u8={{0x11}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xba}}, @ip_ttl={{0x14, 0x0, 0x2, 0x800}}], 0x48}, 0x40) openat$cgroup_subtree(r0, &(0x7f0000000d80), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000dc0)='cgroup.subtree_control\x00') r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e00), 0x400140, 0x0) ioctl$TUNGETSNDBUF(r8, 0x800454d3, &(0x7f0000000e40)) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000e80)={'erspan0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x10}}) syz_clone(0x20000000, &(0x7f0000000ec0)="80bafaed7433f1e99cbd733f09530e34cc26156e878cded27f9f09c136025fee81edeba4d3d2eb3e", 0x28, &(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)="4080528afba2e49f4595c8561ecf36047cf0ebd368d86ceb977d14a31adbef8e2d72cbe5ebbf429e8efdc3") ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000001000)={0x5, &(0x7f0000000fc0)=[{0x6, 0x2, 0x81, 0xffffffff}, {0x6, 0x7, 0xe, 0xc257}, {0x4, 0x8, 0xf, 0x1}, {0x9, 0xbc, 0x9, 0xa4d}, {0x4, 0xff, 0xb, 0x1}]}) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001280)={&(0x7f00000011c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0xb, [@float={0x4, 0x0, 0x0, 0x10, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x1000}}, @float={0xc, 0x0, 0x0, 0x10, 0x10}, @float={0x4, 0x0, 0x0, 0x10, 0x2}, @decl_tag={0xb, 0x0, 0x0, 0x11, 0x2, 0x6}, @fwd={0x8}]}, {0x0, [0x2e, 0x0, 0x61, 0x30, 0x30, 0x0, 0x30, 0x5f, 0x30]}}, &(0x7f0000001240)=""/34, 0x7b, 0x22, 0x1, 0xd}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000012c0)={0x9, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x1b, 0x1d, &(0x7f0000001040)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x7, 0x1, 0x0, r6}, @map_fd={0x18, 0x8, 0x1, 0x0, r0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @ldst={0x3, 0x2, 0x2, 0xa, 0x0, 0xc, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}], &(0x7f0000001140)='GPL\x00', 0xfffffffa, 0x2b, &(0x7f0000001180)=""/43, 0x41100, 0x4, '\x00', r5, @fallback=0x2a, r9, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r10, 0xffffffffffffffff, 0x3, &(0x7f0000001440)=[0xffffffffffffffff, r0, r7, r7, r7, 0xffffffffffffffff, r6], &(0x7f0000001480)=[{0x3, 0x1, 0xb, 0x5}, {0x2, 0x4, 0x0, 0x6}, {0x2, 0x4, 0xa, 0x9}], 0x10, 0x6}, 0x94) 2.315368246s ago: executing program 0 (id=9931): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async, rerun: 32) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x2a, &(0x7f0000000100)=r5, 0x4) sendmsg$unix(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)='M', 0x1}], 0x1}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) write$cgroup_type(r3, &(0x7f0000000000), 0x9) (async, rerun: 32) close(r4) (async, rerun: 32) recvmsg$unix(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000d0ffffff000000000000001718110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b50902000f0000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018200000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7010000080000004608f0ff76000000bf9800000000000079080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.304938587s ago: executing program 2 (id=9806): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x7fe2, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r4, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r4, &(0x7f0000000080)="cf42b14ddd273c0a7aea66b81d461a052633598b98cd4adb61f74df1c81e1bbf02bafd3be8f9d7bda863004d1d78da6bd8b127346eb5dbf3305385e7fa7277ad0086a68d642ea000b0ed17ab70766c7304", &(0x7f0000000100)=""/227}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x35}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8, 0x9, 0x0, 0x3500}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 188.690139ms ago: executing program 0 (id=9932): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4010, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES32=r1], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x11c03a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) sendmsg$inet(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) (async) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000040000000400000009"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) sendmsg$inet(r3, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008001b0034f6ffff00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000000c0)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) (async, rerun: 32) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802"], 0x0, 0x7ff}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 188.276039ms ago: executing program 1 (id=9933): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff4, 0x0, @perf_bp={0x0}, 0x4008, 0x1000, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x17, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000055a60701000000000100000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000018500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 187.859849ms ago: executing program 3 (id=9934): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1f, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0xb8}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0xffffffffffffff94}, 0x48) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000090000000700000000000008000000000000000000000461"], 0x0, 0x2d}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000002c0)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000002c0)}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f0, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000002940)=r1, 0x4) (async) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000002940)=r1, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={0xffffffffffffffff, 0x58, &(0x7f0000001000)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={0xffffffffffffffff, 0x58, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000010c0)=r3) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="1b00000000000000000000008e00000000000000", @ANYRES32=0x1, @ANYBLOB="0300"/20, @ANYRES32=r3, @ANYRES32, @ANYBLOB="04000000000000000200000000000000000000000000000000040000"], 0x50) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="1b00000000000000000000008e00000000000000", @ANYRES32=0x1, @ANYBLOB="0300"/20, @ANYRES32=r3, @ANYRES32, @ANYBLOB="04000000000000000200000000000000000000000000000000040000"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000070000000200000007"], 0x50) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000070000000200000007"], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1}, 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x16, 0x0, 0x8400, 0x1}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000004c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001140)={r6, 0x58, &(0x7f00000010c0)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001140)={r6, 0x58, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001240)={0xc, 0x8, &(0x7f0000001040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@tail_call]}, &(0x7f0000001080)='GPL\x00', 0x8a9, 0x0, 0x0, 0x0, 0x61, '\x00', r9, @fallback=0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000011c0)={0x1, 0x7, 0x3, 0x1000}, 0x10, 0xffffffffffffffff, r8, 0x0, &(0x7f0000001200)=[r6, r6, 0xffffffffffffffff, r6, r7], 0x0, 0x10, 0xffc0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', r9, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x766073b3f9440989, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) (async) ioctl$TUNATTACHFILTER(r10, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYRES16=r10], 0x0, 0x8000005, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 184.749279ms ago: executing program 4 (id=9935): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0xb, 0x11509, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000e5020000000000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@fwd={0x1}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}, @typedef={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000300)=""/209, 0x4b, 0xd1, 0x2}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x3000000, {0x0, 0x3000000}}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@int={0x5, 0x0, 0x0, 0x1, 0x0, 0x39, 0x0, 0x53, 0x7}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @type_tag={0x10, 0x0, 0x0, 0x12, 0x1}]}, {0x0, [0x30, 0x61, 0x61, 0x2e, 0x2e]}}, &(0x7f0000000200)=""/79, 0x47, 0x4f, 0x1, 0x18000}, 0x28) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x400, 0x0, 0xffffffffffffffff, 0x6, '\x00', r2, r3, 0x2, 0x1, 0x3}, 0x50) 94.302535ms ago: executing program 1 (id=9936): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x3, 0xc, &(0x7f0000000100)=ANY=[@ANYBLOB="180000008f080000000000000000000085100000070000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300fb00ef9c0d000085000000060000009500000000002efbc97e384870b4d1575e48528b49ce70d8"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x17, 0x0, 0x5, 0xff, 0x0, 0xffffffffffffffff, 0x87}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r3) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000000280)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd4, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x3d, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xf, 0x4, 0x3, 0x7fff, 0x40002, r4, 0x867d, '\x00', r5, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)="e30080670000ec67838717bd86dd", 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 84.094475ms ago: executing program 4 (id=9937): r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800)={0xffffffffffffffff}, 0x4) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)=@o_path={&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x4000, r0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000900)={r1, &(0x7f0000000840)="99d494", &(0x7f0000000880)=""/89}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x5}, 0x50) 44.827847ms ago: executing program 2 (id=9806): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x0, 0x0, 0x5, 0x1, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000fdffffde18000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x7fe2, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r4, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r4, &(0x7f0000000080)="cf42b14ddd273c0a7aea66b81d461a052633598b98cd4adb61f74df1c81e1bbf02bafd3be8f9d7bda863004d1d78da6bd8b127346eb5dbf3305385e7fa7277ad0086a68d642ea000b0ed17ab70766c7304", &(0x7f0000000100)=""/227}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r4, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x35}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8, 0x9, 0x0, 0x3500}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 0 (id=9938): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000008700000000000000a6000000ffffff8595", @ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x3, 0x105, &(0x7f0000000580)=""/261}, 0x21) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYRES64=r1, @ANYRES32=r2, @ANYRESDEC], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB], 0x48) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x41000}, 0xfffffffffffffd05) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff0000, 0x9, 0x0, 0x2, 0x0, 0x9ba5}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETOFFLOAD(r3, 0x5452, 0x87dc72b1640eee16) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000000000000, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xfffffff9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x1, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000001340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000202020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000004000000850000007300000085000000050000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r7, &(0x7f0000000080), 0x12) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x101, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000500000002000000ffff000005000000", @ANYRES32, @ANYBLOB="0000000000000004000000000000000000000080", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x48) kernel console output (not intermixed with test programs): 717] R10: dffffc0000000000 R11: ffffed103ee0a5f8 R12: ffff888105780000 [ 32.143256][ T717] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888107df8000 [ 32.163412][ T717] FS: 00007fadb05866c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 32.178765][ T717] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.191495][ T717] CR2: 0000200000001000 CR3: 00000001250f4000 CR4: 00000000003506a0 [ 32.200006][ T717] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 32.208562][ T717] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 32.217312][ T717] Call Trace: [ 32.220775][ T717] ? __fdget+0x1a1/0x230 [ 32.225810][ T717] resolve_pseudo_ldimm64+0x55e/0x1060 [ 32.232068][ T717] ? bpf_check+0xdb10/0xdb10 [ 32.237248][ T717] ? kvmalloc_node+0x88/0x130 [ 32.242348][ T717] bpf_check+0x9058/0xdb10 [ 32.247169][ T717] ? bpf_get_btf_vmlinux+0x60/0x60 [ 32.252581][ T717] ? is_bpf_text_address+0x177/0x190 [ 32.258511][ T717] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.267915][ T737] device syzkaller0 entered promiscuous mode [ 32.274763][ T717] ? __kernel_text_address+0xa0/0x100 [ 32.280552][ T717] ? unwind_get_return_address+0x4d/0x90 [ 32.286806][ T717] ? stack_trace_save+0xf0/0xf0 [ 32.291942][ T717] ? arch_stack_walk+0xee/0x140 [ 32.299350][ T717] ? stack_trace_save+0xa6/0xf0 [ 32.304578][ T717] ? stack_trace_snprint+0xf0/0xf0 [ 32.310009][ T717] ? __kasan_slab_alloc+0x69/0xf0 [ 32.315484][ T717] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.321588][ T717] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.327458][ T717] ? __kasan_kmalloc+0xec/0x110 [ 32.332663][ T717] ? __kasan_kmalloc+0xda/0x110 [ 32.343653][ T717] ? kmem_cache_alloc_trace+0x181/0x2e0 [ 32.349886][ T717] ? selinux_bpf_prog_alloc+0x51/0x140 [ 32.355567][ T717] ? security_bpf_prog_alloc+0x62/0x90 [ 32.361225][ T717] ? bpf_prog_load+0x9d8/0x14a0 [ 32.366566][ T717] ? __se_sys_bpf+0x49a/0x740 [ 32.371442][ T717] ? __x64_sys_bpf+0x7b/0x90 [ 32.376163][ T717] ? do_syscall_64+0x31/0x40 [ 32.381226][ T717] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.387643][ T717] ? memset+0x35/0x40 [ 32.391769][ T717] ? bpf_obj_name_cpy+0x193/0x1e0 [ 32.396933][ T717] bpf_prog_load+0xfca/0x14a0 [ 32.401944][ T717] ? map_freeze+0x320/0x320 [ 32.407151][ T717] ? selinux_bpf+0xc7/0xf0 [ 32.411759][ T717] ? security_bpf+0x82/0xa0 [ 32.416618][ T717] __se_sys_bpf+0x49a/0x740 [ 32.421555][ T717] ? __x64_sys_bpf+0x90/0x90 [ 32.426294][ T717] ? __kasan_check_read+0x11/0x20 [ 32.432455][ T717] __x64_sys_bpf+0x7b/0x90 [ 32.437410][ T717] do_syscall_64+0x31/0x40 [ 32.442006][ T717] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 32.448515][ T717] RIP: 0033:0x7fadb1b6beb9 [ 32.453134][ T717] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 32.473900][ T717] RSP: 002b:00007fadb0586028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 32.482971][ T717] RAX: ffffffffffffffda RBX: 00007fadb1de7180 RCX: 00007fadb1b6beb9 [ 32.491324][ T717] RDX: 0000000000000080 RSI: 0000200000000580 RDI: 0000000000000005 [ 32.506159][ T717] RBP: 00007fadb1bd9c1f R08: 0000000000000000 R09: 0000000000000000 [ 32.527228][ T717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 32.543167][ T717] R13: 00007fadb1de7218 R14: 00007fadb1de7180 R15: 00007fff6d035548 [ 32.558271][ T717] ---[ end trace 0e86c0e452594b77 ]--- [ 32.583112][ T24] audit: type=1400 audit(1770254768.930:126): avc: denied { create } for pid=743 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 32.615430][ T746] syzkaller1: tun_chr_ioctl cmd 21731 [ 32.633018][ T746] syzkaller1: tun_chr_ioctl cmd 2147767520 [ 33.338937][ T24] audit: type=1400 audit(1770254769.690:127): avc: denied { create } for pid=805 comm="syz.2.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 33.473355][ T24] audit: type=1400 audit(1770254769.820:128): avc: denied { create } for pid=822 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 34.109477][ T24] audit: type=1400 audit(1770254770.460:129): avc: denied { create } for pid=879 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 34.157655][ T884] nr0: port 1(macsec0) entered blocking state [ 34.172072][ T884] nr0: port 1(macsec0) entered disabled state [ 34.183273][ T884] device macsec0 entered promiscuous mode [ 34.775610][ T24] audit: type=1400 audit(1770254771.130:130): avc: denied { create } for pid=939 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 35.094627][ T24] audit: type=1400 audit(1770254771.450:131): avc: denied { create } for pid=960 comm="syz.3.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 35.128810][ T24] audit: type=1400 audit(1770254771.480:132): avc: denied { create } for pid=953 comm="syz.4.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 35.708807][ T24] audit: type=1400 audit(1770254772.060:133): avc: denied { create } for pid=1007 comm="syz.3.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 36.133958][ T24] audit: type=1400 audit(1770254772.480:134): avc: denied { attach_queue } for pid=1037 comm="syz.2.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 36.222718][ T1039] device veth1_macvtap left promiscuous mode [ 36.254215][ T1039] device macsec0 entered promiscuous mode [ 36.432951][ T1055] device veth0_vlan left promiscuous mode [ 36.452323][ T1055] device veth0_vlan entered promiscuous mode [ 36.549192][ T1058] device veth1_macvtap left promiscuous mode [ 37.322138][ T24] audit: type=1400 audit(1770254773.670:135): avc: denied { create } for pid=1113 comm="syz.1.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 37.448313][ T1127] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.448839][ T1181] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.456777][ T1181] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.176275][ T24] kauditd_printk_skb: 3 callbacks suppressed [ 39.176286][ T24] audit: type=1400 audit(1770254775.530:139): avc: denied { create } for pid=1251 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 40.281392][ T24] audit: type=1400 audit(1770254776.630:140): avc: denied { create } for pid=1291 comm="syz.1.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 40.870577][ T1346] device syzkaller0 entered promiscuous mode [ 41.123307][ T1362] device wg2 entered promiscuous mode [ 41.129433][ T24] audit: type=1400 audit(1770254777.470:141): avc: denied { create } for pid=1373 comm="syz.4.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 41.240249][ T24] audit: type=1400 audit(1770254777.590:142): avc: denied { create } for pid=1375 comm="syz.1.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 41.578647][ T1400] bridge0: port 1(bridge_slave_0) entered disabled state [ 41.704841][ T1403] syz.4.315[1403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.706125][ T1403] syz.4.315[1403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.757809][ T1400] device syzkaller0 entered promiscuous mode [ 43.311940][ T24] audit: type=1400 audit(1770254779.660:143): avc: denied { create } for pid=1499 comm="syz.0.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 43.534444][ T1513] device sit0 entered promiscuous mode [ 43.971831][ T24] audit: type=1400 audit(1770254780.320:144): avc: denied { create } for pid=1537 comm="syz.2.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 44.261261][ T24] audit: type=1400 audit(1770254780.610:145): avc: denied { create } for pid=1560 comm="syz.1.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 44.852644][ T1583] device syzkaller0 entered promiscuous mode [ 45.625069][ T1621] device syzkaller0 entered promiscuous mode [ 45.979652][ T24] audit: type=1400 audit(1770254782.330:146): avc: denied { create } for pid=1645 comm="syz.0.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 46.078070][ T24] audit: type=1400 audit(1770254782.430:147): avc: denied { create } for pid=1648 comm="syz.2.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 46.416935][ T24] audit: type=1400 audit(1770254782.770:148): avc: denied { create } for pid=1663 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 47.401247][ T24] audit: type=1400 audit(1770254783.750:149): avc: denied { ioctl } for pid=1734 comm="syz.4.409" path="pid:[4026532447]" dev="nsfs" ino=4026532447 ioctlcmd=0x2403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.032625][ T24] audit: type=1400 audit(1770254784.380:150): avc: denied { create } for pid=1787 comm="syz.3.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 48.952110][ T1813] device syzkaller0 entered promiscuous mode [ 49.056470][ T1813] device syzkaller0 left promiscuous mode [ 49.261813][ T1834] cgroup: fork rejected by pids controller in /syz2 [ 49.575584][ T1850] device sit0 entered promiscuous mode [ 50.004946][ T1870] syz.3.447[1870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.008635][ T1870] syz.3.447[1870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.239403][ T1872] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.259331][ T24] audit: type=1400 audit(1770254786.610:151): avc: denied { ioctl } for pid=1883 comm="syz.4.451" path="socket:[20574]" dev="sockfs" ino=20574 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 50.326620][ T1872] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.346168][ T1872] device bridge_slave_0 entered promiscuous mode [ 50.370333][ T1881] device veth1_macvtap left promiscuous mode [ 50.393894][ T1872] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.414104][ T1872] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.436668][ T1872] device bridge_slave_1 entered promiscuous mode [ 50.722442][ T24] audit: type=1400 audit(1770254787.070:152): avc: denied { create } for pid=1872 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.804541][ T24] audit: type=1400 audit(1770254787.140:153): avc: denied { write } for pid=1872 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.825987][ T24] audit: type=1400 audit(1770254787.140:154): avc: denied { read } for pid=1872 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 50.847661][ T7] device bridge_slave_1 left promiscuous mode [ 50.856443][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.879387][ T7] device bridge_slave_0 left promiscuous mode [ 50.893612][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.914201][ T7] device veth1_macvtap left promiscuous mode [ 50.922388][ T1920] syz.3.462 uses obsolete (PF_INET,SOCK_PACKET) [ 50.931867][ T7] device veth0_vlan left promiscuous mode [ 51.112693][ T1872] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.119841][ T1872] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.127477][ T1872] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.136126][ T1872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.242018][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.261196][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.315337][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.328620][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.338535][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.347466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.356926][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.364034][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.372307][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.381335][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.390153][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.397834][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.454470][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.484222][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.505543][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 51.525049][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.572674][ T1935] device syzkaller0 entered promiscuous mode [ 51.619387][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 51.628302][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.653018][ T1872] device veth0_vlan entered promiscuous mode [ 51.814891][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 51.854644][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.925893][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.937314][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.948874][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 51.978860][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.084704][ T1872] device veth1_macvtap entered promiscuous mode [ 52.150942][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.161424][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.194382][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.260485][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.274464][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 54.842649][ T2096] device syzkaller0 entered promiscuous mode [ 55.066575][ T2134] 7B’ç÷ï: renamed from syzkaller0 [ 56.732258][ T2268] device syzkaller0 entered promiscuous mode [ 57.457804][ T2316] tap0: tun_chr_ioctl cmd 1074025677 [ 57.468430][ T2316] tap0: linktype set to 24 [ 58.946465][ T2398] device syzkaller0 entered promiscuous mode [ 60.566665][ T2486] syz.3.610[2486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.777356][ T24] audit: type=1400 audit(1770254797.130:155): avc: denied { create } for pid=2503 comm="syz.4.617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 61.542033][ T24] audit: type=1400 audit(1770254797.890:156): avc: denied { setattr } for pid=2545 comm="syz.4.629" path="pipe:[2748]" dev="pipefs" ino=2748 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 62.995081][ T24] audit: type=1400 audit(1770254799.340:157): avc: denied { read } for pid=2623 comm="syz.1.652" name="cgroup.subtree_control" dev="cgroup2" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 63.033347][ T2635] : renamed from bond_slave_0 [ 63.855013][ T2672] device syzkaller0 entered promiscuous mode [ 63.925618][ T2679] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.933331][ T2679] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.039320][ T2755] device wg2 entered promiscuous mode [ 65.805994][ T2791] ±ÿ: renamed from team_slave_1 [ 67.730475][ T2906] device sit0 entered promiscuous mode [ 68.078901][ T24] audit: type=1400 audit(1770254804.430:158): avc: denied { create } for pid=2920 comm="syz.2.737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 68.542242][ T24] audit: type=1400 audit(1770254804.890:159): avc: denied { create } for pid=2926 comm="syz.0.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 69.275470][ T2944] device sit0 left promiscuous mode [ 69.381531][ T2949] device sit0 entered promiscuous mode [ 69.608949][ T2955] bridge0: port 3(gretap0) entered blocking state [ 69.656614][ T2955] bridge0: port 3(gretap0) entered disabled state [ 69.712088][ T2955] device gretap0 entered promiscuous mode [ 69.775407][ T2955] bridge0: port 3(gretap0) entered blocking state [ 69.782010][ T2955] bridge0: port 3(gretap0) entered forwarding state [ 71.100707][ T3037] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.108005][ T3037] bridge0: port 2(bridge_slave_1) entered listening state [ 71.115715][ T3037] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.122886][ T3037] bridge0: port 1(bridge_slave_0) entered listening state [ 71.371249][ T3037] device bridge0 entered promiscuous mode [ 71.910486][ T24] audit: type=1400 audit(1770254808.260:160): avc: denied { create } for pid=3124 comm="syz.0.797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 71.958243][ T3129] device sit0 left promiscuous mode [ 71.992508][ T3129] device sit0 entered promiscuous mode [ 72.203218][ T3142] @0Ù: renamed from bond_slave_1 [ 72.738550][ T24] audit: type=1400 audit(1770254809.090:161): avc: denied { read } for pid=3167 comm="syz.3.809" dev="nsfs" ino=4026532490 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.762054][ T24] audit: type=1400 audit(1770254809.110:162): avc: denied { open } for pid=3167 comm="syz.3.809" path="net:[4026532490]" dev="nsfs" ino=4026532490 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.414752][ T3221] device bridge_slave_1 left promiscuous mode [ 73.421099][ T3221] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.450123][ T3221] device bridge_slave_0 left promiscuous mode [ 73.480867][ T3221] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.913489][ T3422] Ÿë: port 1(vlan1) entered blocking state [ 76.943193][ T3422] Ÿë: port 1(vlan1) entered disabled state [ 76.975461][ T3422] device vlan1 entered promiscuous mode [ 77.075763][ T24] audit: type=1400 audit(1770254813.430:163): avc: denied { append } for pid=3426 comm="syz.0.882" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 77.420081][ T3454] device syzkaller0 entered promiscuous mode [ 78.527370][ T3550] tun0: tun_chr_ioctl cmd 1074812117 [ 78.533117][ T3550] tun0: tun_chr_ioctl cmd 1074025680 [ 78.822885][ T3562] ÿ: renamed from team_slave_1 [ 79.320300][ T3576] bridge0: port 3(veth0) entered blocking state [ 79.354956][ T3576] bridge0: port 3(veth0) entered disabled state [ 79.399703][ T3576] device veth0 entered promiscuous mode [ 79.656998][ T3593] device syzkaller0 entered promiscuous mode [ 80.031390][ T3610] syz.4.940 (3610) used obsolete PPPIOCDETACH ioctl [ 81.243176][ T3671] device syzkaller0 entered promiscuous mode [ 82.234831][ T3713] device wg2 entered promiscuous mode [ 82.599018][ T24] audit: type=1400 audit(1770254818.950:164): avc: denied { create } for pid=3732 comm="syz.3.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 83.710451][ T3784] device syzkaller0 entered promiscuous mode [ 83.872840][ T3794] device syzkaller0 entered promiscuous mode [ 83.984673][ T3803] device sit0 left promiscuous mode [ 84.160316][ T3806] device sit0 entered promiscuous mode [ 85.853323][ T3886] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 85.913182][ T24] audit: type=1400 audit(1770254822.260:165): avc: denied { setattr } for pid=3898 comm="syz.4.1027" path="/dev/net/tun" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 85.948856][ T3895] geneve1: tun_chr_ioctl cmd 1074025672 [ 85.955087][ T3895] geneve1: ignored: set checksum enabled [ 86.399907][ T3946] device syzkaller0 entered promiscuous mode [ 86.453358][ T3957] device syzkaller0 entered promiscuous mode [ 86.487280][ T3966] device bond_slave_0 entered promiscuous mode [ 86.514064][ C0] bridge0: port 1(bridge_slave_0) entered learning state [ 86.521520][ C0] bridge0: port 2(bridge_slave_1) entered learning state [ 86.536042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_0: link becomes ready [ 86.544895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 86.690518][ T3978] lo: mtu less than device minimum [ 87.767705][ T4019] device wg2 left promiscuous mode [ 87.833006][ T4015] device wg2 entered promiscuous mode [ 88.373904][ T4045] : port 1(dummy0) entered blocking state [ 88.393831][ T4045] : port 1(dummy0) entered disabled state [ 88.418199][ T4045] device dummy0 entered promiscuous mode [ 89.743815][ T24] audit: type=1400 audit(1770254826.090:166): avc: denied { create } for pid=4092 comm="syz.4.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 92.499100][ T4208] device sit0 left promiscuous mode [ 92.534400][ T4212] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.541668][ T4212] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.180471][ T4233] device syzkaller0 entered promiscuous mode [ 93.611545][ T4236] device syzkaller0 entered promiscuous mode [ 93.885555][ T4255] device sit0 left promiscuous mode [ 94.761933][ T4296] device wg2 left promiscuous mode [ 95.007010][ T4311] device bridge_slave_1 entered promiscuous mode [ 97.823856][ T4493] device veth0_vlan left promiscuous mode [ 97.834247][ T4493] device veth0_vlan entered promiscuous mode [ 97.850789][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.868652][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.907651][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.964245][ T4502] device syzkaller0 entered promiscuous mode [ 97.984488][ T381] syzkaller0: tun_net_xmit 48 [ 98.042155][ T4501] syzkaller0: create flow: hash 3016132617 index 0 [ 98.204294][ T4501] syzkaller0 (unregistered): delete flow: hash 3016132617 index 0 [ 100.409785][ T4620] device pim6reg1 entered promiscuous mode [ 101.194816][ T4646] syzkaller0: mtu greater than device maximum [ 101.773605][ T4692] device sit0 entered promiscuous mode [ 103.474508][ T4817] device lo left promiscuous mode [ 103.545620][ T4817] b‹¡Y­4`Ò˜: renamed from lo [ 103.862197][ T4838] device syzkaller0 entered promiscuous mode [ 105.498046][ T4968] device syzkaller0 entered promiscuous mode [ 106.533724][ T5020] device wg2 entered promiscuous mode [ 107.402262][ T5038] device syzkaller0 entered promiscuous mode [ 109.344755][ T24] audit: type=1400 audit(1770254845.700:167): avc: denied { ioctl } for pid=5128 comm="syz.4.1368" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 110.566567][ T5174] device wg2 left promiscuous mode [ 110.637444][ T5174] device syzkaller0 entered promiscuous mode [ 110.715101][ T5174] device wg2 entered promiscuous mode [ 112.119433][ T5252] device syzkaller0 entered promiscuous mode [ 113.043433][ T5323] device veth1_macvtap left promiscuous mode [ 113.132795][ T5323] device veth1_macvtap entered promiscuous mode [ 113.154236][ T5323] device macsec0 entered promiscuous mode [ 114.371830][ T5449] device syzkaller0 entered promiscuous mode [ 114.829163][ T5471] tun0: tun_chr_ioctl cmd 2147767511 [ 115.143111][ T5477] device syzkaller0 entered promiscuous mode [ 115.506323][ T5492] lo: mtu less than device minimum [ 115.626549][ T5512] device bridge_slave_1 left promiscuous mode [ 116.345861][ T24] audit: type=1400 audit(1770254852.700:168): avc: denied { create } for pid=5570 comm="syz.3.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 116.671350][ T5585] device wg2 left promiscuous mode [ 116.709624][ T5585] device wg2 entered promiscuous mode [ 117.417597][ T5670] device syzkaller0 entered promiscuous mode [ 117.929089][ T5710] device aaaaaaaaaaaaaaa entered promiscuous mode [ 119.300014][ T5763] device syzkaller0 entered promiscuous mode [ 119.434636][ T5775] device pim6reg1 entered promiscuous mode [ 119.630999][ T5791] syz.3.1560[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.631061][ T5791] syz.3.1560[5791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.655298][ T5788] device syzkaller0 entered promiscuous mode [ 121.142833][ T5913] device veth0_vlan left promiscuous mode [ 121.189158][ T5913] device veth0_vlan entered promiscuous mode [ 121.254400][ T5913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.290764][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.324523][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.332177][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.656078][ T5924] device syzkaller0 entered promiscuous mode [ 122.034692][ T5942] device veth1_macvtap left promiscuous mode [ 122.064162][ T5942] device macsec0 left promiscuous mode [ 122.836576][ T5991] device veth1 entered promiscuous mode [ 123.140506][ T6020] device bond_slave_1 entered promiscuous mode [ 123.172645][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 123.204517][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 123.952584][ T6078] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.959960][ T6078] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.020382][ T6078] device bridge_slave_1 left promiscuous mode [ 124.033440][ T6078] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.111754][ T6078] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.034324][ T6215] device syzkaller0 entered promiscuous mode [ 129.092448][ T6329] tap0: tun_chr_ioctl cmd 1074025677 [ 129.101995][ T6329] tap0: linktype set to 1 [ 130.107434][ T6386] device macsec0 entered promiscuous mode [ 130.712970][ T6429] device syzkaller0 entered promiscuous mode [ 131.068410][ T6451] tun0: tun_chr_ioctl cmd 1074025692 [ 131.536444][ T6482] @0Ù: renamed from bond_slave_1 [ 132.907038][ T6642] device syzkaller0 entered promiscuous mode [ 132.938055][ T6646] device syzkaller0 entered promiscuous mode [ 135.590632][ T6741] device syzkaller0 entered promiscuous mode [ 136.422308][ T6760] device bridge0 left promiscuous mode [ 138.978243][ T6914] device syzkaller0 entered promiscuous mode [ 139.155198][ T6921] ipvlan1: tun_chr_ioctl cmd 1074812118 [ 140.612238][ T6992] device sit0 left promiscuous mode [ 143.308205][ T7093] device syzkaller0 entered promiscuous mode [ 143.809614][ T7126] device syzkaller0 left promiscuous mode [ 144.073895][ T7167] device wg2 left promiscuous mode [ 144.110072][ T7158] device wg2 entered promiscuous mode [ 144.221787][ T7167] device wg2 entered promiscuous mode [ 145.322546][ T7231] device syzkaller0 entered promiscuous mode [ 145.364978][ T7238] ÿ: renamed from team_slave_1 [ 145.542638][ T7256] : renamed from bond_slave_0 [ 146.734975][ T7309] device syzkaller0 entered promiscuous mode [ 146.983823][ T7339] device veth0_vlan left promiscuous mode [ 147.006566][ T7339] device veth0_vlan entered promiscuous mode [ 147.047234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.082694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.091842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.779009][ T7444] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 148.805126][ T7444] device syzkaller0 entered promiscuous mode [ 149.335554][ T7497] device bridge_slave_1 entered promiscuous mode [ 149.357777][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.197691][ T7562] device syzkaller0 entered promiscuous mode [ 153.528308][ T7709] bridge0: port 3(gretap0) entered disabled state [ 153.536213][ T7709] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.546398][ T7709] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.026819][ T7753] device pim6reg1 entered promiscuous mode [ 154.819052][ T7780] device syzkaller0 entered promiscuous mode [ 154.948025][ T7798] tap0: tun_chr_ioctl cmd 2147767506 [ 156.169839][ T7909] device syzkaller0 entered promiscuous mode [ 157.730630][ T7993] device syzkaller0 entered promiscuous mode [ 157.764531][ T8004] device wg2 left promiscuous mode [ 159.294845][ T24] audit: type=1400 audit(1770254895.650:169): avc: denied { associate } for pid=8052 comm="syz.1.2236" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 159.529971][ T8070] tap0: tun_chr_ioctl cmd 2147767521 [ 161.776603][ T8147] device gretap0 left promiscuous mode [ 161.786716][ T8147] bridge0: port 3(gretap0) entered disabled state [ 161.816569][ T8147] device bridge_slave_1 left promiscuous mode [ 161.828651][ T8147] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.847452][ T8147] device bridge_slave_0 left promiscuous mode [ 161.858748][ T8147] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.770401][ T8188] tun0: tun_chr_ioctl cmd 1074025676 [ 162.794126][ T8188] tun0: owner set to 0 [ 164.348316][ T8231] device syzkaller0 entered promiscuous mode [ 164.794922][ T8275] device syzkaller0 entered promiscuous mode [ 166.025735][ T8352] device syzkaller0 entered promiscuous mode [ 166.429032][ T8384] device veth1_macvtap entered promiscuous mode [ 166.441769][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.643072][ T8500] tap0: tun_chr_ioctl cmd 2147767521 [ 169.377271][ T8619] device wg2 left promiscuous mode [ 169.528015][ T8626] device syzkaller0 entered promiscuous mode [ 170.483203][ T8652] lo: mtu less than device minimum [ 171.538452][ T8711] device syzkaller0 entered promiscuous mode [ 171.552140][ T8711] syzkaller0: tun_net_xmit 1280 [ 171.560333][ T8711] syzkaller0: tun_chr_ioctl cmd 35139 [ 172.624942][ T8743] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 172.634257][ T8743] syzkaller0: linktype set to 773 [ 174.194696][ T8817] device pimreg0 entered promiscuous mode [ 174.716076][ T8837] device syzkaller0 entered promiscuous mode [ 174.875820][ T24] audit: type=1400 audit(1770254911.230:170): avc: denied { create } for pid=8849 comm="syz.4.2471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 175.606266][ T8877] tap0: tun_chr_ioctl cmd 1074025675 [ 175.618403][ T8877] tap0: persist enabled [ 175.629620][ T8877] tap0: tun_chr_ioctl cmd 1074025675 [ 175.642891][ T8877] tap0: persist disabled [ 175.662124][ T8883] tap0: tun_chr_ioctl cmd 1074812118 [ 178.890634][ T9085] -1: renamed from syzkaller0 [ 179.476939][ T9098] device syzkaller0 entered promiscuous mode [ 181.149635][ T9152] device syzkaller0 entered promiscuous mode [ 182.691496][ T9219] device xfrm0 left promiscuous mode [ 183.000908][ T9228] device dummy0 entered promiscuous mode [ 183.317609][ T9233] device syzkaller0 entered promiscuous mode [ 183.449799][ T9241] device sit0 entered promiscuous mode [ 183.827284][ T9276] syzkaller0: mtu greater than device maximum [ 184.215423][ T9306] tap0: tun_chr_ioctl cmd 2147767506 [ 184.784444][ T9329] device syzkaller0 entered promiscuous mode [ 185.507956][ T9374] device syzkaller0 left promiscuous mode [ 185.574329][ T9376] -1: renamed from syzkaller0 [ 185.698832][ T9379] device syzkaller0 entered promiscuous mode [ 187.623839][ T9472] tun0: tun_chr_ioctl cmd 2147767507 [ 187.901808][ T9497] syz.2.2657[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.903008][ T9497] syz.2.2657[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.271079][ T9572] device syzkaller0 entered promiscuous mode [ 191.763560][ T9732] syz.2.2727[9732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.763613][ T9732] syz.2.2727[9732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.788656][ T9732] macsec0: mtu greater than device maximum [ 192.270826][ T9757] device wg2 entered promiscuous mode [ 192.295269][ T9757] device sit0 entered promiscuous mode [ 192.536267][ T9772] device syzkaller0 entered promiscuous mode [ 195.784588][ T9967] device lo entered promiscuous mode [ 195.880948][ T9976] device syzkaller0 entered promiscuous mode [ 196.314664][T10014] tun0: tun_chr_ioctl cmd 2147767507 [ 196.718286][T10025] device veth0_vlan left promiscuous mode [ 196.800718][T10025] device veth0_vlan entered promiscuous mode [ 196.948104][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 199.026923][T10096] tun0: tun_chr_ioctl cmd 2147767520 [ 199.067435][T10096] tun0: tun_chr_ioctl cmd 1074025676 [ 199.111968][T10096] tun0: owner set to 0 [ 199.872950][T10152] bridge0: port 4(gretap0) entered blocking state [ 199.892263][T10152] bridge0: port 4(gretap0) entered disabled state [ 199.942507][T10152] device gretap0 entered promiscuous mode [ 201.767797][T10232] device syzkaller0 entered promiscuous mode [ 201.821854][T10229] device gretap0 left promiscuous mode [ 201.832524][T10229] bridge0: port 4(gretap0) entered disabled state [ 201.894606][T10229] device veth0 left promiscuous mode [ 201.924041][T10229] bridge0: port 3(veth0) entered disabled state [ 201.996311][T10229] device bridge_slave_1 left promiscuous mode [ 202.016443][T10229] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.071039][T10229] device bridge_slave_0 left promiscuous mode [ 202.105785][T10229] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.327918][T10305] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.351737][T10305] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.377929][T10305] device bridge_slave_0 entered promiscuous mode [ 204.434624][T10305] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.457448][T10305] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.489794][T10305] device bridge_slave_1 entered promiscuous mode [ 204.877854][T10305] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.886226][T10305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.894077][T10305] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.903307][T10305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.080428][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.094988][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.114534][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.151512][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.171374][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.202734][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.210361][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.265545][T10363] device syzkaller0 entered promiscuous mode [ 205.284686][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.298418][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.339147][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.377998][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.505153][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 205.545621][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 205.692778][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.735455][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.796164][T10305] device veth0_vlan entered promiscuous mode [ 205.824508][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.837387][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.869739][T10305] device veth1_macvtap entered promiscuous mode [ 205.881668][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 205.909185][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 205.934458][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 205.996183][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.007865][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.042553][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.072783][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.566629][ T1647] device vlan1 left promiscuous mode [ 206.572227][ T1647] Ÿë: port 1(vlan1) entered disabled state [ 206.704816][ T1647] device veth0_vlan left promiscuous mode [ 207.706564][T10472] device veth1_macvtap left promiscuous mode [ 207.799274][T10472] device veth1_macvtap entered promiscuous mode [ 207.819574][T10472] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.853888][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.970406][T10489] device syzkaller0 entered promiscuous mode [ 208.289830][T10515] device syzkaller0 left promiscuous mode [ 208.422879][T10522] device syzkaller0 left promiscuous mode [ 208.696636][T10536] device sit0 left promiscuous mode [ 209.656266][T10572] device syzkaller0 entered promiscuous mode [ 210.423648][T10595] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.512883][T10595] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.576647][T10595] device bridge_slave_0 entered promiscuous mode [ 210.649078][T10595] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.710947][T10595] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.792458][T10595] device bridge_slave_1 entered promiscuous mode [ 211.237132][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.252303][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.302210][T10658] device syzkaller0 entered promiscuous mode [ 211.324531][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.338637][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.365486][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.373412][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.389895][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.401250][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.411358][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.421526][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.440449][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.506017][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.551673][T10666] device syzkaller0 entered promiscuous mode [ 211.561386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.588418][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.615773][T10595] device veth0_vlan entered promiscuous mode [ 211.634304][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.643162][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.681097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 211.750227][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 211.816476][T10595] device veth1_macvtap entered promiscuous mode [ 211.863057][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 211.977189][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 211.986030][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.133571][T10703] device veth0_vlan left promiscuous mode [ 212.182390][T10703] device veth0_vlan entered promiscuous mode [ 212.385246][ T1647] nr0: port 1(macsec0) entered disabled state [ 212.395855][ T1647] device veth1_macvtap left promiscuous mode [ 213.022401][T10737] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.032180][T10737] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.043356][T10737] device bridge_slave_0 entered promiscuous mode [ 213.111076][T10737] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.128516][T10737] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.137309][T10737] device bridge_slave_1 entered promiscuous mode [ 213.470872][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.494561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.563143][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.576880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.588433][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.597848][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.606435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.617149][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.626511][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.634583][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.659179][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.668670][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.681436][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.744177][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.773303][T10737] device veth0_vlan entered promiscuous mode [ 213.831186][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.853279][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.865586][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.876084][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.889250][T10737] device veth1_macvtap entered promiscuous mode [ 213.928924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.967867][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.080597][T10839] device syzkaller0 entered promiscuous mode [ 214.243330][ T1647] device veth0_vlan left promiscuous mode [ 216.472654][T10994] device veth0_vlan left promiscuous mode [ 216.482265][T10994] device veth0_vlan entered promiscuous mode [ 216.507043][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 216.549620][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 216.583472][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.977945][T11039] device syzkaller0 entered promiscuous mode [ 218.058368][T11052] device sit0 entered promiscuous mode [ 218.379704][T11073] device syzkaller0 entered promiscuous mode [ 219.988547][T11179] device pim6reg1 entered promiscuous mode [ 222.287817][ T24] audit: type=1400 audit(1770254958.640:171): avc: denied { create } for pid=11255 comm="syz.3.3150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 223.960246][T11303] device macsec0 left promiscuous mode [ 227.028636][T11380] device sit0 entered promiscuous mode [ 227.181495][T11382] device wg2 entered promiscuous mode [ 227.585878][T11387] device syzkaller0 entered promiscuous mode [ 228.077043][T11398] device syzkaller0 entered promiscuous mode [ 228.122665][T11400] device syzkaller0 entered promiscuous mode [ 228.683724][ T24] audit: type=1400 audit(1770254965.030:172): avc: denied { mounton } for pid=11439 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 228.818581][T11439] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.843519][T11439] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.867697][T11439] device bridge_slave_0 entered promiscuous mode [ 228.907689][T11439] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.917527][T11439] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.935242][T11439] device bridge_slave_1 entered promiscuous mode [ 229.128238][T11439] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.137246][T11439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.146540][T11439] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.155933][T11439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.363497][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.411421][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.440289][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.661907][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.723088][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.829828][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.895249][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.008281][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.063187][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.116797][T11439] device veth0_vlan entered promiscuous mode [ 230.159236][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.197125][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.231054][ T9] device bridge_slave_1 left promiscuous mode [ 230.283969][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.354688][ T9] device bridge_slave_0 left promiscuous mode [ 230.373280][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.400400][ T9] device veth1_macvtap left promiscuous mode [ 230.416035][ T9] device veth0_vlan left promiscuous mode [ 230.683731][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.703460][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.716761][T11439] device veth1_macvtap entered promiscuous mode [ 230.750459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.774627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.787365][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.824727][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.857339][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.888010][ T24] audit: type=1400 audit(1770254967.240:173): avc: denied { unmount } for pid=11439 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 232.135282][T11625] device wg2 entered promiscuous mode [ 232.379430][ T24] audit: type=1400 audit(1770254968.730:174): avc: denied { create } for pid=11642 comm="syz.4.3262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 232.515603][T11651] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.528469][T11651] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.570184][T11651] device bridge0 entered promiscuous mode [ 233.168361][T11688] device sit0 left promiscuous mode [ 233.250133][T11691] device sit0 entered promiscuous mode [ 236.286512][T11800] device syzkaller0 entered promiscuous mode [ 237.099796][T11831] device sit0 left promiscuous mode [ 237.329062][T11836] device sit0 entered promiscuous mode [ 238.186047][T11858] pimreg0: tun_chr_ioctl cmd 1074025680 [ 238.719528][T11912] device wg2 entered promiscuous mode [ 240.064438][T11980] device veth0_vlan left promiscuous mode [ 240.111779][T11980] device veth0_vlan entered promiscuous mode [ 240.599409][T12029] bridge0: port 3(veth0) entered blocking state [ 240.606329][T12029] bridge0: port 3(veth0) entered disabled state [ 240.641993][T12029] device veth0 entered promiscuous mode [ 240.666604][T12029] bridge0: port 3(veth0) entered blocking state [ 240.674175][T12029] bridge0: port 3(veth0) entered forwarding state [ 240.762881][T12050] tun0: tun_chr_ioctl cmd 2147767507 [ 243.005731][T12184] : renamed from bond_slave_0 [ 243.121506][T12202] device veth0_vlan left promiscuous mode [ 243.129401][T12202] device veth0_vlan entered promiscuous mode [ 243.137984][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.152588][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.163765][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.825155][T12250] b‹¡Y­4`Ò˜: renamed from lo [ 245.764586][T12279] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.772965][T12279] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.793347][T12279] device bridge_slave_0 entered promiscuous mode [ 245.822715][T12279] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.864028][T12279] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.889603][T12279] device bridge_slave_1 entered promiscuous mode [ 246.234174][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.252831][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.361001][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.390538][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.399966][ T1647] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.407790][ T1647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.417314][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.506694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.516095][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.526148][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.533667][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.543115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.554295][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.619769][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.708050][T12372] device syzkaller0 entered promiscuous mode [ 246.746997][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.819694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.842650][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.890190][T12279] device veth0_vlan entered promiscuous mode [ 246.985937][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.054651][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.137819][T12279] device veth1_macvtap entered promiscuous mode [ 247.203405][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.242315][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.304455][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.382241][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.443022][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 247.640776][ T9] device dummy0 left promiscuous mode [ 247.654226][ T9] : port 1(dummy0) entered disabled state [ 248.129483][T12442] device syzkaller0 entered promiscuous mode [ 248.734810][T12486] device aaaaaaaaaaaaaaa entered promiscuous mode [ 249.539544][T12515] device syzkaller0 entered promiscuous mode [ 249.983362][T12534] device veth0_vlan left promiscuous mode [ 250.061925][T12534] device veth0_vlan entered promiscuous mode [ 250.666801][T12567] device wg2 entered promiscuous mode [ 252.113794][T12629] device sit0 entered promiscuous mode [ 252.988941][T12669] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.998426][T12669] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.070781][T12678] device bridge_slave_1 left promiscuous mode [ 253.088503][T12678] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.100298][T12678] device bridge_slave_0 left promiscuous mode [ 253.114574][T12678] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.366006][T12694] device syzkaller0 entered promiscuous mode [ 255.595058][T12825] tun0: tun_chr_ioctl cmd 1074025673 [ 255.634718][T12825] tun0: tun_chr_ioctl cmd 1074025673 [ 255.663276][T12826] tun0: tun_chr_ioctl cmd 1074025678 [ 255.697326][T12826] tun0: group set to 1 [ 257.086189][T12899] syz.0.3626[12899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.086254][T12899] syz.0.3626[12899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.716111][T12944] device veth0_vlan left promiscuous mode [ 257.839630][T12944] device veth0_vlan entered promiscuous mode [ 257.920565][T12953] device syzkaller0 entered promiscuous mode [ 257.958642][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.004753][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.037347][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.416772][T12994] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.427884][T12994] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.190579][T13060] žÿ: renamed from team_slave_1 [ 259.561664][T13093] device syzkaller0 entered promiscuous mode [ 260.140385][T13148] device syzkaller0 entered promiscuous mode [ 261.434969][T13195] device veth1_macvtap left promiscuous mode [ 263.631273][T13269] IPv6: pim6reg1: Disabled Multicast RS [ 266.175894][T13377] tun0: tun_chr_ioctl cmd 2147767507 [ 266.337908][T13384] tun0: tun_chr_ioctl cmd 2147767517 [ 266.743051][T13404] : port 1(ip6gretap0) entered blocking state [ 266.769100][T13404] : port 1(ip6gretap0) entered disabled state [ 266.801660][T13404] device ip6gretap0 entered promiscuous mode [ 267.963286][T13453] -: renamed from syzkaller0 [ 268.176896][T13476] device sit0 left promiscuous mode [ 268.238628][T13476] device sit0 entered promiscuous mode [ 268.484452][T13498] device syzkaller0 entered promiscuous mode [ 268.566355][T13506] device syzkaller0 entered promiscuous mode [ 270.114653][T13555] : port 1(ip6gretap0) entered blocking state [ 270.134453][T13555] : port 1(ip6gretap0) entered disabled state [ 270.163719][T13555] device ip6gretap0 entered promiscuous mode [ 271.015121][T13568] device sit0 left promiscuous mode [ 271.181040][T13569] device sit0 entered promiscuous mode [ 272.168075][T13603] device pim6reg1 entered promiscuous mode [ 273.339713][T13619] ip6tnl0: mtu greater than device maximum [ 275.787932][T13739] device syzkaller0 entered promiscuous mode [ 276.225392][T13751] device syzkaller0 entered promiscuous mode [ 276.733040][T13778] device wg2 entered promiscuous mode [ 277.662954][T13811] tun0: tun_chr_ioctl cmd 2147767507 [ 279.746156][T13904] device wg2 left promiscuous mode [ 280.123281][T13915] device syzkaller0 entered promiscuous mode [ 280.137705][T13909] device wg2 entered promiscuous mode [ 280.848618][T13959] device syzkaller0 entered promiscuous mode [ 282.320762][T14011] tap0: tun_chr_ioctl cmd 1074025677 [ 282.344099][T14011] tap0: linktype set to 769 [ 283.323354][T14096] device wg2 left promiscuous mode [ 283.585021][T14127] device bridge0 left promiscuous mode [ 283.592612][T14133] syz.2.3999[14133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.592687][T14133] syz.2.3999[14133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.619889][T14132] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.667765][T14132] device bridge_slave_0 left promiscuous mode [ 283.674499][T14132] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.990026][T14251] device syzkaller0 entered promiscuous mode [ 286.782491][T14338] tap0: tun_chr_ioctl cmd 2147767521 [ 287.292128][T14353] tun0: tun_chr_ioctl cmd 1074025681 [ 287.732671][T14368] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 287.811036][T14368] device syzkaller0 entered promiscuous mode [ 288.461334][T14403] device syzkaller0 entered promiscuous mode [ 289.024581][T14446] device veth1_macvtap left promiscuous mode [ 289.818538][T14488] device veth0_vlan left promiscuous mode [ 289.865495][T14488] device veth0_vlan entered promiscuous mode [ 293.563947][T14640] device syzkaller0 entered promiscuous mode [ 295.339797][T14712] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 295.383196][T14712] device syzkaller0 entered promiscuous mode [ 296.221816][T14747] device veth0_vlan left promiscuous mode [ 296.279718][T14747] device veth0_vlan entered promiscuous mode [ 296.413690][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.439383][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.484603][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.080037][T14800] device syzkaller0 entered promiscuous mode [ 297.353694][T14829] device veth0_vlan left promiscuous mode [ 297.378977][T14829] device veth0_vlan entered promiscuous mode [ 297.436554][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.476780][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.492813][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.215360][T14890] device syzkaller0 entered promiscuous mode [ 298.363214][T14895] device wg2 left promiscuous mode [ 298.643182][T14920] device syzkaller0 entered promiscuous mode [ 299.896208][T14993] device pim6reg1 entered promiscuous mode [ 301.848880][T15084] device syzkaller0 entered promiscuous mode [ 303.990841][T15218] device sit0 entered promiscuous mode [ 305.737302][T15277] device syzkaller0 entered promiscuous mode [ 305.876579][T15285] device veth1_macvtap left promiscuous mode [ 305.937255][T15285] device veth1_macvtap entered promiscuous mode [ 305.945551][T15285] device macsec0 entered promiscuous mode [ 305.980671][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.073669][T15309] device pim6reg1 entered promiscuous mode [ 306.252451][T15318] device syzkaller0 entered promiscuous mode [ 306.279043][T15322] device sit0 left promiscuous mode [ 306.354042][T15322] device sit0 entered promiscuous mode [ 306.622151][T15334] device syzkaller0 entered promiscuous mode [ 306.755559][T15342] device syzkaller0 entered promiscuous mode [ 307.566022][T15398] device bridge_slave_0 entered promiscuous mode [ 307.862971][T15411] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.895040][T15411] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.931003][T15411] device bridge_slave_0 entered promiscuous mode [ 307.993542][T15411] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.010195][T15411] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.029962][T15411] device bridge_slave_1 entered promiscuous mode [ 308.049552][ T296] device ip6gretap0 left promiscuous mode [ 308.057220][ T296] : port 1(ip6gretap0) entered disabled state [ 308.604948][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 308.616743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.677168][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.701365][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.732636][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.740303][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.762700][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.782343][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.802177][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.811261][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.851756][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 308.870685][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.889394][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.918607][ T296] device bridge_slave_1 left promiscuous mode [ 308.929010][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.939463][ T296] device bridge_slave_0 left promiscuous mode [ 308.946875][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.967250][ T296] device veth1_macvtap left promiscuous mode [ 308.978093][ T296] device veth0_vlan left promiscuous mode [ 309.480492][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 309.498187][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 309.549483][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 309.569297][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 309.586964][T15411] device veth0_vlan entered promiscuous mode [ 309.596853][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 309.614681][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 309.641268][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 309.663735][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 309.681215][T15411] device veth1_macvtap entered promiscuous mode [ 309.735515][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 309.755348][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 309.798052][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 309.857056][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 309.869162][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 310.529524][T15554] device syzkaller0 entered promiscuous mode [ 313.874300][T15696] device sit0 left promiscuous mode [ 316.758161][T15857] device sit0 entered promiscuous mode [ 317.481863][T15885] device syzkaller0 entered promiscuous mode [ 318.175808][T15904] device veth0_vlan left promiscuous mode [ 318.182705][T15904] device veth0_vlan entered promiscuous mode [ 318.388508][ T7] bridge0: port 3(veth0) entered disabled state [ 319.103752][T15959] pimreg0: tun_chr_ioctl cmd 35111 [ 320.528665][T16056] device syzkaller0 entered promiscuous mode [ 325.366724][T16263] device syzkaller0 entered promiscuous mode [ 325.418383][T16275] device sit0 left promiscuous mode [ 326.007305][T16314] IPv6: pim6reg1: Disabled Multicast RS [ 326.240553][T16319] device syzkaller0 entered promiscuous mode [ 327.459755][T16378] device syzkaller0 entered promiscuous mode [ 328.069192][T16393] device syzkaller0 entered promiscuous mode [ 328.575121][T16414] device veth0_vlan left promiscuous mode [ 328.592519][T16414] device veth0_vlan entered promiscuous mode [ 328.627009][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.658514][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.684381][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.391205][T16466] tap0: tun_chr_ioctl cmd 1074025675 [ 329.397028][T16466] tap0: persist enabled [ 329.402795][T16466] tap0: tun_chr_ioctl cmd 1074025675 [ 329.409547][T16466] tap0: persist disabled [ 329.564676][T16468] tap0: tun_chr_ioctl cmd 1074025677 [ 329.571002][T16468] tap0: linktype set to 768 [ 330.624642][T16546] device syzkaller0 entered promiscuous mode [ 331.263854][T16599] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.271602][T16599] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.316618][T16599] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.325526][T16599] bridge0: port 2(bridge_slave_1) entered listening state [ 331.333428][T16599] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.340717][T16599] bridge0: port 1(bridge_slave_0) entered listening state [ 331.383405][T16599] device bridge0 entered promiscuous mode [ 331.925958][T16629] IPv6: pim6reg1: Disabled Multicast RS [ 332.067135][T16629] device syzkaller0 entered promiscuous mode [ 332.288943][ T775] syzkaller0: tun_net_xmit 48 [ 332.294999][T16629] syzkaller0: tun_net_xmit 1280 [ 333.498778][T16703] device syzkaller0 entered promiscuous mode [ 334.475892][T16777] device veth0_vlan left promiscuous mode [ 334.541693][T16777] device veth0_vlan entered promiscuous mode [ 335.991853][T16834] device syzkaller0 entered promiscuous mode [ 336.583408][T16854] device syzkaller0 entered promiscuous mode [ 337.534033][T16896] syzkaller0: tun_chr_ioctl cmd 35108 [ 337.564973][T16896] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 337.571252][T16896] syzkaller0: persist disabled [ 338.547936][T16942] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.555513][T16942] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.292926][T17025] device syzkaller0 entered promiscuous mode [ 341.354527][T17026] device syzkaller0 left promiscuous mode [ 342.109336][T17076] device syzkaller0 entered promiscuous mode [ 342.128592][T17076] syzkaller0: tun_net_xmit 1280 [ 343.831143][T17150] device veth1_macvtap left promiscuous mode [ 343.919257][T17150] device veth1_macvtap entered promiscuous mode [ 343.935834][T17150] device macsec0 entered promiscuous mode [ 345.680202][T17274] device syzkaller0 entered promiscuous mode [ 346.049314][ T24] audit: type=1400 audit(1770255082.400:175): avc: denied { create } for pid=17293 comm="syz.2.4930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 346.353972][ C1] bridge0: port 1(bridge_slave_0) entered learning state [ 346.361714][ C1] bridge0: port 2(bridge_slave_1) entered learning state [ 347.119164][T17360] device syzkaller0 entered promiscuous mode [ 347.148071][T17363] device syzkaller0 entered promiscuous mode [ 347.194895][T17364] device sit0 left promiscuous mode [ 347.245703][T17361] device veth0_vlan left promiscuous mode [ 347.292516][T17361] device veth0_vlan entered promiscuous mode [ 347.641654][T17405] device syzkaller0 entered promiscuous mode [ 348.121552][T17426] device veth0_vlan left promiscuous mode [ 348.129673][T17426] device veth0_vlan entered promiscuous mode [ 348.780391][T17507] sit0: mtu less than device minimum [ 349.687577][T17531] device syzkaller0 entered promiscuous mode [ 349.825358][T17538] device syzkaller0 entered promiscuous mode [ 350.480848][T17575] device wg2 left promiscuous mode [ 352.174064][T17658] device pim6reg1 entered promiscuous mode [ 352.935738][T17692] device syzkaller0 entered promiscuous mode [ 353.444422][T17701] tap0: tun_chr_ioctl cmd 2147767521 [ 354.030534][T17729] Ÿë: port 1(veth0_to_team) entered blocking state [ 354.038921][T17729] Ÿë: port 1(veth0_to_team) entered disabled state [ 354.052087][T17729] device veth0_to_team entered promiscuous mode [ 356.159553][T17839] device veth0_vlan left promiscuous mode [ 356.215357][T17839] device veth0_vlan entered promiscuous mode [ 356.299929][T17840] device syzkaller0 entered promiscuous mode [ 358.667321][T17967] device syzkaller0 entered promiscuous mode [ 359.488223][T18005] @0Ù: renamed from bond_slave_1 [ 360.617010][ T24] audit: type=1400 audit(1770255096.970:176): avc: denied { create } for pid=18050 comm="syz.3.5151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 360.979592][T18065] device sit0 entered promiscuous mode [ 361.713956][ C1] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.721563][ C1] bridge0: topology change detected, propagating [ 361.728621][ C1] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.736332][ C1] bridge0: topology change detected, propagating [ 361.743958][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 364.205014][T18235] device syzkaller0 entered promiscuous mode [ 364.225830][T18238] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 364.232278][T18238] syzkaller0: linktype set to 256 [ 364.245468][T18238] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 365.262882][T18336] device syzkaller0 entered promiscuous mode [ 367.611386][T18472] device syzkaller0 entered promiscuous mode [ 371.696119][T18666] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 371.806498][T18672] syz.2.5323[18672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.806570][T18672] syz.2.5323[18672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.876579][T18672] device syzkaller0 entered promiscuous mode [ 374.415358][T18790] device macsec0 entered promiscuous mode [ 374.538901][T18795] device wg2 entered promiscuous mode [ 374.929000][T18818] device syzkaller0 entered promiscuous mode [ 377.862414][T18996] @0Ù: renamed from bond_slave_1 [ 379.250623][T19053] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 380.537739][T19092] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 380.544264][T19092] syzkaller0: linktype set to 804 [ 380.552732][T19092] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 382.523112][T19175] device syzkaller0 entered promiscuous mode [ 383.614993][T19206] pimreg0: tun_chr_ioctl cmd 1074025680 [ 386.967304][T19365] device syzkaller0 entered promiscuous mode [ 387.277387][T19391] tap0: tun_chr_ioctl cmd 1074025675 [ 387.282796][T19391] tap0: persist enabled [ 387.300321][T19391] tap0: tun_chr_ioctl cmd 1074025675 [ 387.325089][T19391] tap0: persist disabled [ 387.487753][T19402] : renamed from bond_slave_0 [ 388.396691][T19451] device sit0 entered promiscuous mode [ 389.179487][T19488] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 389.203170][T19488] syzkaller0: linktype set to 778 [ 389.533030][T19506] device syzkaller0 entered promiscuous mode [ 389.901931][T19547] device veth1_macvtap left promiscuous mode [ 389.918360][T19547] device macsec0 left promiscuous mode [ 390.023800][T19568] device syzkaller0 entered promiscuous mode [ 390.541689][T19611] device veth0_vlan left promiscuous mode [ 390.556190][T19611] device veth0_vlan entered promiscuous mode [ 391.111416][ T24] audit: type=1400 audit(1770255127.460:177): avc: denied { create } for pid=19657 comm="syz.0.5609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 391.283837][T19674] device syzkaller0 entered promiscuous mode [ 394.170971][T19802] device syzkaller0 entered promiscuous mode [ 394.454621][T19848] device veth0_vlan left promiscuous mode [ 394.512417][T19848] device veth0_vlan entered promiscuous mode [ 394.719380][T19863] device sit0 left promiscuous mode [ 394.761255][T19858] device wg2 left promiscuous mode [ 394.808169][T19863] device sit0 entered promiscuous mode [ 394.878188][T19859] device wg2 entered promiscuous mode [ 396.898500][T19969] device syzkaller0 entered promiscuous mode [ 398.446467][T20049] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.453812][T20049] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.323642][T20120] device syzkaller0 entered promiscuous mode [ 401.373000][T20179] device syzkaller0 entered promiscuous mode [ 401.466429][T20205] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.475071][T20205] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.482980][T20205] device bridge_slave_0 entered promiscuous mode [ 401.491130][T20205] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.499295][T20205] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.507443][T20205] device bridge_slave_1 entered promiscuous mode [ 401.587714][T20205] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.595177][T20205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.602668][T20205] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.610257][T20205] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.635472][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 401.645081][ T1647] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.652873][ T1647] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.669916][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 401.697549][ T1647] bridge0: port 1(bridge_slave_0) entered blocking state [ 401.704705][ T1647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 401.718856][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 401.728059][ T1647] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.735303][ T1647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 401.757356][ T9] device ip6gretap0 left promiscuous mode [ 401.765618][ T9] : port 1(ip6gretap0) entered disabled state [ 401.785853][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 401.795030][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 401.812488][T20205] device veth0_vlan entered promiscuous mode [ 401.825485][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 401.834909][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 401.843270][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 401.852530][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 401.868941][T20205] device veth1_macvtap entered promiscuous mode [ 401.891594][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 401.939994][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 401.950351][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 402.514669][ T9] device veth0_vlan left promiscuous mode [ 403.617234][T20316] device vlan0 entered promiscuous mode [ 403.675606][T20317] device syzkaller0 entered promiscuous mode [ 404.492768][T20349] device veth0_vlan left promiscuous mode [ 404.507449][T20349] device veth0_vlan entered promiscuous mode [ 404.563405][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.574719][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.610227][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.804398][T20363] device sit0 left promiscuous mode [ 405.003803][T20368] device sit0 entered promiscuous mode [ 405.196625][T20370] device syzkaller0 entered promiscuous mode [ 405.468515][T20398] ÿÿÿÿÿÿ: renamed from vlan1 [ 406.777941][T20446] device bridge0 entered promiscuous mode [ 407.336361][T20457] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 408.092227][T20529] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.111220][T20529] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.121701][T20529] device bridge_slave_0 entered promiscuous mode [ 408.146665][T20529] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.174033][T20529] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.181751][T20529] device bridge_slave_1 entered promiscuous mode [ 408.311412][T20529] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.318990][T20529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.326522][T20529] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.334197][T20529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.366192][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.374372][ T1647] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.382010][ T1647] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.405368][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.414802][ T1647] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.422230][ T1647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.429951][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.438901][ T1647] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.446297][ T1647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.473807][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.482253][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 408.498581][T20529] device veth0_vlan entered promiscuous mode [ 408.505368][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 408.517485][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 408.527191][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 408.535023][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.573849][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 408.590791][T20529] device veth1_macvtap entered promiscuous mode [ 408.625454][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 408.655119][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 408.698401][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 408.709271][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 408.780441][ T24] audit: type=1400 audit(1770255145.130:178): avc: denied { create } for pid=20563 comm="syz.3.5866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 408.951807][T20574] device syzkaller0 entered promiscuous mode [ 408.979058][T20574] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 409.417568][T20602] device syzkaller0 entered promiscuous mode [ 409.514335][T20607] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 409.535204][T20607] syzkaller0: linktype set to 778 [ 409.949911][T20628] syzkaller0: mtu greater than device maximum [ 410.126968][ T9] device veth1_macvtap left promiscuous mode [ 411.301930][T20687] žÿ: renamed from team_slave_1 [ 412.187032][T20758] device veth1_macvtap left promiscuous mode [ 412.412082][T20776] device syzkaller0 entered promiscuous mode [ 412.869007][T20799] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.879011][T20799] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.895738][T20799] device bridge_slave_0 entered promiscuous mode [ 413.002676][T20803] device syzkaller0 entered promiscuous mode [ 413.017343][T20799] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.036390][T20799] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.060444][T20799] device bridge_slave_1 entered promiscuous mode [ 413.530665][T20799] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.537939][T20799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.663602][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.679756][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 413.708384][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 413.759581][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 413.779142][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 413.794701][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.802117][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.861343][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 413.875592][ T1647] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.882850][ T1647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.893235][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 413.902066][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 413.944262][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 413.972739][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 413.988201][T20799] device veth0_vlan entered promiscuous mode [ 414.034571][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 414.043356][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.060313][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.068736][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.077454][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 414.112121][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.141822][T20799] device veth1_macvtap entered promiscuous mode [ 414.191875][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 414.210826][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 414.241106][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.311114][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 414.345168][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.991413][T20892] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 415.009007][T20892] device syzkaller0 entered promiscuous mode [ 415.146025][ T9] device veth0 left promiscuous mode [ 415.152330][ T9] bridge0: port 3(veth0) entered disabled state [ 415.162816][ T9] device bridge_slave_1 left promiscuous mode [ 415.176322][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.189469][ T9] device bridge_slave_0 left promiscuous mode [ 415.223895][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.285435][ T9] device veth0_vlan left promiscuous mode [ 417.699551][T21036] device syzkaller0 entered promiscuous mode [ 418.019326][T21057] device syzkaller0 entered promiscuous mode [ 418.030035][T21059] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 418.040023][T21059] device syzkaller0 entered promiscuous mode [ 418.622668][T21136] -1: renamed from syzkaller0 [ 421.343603][T21244] device sit0 entered promiscuous mode [ 421.765025][T21258] device syzkaller0 entered promiscuous mode [ 423.849339][T21360] tap0: tun_chr_ioctl cmd 1074025681 [ 423.988101][T21366] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.547613][ T24] audit: type=1400 audit(1770255161.900:179): avc: denied { create } for pid=21471 comm="syz.2.6131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 426.788866][T21524] device syzkaller0 entered promiscuous mode [ 428.362923][T21643] -1: renamed from syzkaller0 [ 429.755136][T21701] -1: renamed from syzkaller0 [ 430.800018][T21782] device syzkaller0 entered promiscuous mode [ 430.824968][T21786] device syzkaller0 entered promiscuous mode [ 430.884464][T21788] device syzkaller0 entered promiscuous mode [ 431.362747][T21802] tap0: tun_chr_ioctl cmd 1074025675 [ 431.382772][T21802] tap0: persist enabled [ 431.391651][T21802] tap0: tun_chr_ioctl cmd 1074025675 [ 431.398889][T21802] tap0: persist enabled [ 432.428960][T21916] device syzkaller0 entered promiscuous mode [ 432.624129][T21928] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 432.745241][T21918] syzkaller0: tun_chr_ioctl cmd 1074025698 [ 433.239354][T21955] device syzkaller0 entered promiscuous mode [ 433.404103][T21972] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.411726][T21972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.419223][T21972] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.426437][T21972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.514140][T21972] device bridge0 entered promiscuous mode [ 433.530167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 434.001878][T22002] device syzkaller0 entered promiscuous mode [ 435.802134][T22040] device syzkaller0 entered promiscuous mode [ 437.130467][T22075] device syzkaller0 entered promiscuous mode [ 438.691847][T22164] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 438.714421][T22164] syzkaller0: linktype set to 804 [ 441.144810][T22326] tap0: tun_chr_ioctl cmd 1074025677 [ 441.152624][T22326] tap0: linktype set to 270 [ 441.342360][T22348] ±ÿ: renamed from team_slave_1 [ 441.651424][T22360] device syzkaller0 entered promiscuous mode [ 443.505444][T22439] device sit0 entered promiscuous mode [ 444.271625][T22473] batadv0: tun_chr_ioctl cmd 1074025684 [ 444.452621][T22487] device syzkaller0 entered promiscuous mode [ 446.783751][T22570] device syzkaller0 entered promiscuous mode [ 447.404287][T22597] device syzkaller0 entered promiscuous mode [ 447.844992][T22627] device syzkaller0 entered promiscuous mode [ 449.302158][T22701] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.311171][T22701] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.320862][T22701] device bridge0 left promiscuous mode [ 449.330189][T22703] device veth0_vlan left promiscuous mode [ 449.343742][T22703] device veth0_vlan entered promiscuous mode [ 449.352335][T22704] device bridge_slave_1 left promiscuous mode [ 449.359701][T22704] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.368275][T22704] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.426617][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 449.437663][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 449.446781][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 449.549062][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 449.569830][T22721] device syzkaller0 left promiscuous mode [ 449.723425][T22733] device syzkaller0 entered promiscuous mode [ 451.118531][T22795] device pim6reg1 entered promiscuous mode [ 451.171528][T22806] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.993364][T22996] device syzkaller0 entered promiscuous mode [ 455.048364][T23060] lo: mtu less than device minimum [ 457.056595][T23201] @0Ù: renamed from bond_slave_1 [ 457.613799][T23240] device wg2 entered promiscuous mode [ 458.080743][T23263] device veth1_macvtap left promiscuous mode [ 458.154842][T23263] device veth1_macvtap entered promiscuous mode [ 458.165286][T23263] device macsec0 entered promiscuous mode [ 458.332594][T23281] device syzkaller0 entered promiscuous mode [ 458.411050][T23284] device syzkaller0 entered promiscuous mode [ 460.256223][T23384] device syzkaller0 entered promiscuous mode [ 460.393022][T23391] device syzkaller0 entered promiscuous mode [ 461.924399][T23461] tap1: tun_chr_ioctl cmd 2148553947 [ 462.340167][T23473] syz.2.6731[23473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.340220][T23473] syz.2.6731[23473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.477562][T23638] device wg2 entered promiscuous mode [ 467.561158][T23683] : port 1(ip6gretap0) entered blocking state [ 467.583051][T23683] : port 1(ip6gretap0) entered disabled state [ 467.602457][T23683] device ip6gretap0 entered promiscuous mode [ 467.787290][T23690] device veth1_macvtap left promiscuous mode [ 467.811022][T23687] device aaaaaaaaaaaaaaa entered promiscuous mode [ 467.862871][T23695] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.871834][T23695] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.881571][T23695] device bridge0 left promiscuous mode [ 468.030559][T23701] tun0: tun_chr_ioctl cmd 2147767507 [ 468.422701][T23723] device syzkaller0 entered promiscuous mode [ 468.436198][T23722] pimreg: tun_chr_ioctl cmd 1074025677 [ 468.441776][T23722] pimreg: linktype set to 825 [ 469.340318][T23789] device syzkaller0 entered promiscuous mode [ 469.348077][T23781] device bridge_slave_0 left promiscuous mode [ 469.502178][T23805] tap0: tun_chr_ioctl cmd 35092 [ 469.587887][T23820] ±ÿ: renamed from team_slave_1 [ 469.942590][T23843] tun0: tun_chr_ioctl cmd 1074025676 [ 469.959275][T23843] tun0: owner set to 0 [ 469.975897][T23843] tun0: tun_chr_ioctl cmd 1074812118 [ 470.272852][T23863] device lo entered promiscuous mode [ 470.294442][T23871] device wg2 left promiscuous mode [ 470.325173][T23871] device wg2 entered promiscuous mode [ 470.357718][T23875] cgroup: fork rejected by pids controller in /syz4 [ 471.070339][T24008] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.138676][T24008] bridge0: port 1(bridge_slave_0) entered disabled state [ 471.184609][T24008] device bridge_slave_0 entered promiscuous mode [ 471.238704][T24008] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.284238][T24008] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.354552][T24008] device bridge_slave_1 entered promiscuous mode [ 471.648345][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 471.661038][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 471.724378][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 471.733453][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 471.762866][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.770254][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.795002][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 471.822740][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 471.841956][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.849283][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.905778][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 471.922450][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 471.948373][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 471.999385][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 472.022697][T24008] device veth0_vlan entered promiscuous mode [ 472.040056][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 472.057770][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 472.084335][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 472.107979][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 472.166876][T24008] device veth1_macvtap entered promiscuous mode [ 472.212320][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 472.231542][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 472.566672][ T9] device bridge_slave_1 left promiscuous mode [ 472.573215][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.635743][ T9] device bridge_slave_0 left promiscuous mode [ 472.670058][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.254062][T24176] device wg2 entered promiscuous mode [ 476.662134][T24253] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.673363][T24253] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.774665][T24257] device bridge_slave_1 left promiscuous mode [ 476.794083][T24257] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.803357][T24257] device bridge_slave_0 left promiscuous mode [ 476.810041][T24257] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.013090][T24268] device syzkaller0 entered promiscuous mode [ 477.860541][T24302] device wg2 left promiscuous mode [ 478.042904][T24303] device wg2 entered promiscuous mode [ 479.041274][T24351] device sit0 entered promiscuous mode [ 479.836804][T24374] device sit0 left promiscuous mode [ 480.094233][T24378] device sit0 entered promiscuous mode [ 482.166371][T24442] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.173755][T24442] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.240019][T24442] device bridge_slave_1 left promiscuous mode [ 482.257741][T24442] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.266116][T24442] device bridge_slave_0 left promiscuous mode [ 482.272457][T24442] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.862422][T24485] -: renamed from syzkaller0 [ 483.811246][T24583] device syzkaller0 entered promiscuous mode [ 484.327179][T24615] device wg2 left promiscuous mode [ 484.395058][T24619] device wg2 entered promiscuous mode [ 487.572504][T24796] ÿÿÿÿÿÿ: renamed from vlan1 [ 487.722756][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 487.754908][T24805] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 488.980838][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 488.999982][T24854] syzkaller0: linktype set to 778 [ 489.033643][T24855] syzkaller0: tun_chr_ioctl cmd 2147767507 [ 489.066357][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 489.080171][T24854] syzkaller0: linktype set to 778 [ 489.101703][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 489.113258][T24854] syzkaller0: linktype set to 778 [ 489.358450][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 489.414451][T24854] syzkaller0: linktype set to 778 [ 489.503959][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 489.510348][T24854] syzkaller0: linktype set to 778 [ 489.608212][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 489.645100][T24854] syzkaller0: linktype set to 778 [ 489.735343][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 489.772021][T24854] syzkaller0: linktype set to 778 [ 489.794229][T24854] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 489.814395][T24854] syzkaller0: linktype set to 778 [ 489.830958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 489.935404][T24884] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 489.990589][T24879] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.029103][T24879] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.049755][T24879] device bridge_slave_0 entered promiscuous mode [ 490.093653][T24879] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.116014][T24879] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.144398][T24879] device bridge_slave_1 entered promiscuous mode [ 490.427516][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 490.445057][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 490.514119][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 490.543747][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 490.571167][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 490.578315][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 490.633914][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 490.662059][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 490.690776][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 490.719902][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 490.727216][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 490.784200][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 490.798044][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 490.838879][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 490.897113][T24879] device veth0_vlan entered promiscuous mode [ 490.928166][T24879] device veth1_macvtap entered promiscuous mode [ 490.952963][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.971965][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.997708][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.022876][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 491.075032][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 491.096034][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 491.915336][ T1647] device veth0_to_team left promiscuous mode [ 491.932004][ T1647] Ÿë: port 1(veth0_to_team) entered disabled state [ 492.791433][T25014] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 492.806224][T25014] syzkaller0: linktype set to 773 [ 493.192905][T25038] device veth0_vlan left promiscuous mode [ 493.202824][T25038] device veth0_vlan entered promiscuous mode [ 493.242097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 493.253402][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 493.311639][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 493.670783][T25051] device pimreg0 entered promiscuous mode [ 494.577761][T25120] device veth0_vlan left promiscuous mode [ 494.595822][T25120] device veth0_vlan entered promiscuous mode [ 497.851125][T25298] tap0: tun_chr_ioctl cmd 1074025675 [ 497.858904][T25298] tap0: persist enabled [ 497.920648][T25298] tap0: tun_chr_ioctl cmd 1074025675 [ 497.944200][T25298] tap0: persist enabled [ 498.798238][T25353] device syzkaller0 entered promiscuous mode [ 501.064473][T25472] syzkaller0: refused to change device tx_queue_len [ 502.086342][T25510] device pim6reg1 entered promiscuous mode [ 503.141968][T25533] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.233005][T25533] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.300455][T25533] device bridge_slave_0 entered promiscuous mode [ 503.370511][T25533] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.394020][T25533] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.409793][T25533] device bridge_slave_1 entered promiscuous mode [ 503.875579][T25533] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.883082][T25533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 503.891806][T25533] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.899399][T25533] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.034631][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.084019][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.278349][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 504.304415][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 504.370831][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 504.390008][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 504.410206][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.418849][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.445231][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 504.458096][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 504.470728][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.478002][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 504.507161][T25586] device pim6reg1 entered promiscuous mode [ 504.530458][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 504.542940][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 504.577249][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 504.587938][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 504.616687][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 504.643063][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 504.668453][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 504.678900][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 504.707572][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 504.719506][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 504.738521][T25533] device veth0_vlan entered promiscuous mode [ 504.759211][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 504.772698][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 504.787816][T25533] device veth1_macvtap entered promiscuous mode [ 504.815116][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 504.841892][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 504.853454][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 504.867816][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 504.906080][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 505.113455][ T1647] device bridge_slave_1 left promiscuous mode [ 505.133430][ T1647] bridge0: port 2(bridge_slave_1) entered disabled state [ 505.174863][ T1647] device bridge_slave_0 left promiscuous mode [ 505.181064][ T1647] bridge0: port 1(bridge_slave_0) entered disabled state [ 505.464419][T25652] device syzkaller0 entered promiscuous mode [ 505.484205][T25658] device syzkaller0 left promiscuous mode [ 511.237677][T25892] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.245353][T25892] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.307791][T25893] device bridge_slave_1 left promiscuous mode [ 511.327176][T25893] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.366340][T25893] device bridge_slave_0 left promiscuous mode [ 511.378914][T25893] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.685070][T25911] tap1: tun_chr_ioctl cmd 1074025673 [ 511.732313][T25910] tap1: tun_chr_ioctl cmd 2147767521 [ 511.754269][T25911] tap1: tun_chr_ioctl cmd 1074025673 [ 511.973348][T25916] device aaaaaaaaaaaaaaa entered promiscuous mode [ 516.182612][T26068] device syzkaller0 entered promiscuous mode [ 516.750526][T26104] device syzkaller0 left promiscuous mode [ 518.685792][T26191] device syzkaller0 entered promiscuous mode [ 518.837154][T26194] device syzkaller0 entered promiscuous mode [ 520.209076][T26300] device pim6reg1 entered promiscuous mode [ 521.296396][T26345] tap0: tun_chr_ioctl cmd 1074025677 [ 521.333977][T26345] tap0: linktype set to 780 [ 522.196254][T26394] device syzkaller0 entered promiscuous mode [ 522.213282][T26391] device syzkaller0 entered promiscuous mode [ 523.172402][T26417] device sit0 left promiscuous mode [ 523.306555][T26428] device veth0_macvtap entered promiscuous mode [ 524.466995][T26506] device syzkaller0 entered promiscuous mode [ 525.214370][T26548] device syzkaller0 entered promiscuous mode [ 525.654877][T26577] device dummy0 entered promiscuous mode [ 526.626613][T26616] bridge0: port 3(veth0_to_team) entered blocking state [ 526.637697][T26616] bridge0: port 3(veth0_to_team) entered disabled state [ 526.675393][T26616] device veth0_to_team entered promiscuous mode [ 528.782781][T26732] bridge0: port 4(gretap0) entered blocking state [ 528.876653][T26732] bridge0: port 4(gretap0) entered disabled state [ 528.977577][T26732] device gretap0 entered promiscuous mode [ 532.527115][T26920] device syzkaller0 entered promiscuous mode [ 534.995242][T27030] device veth0_vlan left promiscuous mode [ 535.027495][T27030] device veth0_vlan entered promiscuous mode [ 535.083907][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 535.102877][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 535.140419][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 535.158765][T27028] device pim6reg1 entered promiscuous mode [ 535.597428][T27062] device sit0 left promiscuous mode [ 535.633455][T27062] device sit0 entered promiscuous mode [ 536.237825][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.304242][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.311932][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.326600][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.378924][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.482539][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.495185][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.544462][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.610278][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.728394][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.775506][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.781021][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.791355][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.836265][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.844216][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.850128][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.863908][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.879921][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 536.913514][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 537.077820][T27103] tap0: tun_chr_ioctl cmd 1074025673 [ 538.842799][T27265] device sit0 entered promiscuous mode [ 539.337272][T27289] €Â0: renamed from pim6reg1 [ 541.264146][T27376] device sit0 entered promiscuous mode [ 542.051158][T27418] device syzkaller0 entered promiscuous mode [ 542.812881][T27456] device syzkaller0 entered promiscuous mode [ 544.414628][T27578] syzkaller0: create flow: hash 587122272 index 0 [ 544.517539][T27565] device syzkaller0 entered promiscuous mode [ 544.577196][T27577] device syzkaller0 entered promiscuous mode [ 544.634176][T27583] syzkaller0 (unregistered): delete flow: hash 587122272 index 0 [ 544.838768][T27605] device veth1_macvtap left promiscuous mode [ 546.173669][T27667] device syzkaller0 left promiscuous mode [ 546.755281][T27688] device syzkaller0 entered promiscuous mode [ 546.920195][T27688] device pim6reg1 entered promiscuous mode [ 547.779293][T27742] device syzkaller0 entered promiscuous mode [ 548.089183][ T1647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 548.256416][T27773] device syzkaller0 entered promiscuous mode [ 548.329399][T27782] device syzkaller0 left promiscuous mode [ 548.864932][T27837] device sit0 left promiscuous mode [ 548.889816][T27837] device sit0 entered promiscuous mode [ 549.733875][T27891] -1: renamed from syzkaller0 [ 550.425243][T27930] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 550.437055][T27930] device syzkaller0 entered promiscuous mode [ 550.666223][T27954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 551.665463][T27985] device sit0 left promiscuous mode [ 551.792348][T27985] device sit0 entered promiscuous mode [ 552.216281][T28003] pimreg1: tun_chr_ioctl cmd 1074025692 [ 553.575625][T28072] device syzkaller0 entered promiscuous mode [ 554.883791][T28144] device syzkaller0 entered promiscuous mode [ 556.845366][T28225] device syzkaller0 entered promiscuous mode [ 557.650922][T28290] tun0: tun_chr_ioctl cmd 1074025678 [ 557.663020][T28290] tun0: group set to 1 [ 560.018164][ T24] audit: type=1400 audit(1770255296.370:180): avc: denied { create } for pid=28393 comm="syz.4.8148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 563.218805][T28511] device syzkaller0 entered promiscuous mode [ 564.476258][T28587] device syzkaller0 entered promiscuous mode [ 565.832051][T28662] device syzkaller0 entered promiscuous mode [ 566.158382][T28676] device sit0 left promiscuous mode [ 566.877362][T28710] device syzkaller0 entered promiscuous mode [ 568.036917][T28783] device sit0 left promiscuous mode [ 568.181114][T28784] device sit0 entered promiscuous mode [ 568.819357][T28817] device veth0_vlan left promiscuous mode [ 568.892729][T28817] device veth0_vlan entered promiscuous mode [ 569.421024][T28851] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.432572][T28851] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.675664][T28833] device bridge_slave_1 left promiscuous mode [ 569.700083][T28833] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.755618][T28833] device bridge_slave_0 left promiscuous mode [ 569.883381][T28833] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.210407][T28855] bridge0: port 1(bridge_slave_0) entered blocking state [ 570.252663][T28855] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.300479][T28855] device bridge_slave_0 entered promiscuous mode [ 570.373831][T28855] bridge0: port 2(bridge_slave_1) entered blocking state [ 570.382447][T28855] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.393479][T28855] device bridge_slave_1 entered promiscuous mode [ 570.861337][ T7] device ip6gretap0 left promiscuous mode [ 570.900809][ T7] : port 1(ip6gretap0) entered disabled state [ 571.081662][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 571.091253][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 571.109547][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 571.119496][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 571.133174][T27285] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.143878][T27285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.164187][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 571.181662][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 571.191876][T27285] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.203317][T27285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.274570][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 571.284750][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 571.304556][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 571.328559][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 571.339137][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 571.411005][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 571.442667][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 571.455270][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 571.468119][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 571.483439][T28855] device veth0_vlan entered promiscuous mode [ 571.541075][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 571.585297][T28855] device veth1_macvtap entered promiscuous mode [ 571.603952][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 571.625070][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 571.640499][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 571.653538][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 571.674114][ T7] device gretap0 left promiscuous mode [ 571.704064][ T7] bridge0: port 4(gretap0) entered disabled state [ 571.954392][ T7] device veth0_to_team left promiscuous mode [ 571.972661][ T7] bridge0: port 3(veth0_to_team) entered disabled state [ 571.999036][ T7] device bridge_slave_1 left promiscuous mode [ 572.031084][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.068617][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.099850][ T7] device veth1_macvtap left promiscuous mode [ 572.667374][T28995] device syzkaller0 entered promiscuous mode [ 572.775141][T28995] syzkaller0: tun_net_xmit 1280 [ 572.808387][T28995] syzkaller0: create flow: hash 1596273349 index 1 [ 572.865590][T28994] syzkaller0: delete flow: hash 1596273349 index 1 [ 574.014232][T29035] device syzkaller0 entered promiscuous mode [ 574.475982][T29055] pimreg: tun_chr_ioctl cmd 1074025677 [ 574.499368][T29055] pimreg: linktype set to 825 [ 576.044644][T29099] : renamed from bond_slave_0 [ 576.198490][T29106] device syzkaller0 entered promiscuous mode [ 576.981252][T29149] device syzkaller0 entered promiscuous mode [ 577.425644][T29177] sock: sock_set_timeout: `syz.2.8366' (pid 29177) tries to set negative timeout [ 577.891651][T29207] device syzkaller0 entered promiscuous mode [ 578.564576][T29256] : renamed from bond_slave_0 [ 579.228496][T29272] syz.2.8396[29272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.228557][T29272] syz.2.8396[29272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 579.449008][T29288] Ÿë: port 1(veth0_to_team) entered blocking state [ 579.517432][T29288] Ÿë: port 1(veth0_to_team) entered disabled state [ 579.526684][T29288] device veth0_to_team entered promiscuous mode [ 579.583165][T29295] device syzkaller0 entered promiscuous mode [ 583.842980][T29447] device syzkaller0 entered promiscuous mode [ 584.679649][T29479] device syzkaller0 entered promiscuous mode [ 584.692695][ T609] syzkaller0: tun_net_xmit 48 [ 585.326906][T29503] device sit0 left promiscuous mode [ 585.605113][T29524] device sit0 entered promiscuous mode [ 586.382604][T29567] ÿÿÿÿÿÿ: renamed from vlan1 [ 586.916034][T29578] device syzkaller0 entered promiscuous mode [ 587.298599][T29635] device wg2 entered promiscuous mode [ 587.402652][T29642] +: renamed from team_slave_1 [ 587.629327][T29664] device syzkaller0 entered promiscuous mode [ 588.047204][T29673] syzkaller0: tun_chr_ioctl cmd 2147767517 [ 589.304499][T29736] device wg2 left promiscuous mode [ 589.490758][T29727] device wg2 entered promiscuous mode [ 590.333169][T29808] nr0: port 1(macsec0) entered blocking state [ 590.348414][T29808] nr0: port 1(macsec0) entered disabled state [ 590.401594][T29808] device macsec0 entered promiscuous mode [ 591.069503][T29863] device syzkaller0 entered promiscuous mode [ 593.317156][T30010] device syzkaller0 entered promiscuous mode [ 593.608896][T30025] -1: renamed from syzkaller0 [ 594.064508][T30051] device sit0 entered promiscuous mode [ 594.439628][T30057] pimreg1: tun_chr_ioctl cmd 1074025692 [ 594.633566][T30060] pimreg1: tun_chr_ioctl cmd 1074025675 [ 594.774250][T30060] pimreg1: persist disabled [ 595.066789][T30086] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 595.090814][T30086] device syzkaller0 entered promiscuous mode [ 596.970054][T30215] device wg2 left promiscuous mode [ 597.055469][T30215] device wg2 entered promiscuous mode [ 597.626224][T30250] device syzkaller0 entered promiscuous mode [ 598.124901][T30278] device sit0 left promiscuous mode [ 598.187445][T30278] device sit0 entered promiscuous mode [ 598.638662][T30320] device sit0 entered promiscuous mode [ 600.331491][T30379] device syzkaller0 entered promiscuous mode [ 604.138874][T30496] cgroup: fork rejected by pids controller in /syz3 [ 605.446736][T30540] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.454472][T30540] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.462561][T30540] device bridge_slave_0 entered promiscuous mode [ 605.478836][T30540] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.487728][T30540] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.496275][T30540] device bridge_slave_1 entered promiscuous mode [ 605.694655][T30540] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.702198][T30540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 605.710152][T30540] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.717769][T30540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.803331][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 605.818919][T27285] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.879567][T27285] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.962707][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 605.985846][T27285] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.993558][T27285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.001457][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.011569][T27285] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.019063][T27285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.055429][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 606.081366][T30540] device veth0_vlan entered promiscuous mode [ 606.114517][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 606.177967][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 606.187203][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 606.195492][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 606.204417][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 606.335031][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 606.344099][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 606.383039][T30540] device veth1_macvtap entered promiscuous mode [ 606.442034][ T7] device veth1_macvtap left promiscuous mode [ 606.450311][ T7] device veth0_vlan left promiscuous mode [ 606.677116][T30610] device syzkaller0 entered promiscuous mode [ 606.738865][T30609] device sit0 left promiscuous mode [ 606.913120][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 606.932957][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 606.947225][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 606.997034][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 607.006983][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 607.318330][T30640] sock: sock_set_timeout: `syz.3.8793' (pid 30640) tries to set negative timeout [ 607.429291][T30641] device sit0 entered promiscuous mode [ 607.773661][T30655] device syzkaller0 entered promiscuous mode [ 608.075063][T30661] device veth0_vlan left promiscuous mode [ 608.082458][T30661] device veth0_vlan entered promiscuous mode [ 608.281567][T30660] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.294279][T30660] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.302419][T30660] device bridge_slave_0 entered promiscuous mode [ 608.311695][T30660] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.320533][T30660] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.334433][T30660] device bridge_slave_1 entered promiscuous mode [ 608.660001][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 608.671790][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.776573][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 608.788117][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.804468][T27285] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.812442][T27285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.841627][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.852092][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 608.862042][T27285] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.870044][T27285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.878428][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 608.886745][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 608.909904][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 608.949535][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 608.978279][T30660] device veth0_vlan entered promiscuous mode [ 609.002306][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.020285][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.034464][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.064373][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 609.091400][T30660] device veth1_macvtap entered promiscuous mode [ 609.109622][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.130223][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.205511][T30733] device syzkaller0 entered promiscuous mode [ 609.245194][T30733] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 610.408727][T30790] device pim6reg1 entered promiscuous mode [ 610.455443][ T7] device veth0_to_team left promiscuous mode [ 610.472733][T30780] syz.3.8833[30780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.478372][ T7] Ÿë: port 1(veth0_to_team) entered disabled state [ 610.508453][T30780] syz.3.8833[30780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 610.607486][ T7] device veth1_macvtap left promiscuous mode [ 611.152675][T30821] pimreg0: tun_chr_ioctl cmd 35111 [ 611.324620][T30832] device syzkaller0 entered promiscuous mode [ 614.032476][T31006] @0Ù: renamed from bond_slave_1 [ 614.786280][T31045] device wg2 left promiscuous mode [ 618.321919][T31247] tun0: tun_chr_ioctl cmd 2147767507 [ 618.393048][T31251] device syzkaller0 entered promiscuous mode [ 618.403808][T31251] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 619.021505][T31272] device syzkaller0 entered promiscuous mode [ 621.330529][T31351] device syzkaller0 entered promiscuous mode [ 621.457457][T31366] device sit0 entered promiscuous mode [ 622.613993][T31423] device wg2 left promiscuous mode [ 624.037614][T31506] device syzkaller0 entered promiscuous mode [ 626.111496][T31572] device bridge_slave_0 entered promiscuous mode [ 627.015853][T31606] device syzkaller0 entered promiscuous mode [ 628.108065][T31642] device syzkaller0 entered promiscuous mode [ 628.414773][T31672] syz.0.9106[31672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.401156][T31736] device syzkaller0 entered promiscuous mode [ 630.548371][T31748] device syzkaller0 entered promiscuous mode [ 630.585220][T31744] tap0: tun_chr_ioctl cmd 1074025677 [ 630.590980][T31744] tap0: linktype set to 768 [ 632.064393][T31820] device syzkaller0 entered promiscuous mode [ 635.078474][T31941] device veth0_vlan left promiscuous mode [ 635.133048][T31941] device veth0_vlan entered promiscuous mode [ 635.266159][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 635.287196][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 635.314450][T27285] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 635.986444][T31961] Â: renamed from pim6reg1 [ 637.324588][T31988] : renamed from bond_slave_0 [ 638.059106][T32012] device syzkaller0 entered promiscuous mode [ 638.390991][T32040] device syzkaller0 entered promiscuous mode [ 640.574417][T32132] device syzkaller0 entered promiscuous mode [ 641.507667][T32185] device sit0 entered promiscuous mode [ 642.603248][T32239] device syzkaller0 entered promiscuous mode [ 646.573577][T32450] syzkaller0: tun_chr_ioctl cmd 35108 [ 646.614744][T32452] device sit0 left promiscuous mode [ 646.650331][T32457] device syzkaller0 entered promiscuous mode [ 646.658979][T32452] device sit0 entered promiscuous mode [ 646.716520][T32462] device syzkaller0 entered promiscuous mode [ 647.558742][T32504] : port 1(dummy0) entered blocking state [ 647.567236][T32504] : port 1(dummy0) entered disabled state [ 647.588343][T32504] device dummy0 entered promiscuous mode [ 652.842435][T32766] device syzkaller0 entered promiscuous mode [ 654.589461][ T370] device pim6reg1 entered promiscuous mode [ 655.146566][ T380] device syzkaller0 entered promiscuous mode [ 655.311201][ T414] device syzkaller0 entered promiscuous mode [ 655.776593][ T447] device syzkaller0 entered promiscuous mode [ 656.873258][ T495] device syzkaller0 entered promiscuous mode [ 658.476163][ T594] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.458338][ T665] device syzkaller0 entered promiscuous mode [ 661.109944][ T746] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 661.240397][ T746] syzkaller0: linktype set to 778 [ 663.680872][ T866] tun0: tun_chr_ioctl cmd 2147767507 [ 665.793714][ T929] device syzkaller0 entered promiscuous mode [ 667.479722][ T1041] device syzkaller0 entered promiscuous mode [ 667.486803][ T1035] ref_ctr_offset mismatch. inode: 0x39d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 667.728126][ T1059] : renamed from bond_slave_0 [ 668.424326][ T1089] tap0: tun_chr_ioctl cmd 1074025677 [ 668.430276][ T1089] tap0: linktype set to 780 [ 668.965661][ T1099] device syzkaller0 entered promiscuous mode [ 669.039934][ T1110] device syzkaller0 entered promiscuous mode [ 669.232432][ T1124] device syzkaller0 entered promiscuous mode [ 669.242546][ T1122] device veth0_vlan left promiscuous mode [ 669.251824][ T1122] device veth0_vlan entered promiscuous mode [ 670.179633][ T1162] device sit0 left promiscuous mode [ 670.361724][ T1167] device sit0 entered promiscuous mode [ 671.343320][ T1217] device syzkaller0 entered promiscuous mode [ 671.510683][ T1226] device pim6reg1 left promiscuous mode [ 671.636282][ T1233] device syzkaller0 entered promiscuous mode [ 671.800686][ T1251] bridge0: port 3(syz_tun) entered blocking state [ 671.807945][ T1251] bridge0: port 3(syz_tun) entered disabled state [ 671.821607][ T1251] device syz_tun entered promiscuous mode [ 671.827685][ T1251] bridge0: port 3(syz_tun) entered blocking state [ 671.834715][ T1251] bridge0: port 3(syz_tun) entered forwarding state [ 671.886496][ T1258] device sit0 left promiscuous mode [ 672.750974][ T1330] @0Ù: renamed from bond_slave_1 [ 676.755915][ T1583] bridge0: port 3(syz_tun) entered disabled state [ 676.763832][ T1583] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.774766][ T1583] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.865671][ T1586] device syz_tun left promiscuous mode [ 676.872861][ T1586] bridge0: port 3(syz_tun) entered disabled state [ 676.880175][ T1586] device bridge_slave_1 left promiscuous mode [ 676.887313][ T1586] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.895624][ T1586] device bridge_slave_0 left promiscuous mode [ 676.902247][ T1586] bridge0: port 1(bridge_slave_0) entered disabled state [ 682.305272][ T1803] device veth0_vlan left promiscuous mode [ 682.334138][ T1803] device veth0_vlan entered promiscuous mode [ 682.341792][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 682.355123][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 682.368372][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=9806 state=3 status=67 (errno 9: Bad file descriptor) [ 703.057250][ T24] audit: type=1400 audit(1770255439.400:181): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[2710]" dev="pipefs" ino=2710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 704.995109][ T296] device bridge_slave_1 left promiscuous mode [ 705.001675][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.010217][ T296] device bridge_slave_0 left promiscuous mode [ 705.017350][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.026490][ T296] device bridge_slave_1 left promiscuous mode [ 705.033062][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.041555][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.050281][ T296] device dummy0 left promiscuous mode [ 705.056215][ T296] : port 1(dummy0) entered disabled state [ 705.064588][ T296] device veth1_macvtap left promiscuous mode [ 705.070888][ T296] device veth0_vlan left promiscuous mode [ 705.077034][ T296] device veth1_macvtap left promiscuous mode [ 705.083430][ T296] device veth0_vlan left promiscuous mode [ 705.089710][ T296] device veth0_vlan left promiscuous mode