last executing test programs: 10.207314601s ago: executing program 1 (id=4277): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) (async) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 7.962061864s ago: executing program 1 (id=4277): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) (async) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 6.219617615s ago: executing program 0 (id=4414): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f00000004c0), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xb}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000700, 0x0, 0x0, 0x0, 0x0, 0x0) 6.181338568s ago: executing program 4 (id=4418): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000208500000001000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000009db24cd2e4d700000000000000", @ANYRES32=r1], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xffffffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2, 0xffffffffffffffff}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000001500)=ANY=[@ANYBLOB="18ff00000000000c181101000000000000000000", @ANYRESOCT=r4, @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r8}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000013c0)={{r9}, &(0x7f0000001340), &(0x7f0000001380)='%pI4 \x00'}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f00000016c0)="d0b06aa5a403157e3b04c334a65e87a06ec24f22180a14ab71a046286fd76ac892b12d79b1a079615d4fd16704426051e4109833d9611def2f13be3db04802a3181d3069eb71e7cb100d22d4171839c6bf2f18d60e40089fb6353997becd93d2fcc39e88f071ba6a71854d495ca050e0db2854e1cb97541e6e01000000323be8761b5fc4e55c2a31217cb9123879fb57ff566f24f23d85844edad270bb438888980145ca1e16b5c222277bae2b5cb91d20e52420cf27", &(0x7f0000001540)=""/155}, 0x20) (async) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000140)={r9, &(0x7f0000000140), &(0x7f00000002c0)=""/4095}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x4, &(0x7f0000001800)={{r9}, &(0x7f0000001780)=0x4, &(0x7f00000017c0)='%-010d \x00'}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffce3) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f00000012c0)={0x4, 0x80, 0x81, 0xd3, 0x3, 0x8, 0x0, 0x5, 0x24000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4cc81e60, 0x4, @perf_config_ext={0x9}, 0x502, 0x10400, 0x83a5, 0x9, 0x1, 0x9, 0x6, 0x0, 0x6, 0x0, 0x2}, r8, 0xe, 0xffffffffffffffff, 0x1) (async) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) gettid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001840)={r2, 0x58, &(0x7f00000000c0)}, 0x35) 6.135647702s ago: executing program 3 (id=4421): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) (async) close(r1) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) close(r5) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="110000000002"}) (async) 6.131783422s ago: executing program 4 (id=4422): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x3, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r4, &(0x7f0000000840), 0x2, 0x0) r5 = openat$cgroup_freezer_state(r4, &(0x7f0000002b00), 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) close(r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r6) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6.109146214s ago: executing program 1 (id=4277): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) (async) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 4.283277292s ago: executing program 0 (id=4423): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 4.275663153s ago: executing program 3 (id=4425): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000003c0), 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@o_path={&(0x7f0000000380)='./file0\x00', 0x0, 0x2008, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8, 0x8}, 0x48) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'ip6gre0\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'ip6gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x101, 0x6, 0xa5, 0xffffffffffffffff, 0x76c, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4, 0xa}, 0x48) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x894c, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r5, 0x894c, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f0000000300)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000340), &(0x7f0000000580), 0x8, 0xa, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x3, 0xffff, 0x87b, 0x356, r4, 0xffff, '\x00', r6, r3, 0x4, 0x1, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000540)='cpu&00\t||') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000002a000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000002a000000b70900000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f00000000c0)=r9, 0x4) 4.275066553s ago: executing program 4 (id=4426): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x0, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="0036d2379708d64ae1e62ee2d99ff27fe53e1d922b91b151776e3657a1fbea919b5b66996036870e62711b946db5802b81c81d2dc50955e99082580e1603bca53f62f0bbc4ec3aa1e6b989f10fb2255679de486b68a6b0ffe94f8fedecb5", @ANYRESOCT=r5], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x5647}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002dc0)={{}, &(0x7f0000002d40), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) setsockopt$sock_attach_bpf(r7, 0x1, 0x32, &(0x7f0000000200)=r8, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000000040)}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRESHEX=r6, @ANYRESOCT=r9, @ANYRES32=r4, @ANYRES8=r0], &(0x7f0000000000)='GPL\x00', 0x4b, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x90) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 4.232893716s ago: executing program 0 (id=4428): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)={0x1b, 0x0, 0x0, 0x10, 0x0, 0x1, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x6, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x73, &(0x7f00000006c0)=[{}], 0x8, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000900)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c80)={r2, 0xe0, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000009c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, &(0x7f0000000a00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf1, &(0x7f0000000a80)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000ac0), &(0x7f0000000b00), 0x8, 0xa5, 0x8, 0x8, &(0x7f0000000b40)}}, 0x10) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d00)=@o_path={&(0x7f0000000cc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000dc0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000d40), &(0x7f0000000d80)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000e00)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ec0)=@bpf_lsm={0x1d, 0x27, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7d800000}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x1, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000480)='syzkaller\x00', 0x4b4d, 0xc3, &(0x7f0000000500)=""/195, 0x41100, 0x0, '\x00', r6, 0x1b, r7, 0x8, &(0x7f0000000940)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x3, 0x6, 0x9, 0x9}, 0x10, r8, 0x0, 0x4, &(0x7f0000000e40)=[r9, r10, r11], &(0x7f0000000e80)=[{0x0, 0x5, 0xf, 0x29cffc62d8cca562}, {0x2, 0x3, 0x3, 0x8}, {0x3, 0x5, 0x5, 0xa}, {0x3, 0x1, 0x4, 0xa}], 0x10, 0xe9}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000063113900000000008510000002000000850000000000000095008b226cae00009500b10500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x89f1, &(0x7f0000000080)) 4.123896085s ago: executing program 2 (id=4429): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000001cc0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa06200007"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="b40500000000950000000000000000009845deeff60000d6113750d615e06badbb0889516b946f10da274b96d7520f293d4d86"], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00'}) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000004470000000000000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r5, &(0x7f0000000380), 0x20000000}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x10, &(0x7f0000000680), 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x16, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r6, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) 4.121515646s ago: executing program 1 (id=4277): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) (async) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 2.233504989s ago: executing program 0 (id=4430): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095", @ANYRES8=0x0], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000280), 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='net_prio.prioidx\x00', 0x0, 0x0) write$cgroup_freezer_state(r2, &(0x7f0000000300)='FROZEN\x00', 0x7) 2.231838939s ago: executing program 2 (id=4431): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2, 0x80000}, 0x10}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0xfffffc4b, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xd, 0x6, &(0x7f0000000280)=ANY=[@ANYBLOB="85200900050000000839060000000000580000000200"/32], &(0x7f00000002c0)='GPL\x00', 0x1ff, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r4, 0x4, &(0x7f00000003c0)=[0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000400)=[{}, {0x0, 0x2, 0x0, 0x8}, {0x0, 0x2, 0x2, 0xa}, {0x1, 0x0, 0x0, 0xe}]}, 0x90) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x31}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000800)=ANY=[@ANYBLOB="180100000f01000000000000fbffffff184b0000f9ffffff0000000000000000186000000500000000000000001000001838000005000031c1fb3fc7ff284e5100000000000000000064c113000400000087b6000000000000"], &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, 0x4, r2, 0x8, &(0x7f0000000700)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x1c607, r3, 0x7, &(0x7f0000000740)=[r2, r1, r1], &(0x7f0000000780)=[{0x0, 0x4, 0x1, 0xa}, {0x3, 0x1, 0xa, 0x3}, {0x3, 0x1, 0x4, 0x7}, {0x4, 0x4, 0x7, 0x4}, {0x3, 0x3, 0x6, 0x3}, {0x1, 0x4, 0xe, 0xb}, {0x0, 0x4, 0xe, 0x7}], 0x10, 0x298}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0xa, &(0x7f0000000800)=ANY=[@ANYBLOB="180100000f01000000000000fbffffff184b0000f9ffffff0000000000000000186000000500000000000000001000001838000005000031c1fb3fc7ff284e5100000000000000000064c113000400000087b6000000000000"], &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x1a, '\x00', 0x0, 0x4, r2, 0x8, &(0x7f0000000700)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x1c607, r3, 0x7, &(0x7f0000000740)=[r2, r1, r1], &(0x7f0000000780)=[{0x0, 0x4, 0x1, 0xa}, {0x3, 0x1, 0xa, 0x3}, {0x3, 0x1, 0x4, 0x7}, {0x4, 0x4, 0x7, 0x4}, {0x3, 0x3, 0x6, 0x3}, {0x1, 0x4, 0xe, 0xb}, {0x0, 0x4, 0xe, 0x7}], 0x10, 0x298}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x4, 0xc}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRESOCT=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRESOCT=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sys_exit\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sys_exit\x00', r7}, 0x10) openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) (async) r8 = openat$cgroup_freezer_state(r5, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r8, &(0x7f0000000040)='FROZEN\x00', 0x7) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2.230579679s ago: executing program 3 (id=4432): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000400)='svcrdma_send_err\x00', r3}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000500)=ANY=[@ANYRESDEC=r1, @ANYRES16=r0, @ANYRESDEC=r2, @ANYRES32, @ANYRES16=r1, @ANYRESHEX=r1, @ANYRES32=0x0], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3a359743}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r4, 0x0, 0x2c, &(0x7f00000003c0)='/proc/sys/net/\x00\x04v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x3}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_freezer_state(r7, &(0x7f0000002b00), 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x4}, 0x8) (async) close(r8) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000004c0)='ext4_prefetch_bitmaps\x00', r9}, 0x10) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed5de7e91cd360a136ce6203c23c00fe80000000000400875a65969f7e7507010400b29433b7000029"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x5}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x89f1, &(0x7f0000000080)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x5, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1000000, 0x0, 0x5}, 0x48) 2.229706129s ago: executing program 4 (id=4433): bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0x7ff, 0x201, 0x35c0, r0, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x80000004, 0x3, 0x5, 0xd}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffd16, 0x5, 0x0, 0x7, 0x1, 0x0, 0x3, 0x89080, 0x7, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000140)}, 0x400, 0x287d, 0x8001, 0x2, 0x7, 0x5, 0x0, 0x0, 0x4, 0x0, 0x10000002}, r4, 0xd, r5, 0xb) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100), 0x10}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r6, 0x1f2f, 0xe, 0x0, &(0x7f00000007c0)="9f44948721919580684010a486dd", 0x0, 0x241, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) close(r3) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x80047441, 0x0) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='../\x00\x00\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x240, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8914, &(0x7f0000000080)) close(r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x0, 0x6, 0x8001, 0x1828, 0x1, 0x4}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000181500001c8263b73716448467dfb7eebcd201bc1c46e6f3da65c3fa3473937fa78f454c39613cfc3e26aae6b11701ca0ac97b7f10b1ce7a5dd3b4f6cbd31716e4151b1f170b1a1f274ce37938f1b484c572b12e720645952e9adbff7d4630bd36c7e11db8ae812469dec5d59b39ed2b3e0b2dbd8159dbb49adb78b8c4cc91003ed78648207f7b3308b48cb0cd876260e15f563acf1fbb852f3e3bf0fe7d0a085895cf3fe2428fb6f9f426133d4b2ed834d9fd600f5d286832ed5caa1792ddcfcb9ed84371ebf91770342bb76396d1f6d85e096aa1e1d25f75108fbba5a5", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000270000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.206104721s ago: executing program 0 (id=4434): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x5b, 0x8a}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00'}, 0x18) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x8, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f0000000540)='syzkaller\x00', 0x5, 0xbc, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080), 0x10}, 0x90) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000005c0)={0x3, 0x80, 0x0, 0xf, 0x20, 0x4, 0x0, 0x300000000000, 0x200, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x2, @perf_config_ext={0x1, 0x400}, 0x100, 0xffffffffffffffff, 0x8000, 0x8, 0x9, 0x1, 0x3, 0x0, 0xffffffff, 0x0, 0x8}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='bcache_invalidate\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x20080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) write$cgroup_int(r6, &(0x7f00000001c0), 0xfffffdef) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 2.155923975s ago: executing program 3 (id=4435): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f00000004c0), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0xb}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x40000700, 0x0, 0x0, 0x0, 0x0, 0x0) 2.146532836s ago: executing program 2 (id=4436): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000feffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_netprio_ifpriomap(r4, &(0x7f0000000000)={'sit0', 0x32, 0x34}, 0x7) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) (async) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) 2.119166938s ago: executing program 1 (id=4277): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) (async) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 2.118766618s ago: executing program 4 (id=4437): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x80, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000020000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_freezer_state(r0, &(0x7f00000001c0), 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000000), 0x400000) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x401, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r4, &(0x7f0000000340)="c263b0259ad2d8382d1e9ce289241edeee597dafec8d9635bb8c2b33635e620662c83b8d96f30e6c8c5e02f562b09468fafbbbaafebb42a5b7ab34bc9854a43ebc3d6b4a695aeea3b581472e", &(0x7f00000003c0)=""/91}, 0x20) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000069117e0000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0xd6, 0x9, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000008000000000071103b00ce9a6c4f50d5e4700000000092503a9164b92750757fc083e7330380716a7e3ce27590497da24914b546e9f4b07b584a45ba6442e802d4958082d50fded6e3dc3f78b95c7b8ea1ed24483551879814d7dfd561de465bd65cc873a488ae75479b4bffed017dd2852a61"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 70.670134ms ago: executing program 0 (id=4438): openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x31}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x2}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2, 0x2, 0x4}, 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r5}, 0xfffffffffffffda7) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x31}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1, 0x0, 0x2}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x2, 0x2, 0x4}, 0x48) (async) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x15, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000100850000000100000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r4}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r5}, 0xfffffffffffffda7) (async) ioctl$SIOCSIFHWADDR(r0, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) (async) 63.664525ms ago: executing program 2 (id=4439): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x13) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'gretap0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000080)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r8, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r2, @ANYRESHEX=r5, @ANYRES8=0x0, @ANYRES32=r7], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r11}, 0x10) (async) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 61.479045ms ago: executing program 3 (id=4440): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa9) (async) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/net\x00') (async) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000097c0)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000500000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfefc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8f6eb968f200e011ea665c45a34b8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e767c6146c555688019e63c850af895abba14f6fb0092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f74fc08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8f23e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae0000c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9e413f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1dc269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da09fe8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c31082ff1d0eb10a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a58a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b884057aeb68f3d675a79907a72ace7090245df6950a06a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb511164f1502ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbd488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc816df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000000000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d044fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94a3a9341892f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5643bbed1dee9b46b6f02e572024ccf3c8ed00000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca0cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea05f01baa594c7a461afa5483231305402b52a8f9863800f127d6b4518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c104fe52837a19dd6952fe2724c0105ab158a54a6a730000000000cfb582a02f482ceb"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$SIOCSIFHWADDR(r3, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r7}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f00000001c0)=0x1) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 61.064505ms ago: executing program 4 (id=4441): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0xffbf) 4.01391ms ago: executing program 2 (id=4442): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)='%pK \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x17) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) sendmsg$unix(r2, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2], 0x18}, 0x0) close(r1) close(r0) 2.11013ms ago: executing program 2 (id=4443): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) close(r4) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x9c042, 0x0) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xce, 0x2, 0x4, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x3, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x15) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x15) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000a7f1ffff00000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000024be7dcfa3f796b5"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x0, 0x0, 0xffffff9b, 0x7f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[r6, r6, r6, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='workqueue_activate_work\x00'}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7e}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x23, 0x10000, 0x0, 0x1200, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0xb}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000780)=ANY=[@ANYBLOB="1b23000da627f3c8c3b92b6e53abe0d115179e75e2d6dd374e43f97aaf29d4d11e40c2a1ab6ea4a74249764f883bc8803f16b46b652143c8a57cd0d7101573271593f45e859eab4070490d3ac9381c0ed39a77e7c48544dc472887834c41d10aac6daa30bc3892e23076ca37c7760ded"], 0xfffffffffffffeab) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x7, 0x25, &(0x7f0000000980)=ANY=[@ANYRES64=r2, @ANYRESHEX=r6, @ANYRES8=r3, @ANYRES32=0x0, @ANYRES32=r1, @ANYRES32=r8, @ANYBLOB="0000000000000000187b795d", @ANYRES32=r7, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x21, 0xe0, &(0x7f0000000a00)=""/224, 0x41100, 0x1, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000001c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x4, 0x6, 0x5, 0x8}, 0x10, 0x0, r6, 0x5, &(0x7f0000000480)=[r8, r3, r8, 0xffffffffffffffff, r6], &(0x7f00000002c0)=[{0x0, 0x4, 0x8, 0x1}, {0x4, 0x4, 0x8, 0x9}, {0x3, 0x5, 0xd, 0x6}, {0x0, 0x5, 0xf, 0x7}, {0x2, 0x1, 0x2, 0x1}], 0x10, 0x8}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 442.07µs ago: executing program 1 (id=4277): perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r1) (async) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) (async) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) 0s ago: executing program 3 (id=4444): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pI4 \x00'}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000980)=ANY=[@ANYBLOB="95eb010018000000000000000c00008200000e000000000000090200000000006100"/48], &(0x7f0000000880)=""/115, 0x2a, 0x73, 0x0, 0xb1}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYRESHEX=r4, @ANYRES8, @ANYRES8, @ANYBLOB, @ANYRES32, @ANYBLOB="9e9d79b688197eeab0cff3749cdbe1f434e187028f0247104d0d22b7b5c19d967e934c8d16b5beb366b2d72d8a3754368737dc73e858a67df63011db13399014d613e6408e27603652e159f2da89d6f2a621e91a4442609f5694eb04f42ae20bb1c6431d51bfc59f505a8f22a81bb7bbdb857b3fd372bfd33454b2e7e7957c5034e6970f861f2a1c978415442e892d7867b562a390d921171ec033a43636ace081881e566176fed611949d8049a1db733cbc8cb01298b9f4562582a4e0a6"], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r4, 0x58, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000500d5547fc6c7747dbdffff"], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x25, &(0x7f00000009c0)=""/37, 0x40f00, 0x0, '\x00', r6, 0x1b, r5, 0x8, &(0x7f0000000ac0)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x2, 0xa, 0x1, 0xb}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000d00)=[r4], &(0x7f0000000d40)=[{0x3, 0x3, 0xc}, {0x0, 0x1, 0x3, 0xc}, {0x4, 0x2, 0xc, 0xe}, {0x3, 0x1, 0xc, 0x8}, {0x2, 0x1, 0x2, 0x1}, {0x2, 0x3, 0x0, 0x3}], 0x10, 0x2}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r10 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r12, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000001a00), 0x0, 0xfeffffff, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0xfff, 0x3a, &(0x7f0000000b00)=""/58, 0x40f00, 0x56, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000d40)={0x0, 0x4d, 0x3, 0x6}, 0x10, r13, 0x0, 0x0, &(0x7f0000000fc0)=[r8, r9, r10], 0x0, 0x10, 0x3}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x13, 0x21, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x819, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0x2b}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_fd={0x18, 0xb, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x94}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xa3f53ac15c639df}}}, &(0x7f00000001c0)='GPL\x00', 0x5e, 0x14, &(0x7f00000003c0)=""/20, 0x41000, 0xe, '\x00', r6, 0x19, r7, 0x8, &(0x7f00000004c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x7, 0x9, 0x3ff}, 0x10, r13, r0, 0x4, 0x0, &(0x7f0000000580)=[{0x1, 0x1, 0x10, 0xc}, {0x0, 0x2, 0x4, 0xa}, {0x1, 0x3, 0x2, 0x6}, {0x5, 0x5, 0x1, 0x6}], 0x10, 0x1e3}, 0x90) (async) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r14}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe}, 0x48) kernel console output (not intermixed with test programs): 1) entered disabled state [ 73.419385][ T3129] device bridge_slave_1 entered promiscuous mode [ 73.425906][ T3150] device pim6reg1 entered promiscuous mode [ 73.499782][ T3129] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.506672][ T3129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.513729][ T3129] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.520540][ T3129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.524279][ T3155] syz.1.739[3155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.527647][ T3155] syz.1.739[3155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.583438][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.678193][ T2127] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.747812][ T2127] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.933909][ T3169] device sit0 left promiscuous mode [ 73.982446][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.993502][ T2127] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.000510][ T2127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.007849][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.015801][ T2127] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.022640][ T2127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.029825][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.037769][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.051627][ T3129] device veth0_vlan entered promiscuous mode [ 74.069363][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 74.077567][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 74.085725][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 74.094599][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 74.111435][ T3129] device veth1_macvtap entered promiscuous mode [ 74.130988][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 74.141762][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 74.149538][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 74.176407][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 74.185238][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 74.212343][ T2218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 74.222863][ T2218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 74.231640][ T2218] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 74.240228][ T2218] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 74.293888][ T3211] syz.4.729 uses obsolete (PF_INET,SOCK_PACKET) [ 74.342331][ T473] device bridge_slave_1 left promiscuous mode [ 74.357744][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.390335][ T473] device bridge_slave_0 left promiscuous mode [ 74.409557][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.431240][ T473] device veth0_vlan left promiscuous mode [ 75.041734][ T3260] device syzkaller0 entered promiscuous mode [ 75.332878][ T3284] device pim6reg1 entered promiscuous mode [ 76.074332][ T3319] device veth0_vlan left promiscuous mode [ 76.171268][ T3319] device veth0_vlan entered promiscuous mode [ 76.223457][ T2128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.236264][ T2128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.260567][ T2128] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.300072][ T3336] device syzkaller0 entered promiscuous mode [ 76.434497][ T24] audit: type=1400 audit(1722598121.840:147): avc: denied { create } for pid=3345 comm="syz.0.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 76.543472][ T24] audit: type=1400 audit(1722598121.900:148): avc: denied { create } for pid=3351 comm="syz.1.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 76.866984][ T3385] device syzkaller0 entered promiscuous mode [ 76.987689][ T3397] device veth1_macvtap left promiscuous mode [ 77.061430][ T3397] device veth1_macvtap entered promiscuous mode [ 77.108069][ T3397] device macsec0 entered promiscuous mode [ 77.546856][ T3410] device veth1_macvtap left promiscuous mode [ 77.592135][ T3410] device macsec0 left promiscuous mode [ 77.751317][ T3434] device syzkaller0 entered promiscuous mode [ 78.515181][ T24] audit: type=1400 audit(1722598123.920:149): avc: denied { create } for pid=3469 comm="syz.3.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 78.954435][ T3490] syz.4.838[3490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.954485][ T3490] syz.4.838[3490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.991162][ T3547] device syzkaller0 entered promiscuous mode [ 80.629540][ T3573] bridge0: port 3(veth0_to_batadv) entered blocking state [ 80.648942][ T3573] bridge0: port 3(veth0_to_batadv) entered disabled state [ 80.684946][ T3573] device veth0_to_batadv entered promiscuous mode [ 80.708602][ T24] audit: type=1400 audit(1722598126.120:150): avc: denied { create } for pid=3587 comm="syz.0.864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 80.726217][ T3573] bridge0: port 3(veth0_to_batadv) entered blocking state [ 80.734705][ T3573] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 80.785507][ T3584] device vxcan1 entered promiscuous mode [ 80.810347][ T3590] device bridge_slave_1 left promiscuous mode [ 80.816899][ T3590] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.824477][ T3590] device bridge_slave_0 left promiscuous mode [ 80.831700][ T3590] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.389951][ T3695] device pim6reg1 entered promiscuous mode [ 84.284682][ T3723] device pim6reg1 entered promiscuous mode [ 85.019476][ T3759] device pim6reg1 entered promiscuous mode [ 85.168685][ T3772] device macsec0 entered promiscuous mode [ 85.290357][ T3772] device veth1_macvtap entered promiscuous mode [ 85.302282][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 85.390881][ T3786] device vxcan1 entered promiscuous mode [ 85.429601][ T3797] device syzkaller0 entered promiscuous mode [ 85.435954][ T3798] device pim6reg1 entered promiscuous mode [ 86.410556][ T3857] device syzkaller0 entered promiscuous mode [ 86.562778][ T3870] device vxcan1 entered promiscuous mode [ 86.750241][ T3901] syz.1.950[3901] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.357714][ T3953] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.375589][ T3953] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.382983][ T3953] device bridge_slave_0 entered promiscuous mode [ 88.391898][ T3953] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.399019][ T3953] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.406159][ T3953] device bridge_slave_1 entered promiscuous mode [ 88.468324][ T3953] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.475209][ T3953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.482299][ T3953] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.489084][ T3953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.512968][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.520632][ T2123] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.528733][ T2123] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.550272][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.558362][ T661] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.565203][ T661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.572991][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.581131][ T661] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.587995][ T661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.596171][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.604129][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.620294][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 88.650750][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 88.658733][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.667861][ T3953] device veth0_vlan entered promiscuous mode [ 88.674703][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.683313][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.696285][ T3953] device veth1_macvtap entered promiscuous mode [ 88.703179][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 88.711557][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 88.719964][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 88.735709][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 88.743950][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 88.753098][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 88.762649][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 88.818532][ T9] device gretap0 left promiscuous mode [ 88.824398][ T9] bridge0: port 3(gretap0) entered disabled state [ 88.833973][ T3972] device pim6reg1 entered promiscuous mode [ 88.971512][ T9] device bridge_slave_1 left promiscuous mode [ 88.999051][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.049067][ T9] device bridge_slave_0 left promiscuous mode [ 89.069291][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.086101][ T9] device veth1_macvtap left promiscuous mode [ 89.092036][ T9] device veth0_vlan left promiscuous mode [ 89.770721][ T3989] device syzkaller0 entered promiscuous mode [ 90.519848][ T4044] device syzkaller0 entered promiscuous mode [ 90.569010][ T4049] pim6reg: tun_chr_ioctl cmd 1074025677 [ 90.665878][ T4049] pim6reg: linktype set to 780 [ 90.868639][ T4081] bridge0: port 3(veth0_to_batadv) entered blocking state [ 90.875645][ T4081] bridge0: port 3(veth0_to_batadv) entered disabled state [ 90.883203][ T4081] device veth0_to_batadv entered promiscuous mode [ 90.890068][ T4081] bridge0: port 3(veth0_to_batadv) entered blocking state [ 90.897015][ T4081] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 91.040819][ T4115] device pim6reg1 entered promiscuous mode [ 91.701779][ T4170] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.708758][ T4170] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.802154][ T4176] device bridge_slave_1 left promiscuous mode [ 91.853355][ T4176] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.893705][ T4176] device bridge_slave_0 left promiscuous mode [ 91.912355][ T4176] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.071438][ T24] audit: type=1400 audit(1722598137.480:151): avc: denied { append } for pid=4218 comm="syz.0.1036" name="ppp" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 92.616541][ T4246] device pim6reg1 entered promiscuous mode [ 93.124475][ T4288] device syzkaller0 entered promiscuous mode [ 93.256234][ T4288] device pim6reg1 entered promiscuous mode [ 93.550588][ T4331] cgroup: fork rejected by pids controller in /syz0 [ 93.597706][ T4328] device syzkaller0 entered promiscuous mode [ 93.620656][ T4329] device syzkaller0 entered promiscuous mode [ 94.214277][ T4359] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.221608][ T4359] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.229003][ T4359] device bridge_slave_0 entered promiscuous mode [ 94.235842][ T4359] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.243521][ T4359] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.250797][ T4359] device bridge_slave_1 entered promiscuous mode [ 94.391853][ T4392] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 94.397246][ T4392] dvmrp1: linktype set to 768 [ 94.408291][ T4359] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.415132][ T4359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.422241][ T4359] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.429015][ T4359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.528601][ T2221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.535871][ T2221] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.542981][ T2221] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.553785][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.562167][ T2122] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.569022][ T2122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.592250][ T4359] device veth0_vlan entered promiscuous mode [ 94.598984][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.612251][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.619961][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.627087][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.634240][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.642165][ T2122] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.648988][ T2122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.656168][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.663847][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.690524][ T4359] device veth1_macvtap entered promiscuous mode [ 94.697411][ T2222] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.709869][ T2122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.719680][ T2221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.800341][ T4428] device syzkaller0 entered promiscuous mode [ 96.662660][ T4514] device syzkaller0 entered promiscuous mode [ 97.394534][ T7] device veth1_macvtap left promiscuous mode [ 98.451829][ T4627] device syzkaller0 entered promiscuous mode [ 99.533063][ T4664] device sit0 entered promiscuous mode [ 100.210642][ T4668] device veth1_macvtap left promiscuous mode [ 100.217927][ T4668] device macsec0 entered promiscuous mode [ 100.254502][ T4682] device sit0 left promiscuous mode [ 100.270448][ T4682] device sit0 entered promiscuous mode [ 101.136699][ T7] device bridge_slave_1 left promiscuous mode [ 101.142657][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.149945][ T7] device bridge_slave_0 left promiscuous mode [ 101.155899][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.163502][ T7] device bridge_slave_1 left promiscuous mode [ 101.169484][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.176630][ T7] device bridge_slave_0 left promiscuous mode [ 101.182556][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.190501][ T7] device veth0_to_batadv left promiscuous mode [ 101.196647][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 101.203740][ T7] device bridge_slave_1 left promiscuous mode [ 101.209698][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.216769][ T7] device bridge_slave_0 left promiscuous mode [ 101.222676][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.230491][ T7] device veth1_macvtap left promiscuous mode [ 101.236347][ T7] device veth0_vlan left promiscuous mode [ 101.242045][ T7] device veth1_macvtap left promiscuous mode [ 101.247900][ T7] device veth0_vlan left promiscuous mode [ 102.225467][ T4804] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.232552][ T4804] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.239682][ T24] audit: type=1400 audit(1722598147.650:152): avc: denied { remove_name } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 102.240057][ T4804] device bridge_slave_0 entered promiscuous mode [ 102.261939][ T24] audit: type=1400 audit(1722598147.650:153): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 102.290475][ T4804] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.297353][ T4804] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.304405][ T4804] device bridge_slave_1 entered promiscuous mode [ 102.340590][ T4804] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.347431][ T4804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.354482][ T4804] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.361329][ T4804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.376539][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.383880][ T661] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.391151][ T661] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.407348][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 102.415218][ T2224] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.422002][ T2224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.429574][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 102.437507][ T2224] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.444314][ T2224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.451502][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 102.459178][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.470741][ T4804] device veth0_vlan entered promiscuous mode [ 102.476769][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 102.484373][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 102.491679][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 102.498987][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 102.510460][ T4804] device veth1_macvtap entered promiscuous mode [ 102.517252][ T2131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.527510][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.538281][ T661] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.106415][ T4814] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.113602][ T4814] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.121181][ T4814] device bridge_slave_0 entered promiscuous mode [ 104.128546][ T4814] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.135425][ T4814] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.142638][ T4814] device bridge_slave_1 entered promiscuous mode [ 104.184603][ T4814] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.191448][ T4814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.198542][ T4814] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.205315][ T4814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.221662][ T2224] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.228879][ T2224] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.235917][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.243308][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.251645][ T2131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 104.259554][ T2131] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.266297][ T2131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.274301][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.282488][ T2224] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.289337][ T2224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.306867][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.314892][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.322821][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.330193][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.338194][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.345807][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.353828][ T4814] device veth0_vlan entered promiscuous mode [ 104.363093][ T2131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.371937][ T4814] device veth1_macvtap entered promiscuous mode [ 104.381987][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.390357][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.868196][ T4829] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.875049][ T4829] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.883180][ T4829] device bridge_slave_0 entered promiscuous mode [ 105.896204][ T4829] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.903089][ T4829] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.910361][ T4829] device bridge_slave_1 entered promiscuous mode [ 105.954498][ T4829] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.961361][ T4829] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.968462][ T4829] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.975553][ T4829] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.997597][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.008432][ T2224] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.018323][ T2224] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.032167][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.041032][ T2224] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.047881][ T2224] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.066593][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.074568][ T2224] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.081434][ T2224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.092183][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.100028][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.146001][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 106.160189][ T4829] device veth0_vlan entered promiscuous mode [ 106.177154][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.187197][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.194385][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.210388][ T4829] device veth1_macvtap entered promiscuous mode [ 106.218029][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 106.225923][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 106.234456][ T2223] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 106.249744][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 106.258484][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.268852][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 106.286506][ T2224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.654268][ T4960] device syzkaller0 entered promiscuous mode [ 107.827391][ T4967] device sit0 entered promiscuous mode [ 107.868843][ T4979] syz.3.1217[4979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.868875][ T4979] syz.3.1217[4979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.892904][ T4979] device syzkaller0 entered promiscuous mode [ 108.084938][ T4994] device pim6reg1 entered promiscuous mode [ 108.125864][ T4997] syz.3.1223[4997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.125896][ T4997] syz.3.1223[4997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.730326][ T5035] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.748388][ T5035] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.755489][ T5035] device bridge_slave_0 entered promiscuous mode [ 108.762881][ T5035] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.769856][ T5035] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.777214][ T5035] device bridge_slave_1 entered promiscuous mode [ 108.819850][ T5035] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.826707][ T5035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.833798][ T5035] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.840598][ T5035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.862490][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 108.870094][ T476] bridge0: port 1(bridge_slave_0) entered disabled state [ 108.877798][ T476] bridge0: port 2(bridge_slave_1) entered disabled state [ 108.896590][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 108.904539][ T476] bridge0: port 1(bridge_slave_0) entered blocking state [ 108.911391][ T476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 108.918969][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 108.927791][ T476] bridge0: port 2(bridge_slave_1) entered blocking state [ 108.934627][ T476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 108.942040][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 108.949833][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 108.965994][ T5035] device veth0_vlan entered promiscuous mode [ 108.972898][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 108.981442][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 108.989425][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.998422][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.011508][ T5035] device veth1_macvtap entered promiscuous mode [ 109.026890][ T476] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.042561][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.056871][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.114875][ T5043] syz.0.1239[5043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.114916][ T5043] syz.0.1239[5043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.184641][ T5050] device syzkaller0 entered promiscuous mode [ 109.228485][ T5053] device syzkaller0 entered promiscuous mode [ 110.161032][ T5080] device pim6reg1 entered promiscuous mode [ 111.172025][ T5146] device syzkaller0 entered promiscuous mode [ 111.674660][ T5174] device sit0 entered promiscuous mode [ 111.882439][ T24] audit: type=1400 audit(1722598157.290:154): avc: denied { create } for pid=5177 comm="syz.4.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 112.454096][ T5185] device veth1_macvtap left promiscuous mode [ 112.459964][ T5185] device macsec0 entered promiscuous mode [ 112.864116][ T24] audit: type=1400 audit(1722598158.270:155): avc: denied { create } for pid=5220 comm="syz.3.1291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 113.543695][ T5256] device syzkaller0 entered promiscuous mode [ 114.627453][ T5269] device syzkaller0 entered promiscuous mode [ 114.740680][ T5283] syz.3.1307[5283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.740727][ T5283] syz.3.1307[5283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 115.464695][ T5308] device syzkaller0 entered promiscuous mode [ 117.335032][ T5348] device syzkaller0 entered promiscuous mode [ 117.607737][ T5334] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.634393][ T5334] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.646518][ T5334] device bridge_slave_0 entered promiscuous mode [ 117.653355][ T5334] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.665178][ T5334] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.677196][ T5334] device bridge_slave_1 entered promiscuous mode [ 117.942694][ T5334] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.949552][ T5334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.956650][ T5334] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.963425][ T5334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.019416][ T5377] device syzkaller0 entered promiscuous mode [ 118.056389][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.066321][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.087497][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.094732][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.186865][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.215518][ T2126] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.222386][ T2126] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.465714][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.473736][ T2126] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.480593][ T2126] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.510630][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.528550][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.577340][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 118.597627][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 118.750406][ T5334] device veth0_vlan entered promiscuous mode [ 118.829180][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 118.881234][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 119.045642][ T5334] device veth1_macvtap entered promiscuous mode [ 119.157140][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 119.197011][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 119.320624][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 119.440410][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 119.568140][ T2124] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 119.692654][ T2202] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 119.727618][ T2202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.735738][ T2202] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 119.900581][ T2202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.911861][ T5425] device macsec0 entered promiscuous mode [ 119.919940][ T5423] device veth1_macvtap left promiscuous mode [ 119.929253][ T5422] device macsec0 entered promiscuous mode [ 120.992649][ T5538] device syzkaller0 entered promiscuous mode [ 121.768052][ T5639] device macsec0 entered promiscuous mode [ 121.774519][ T5639] device veth1_macvtap entered promiscuous mode [ 121.781509][ T2202] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.826036][ T5647] device veth1_macvtap left promiscuous mode [ 121.831917][ T5647] device macsec0 entered promiscuous mode [ 122.505319][ T5648] ªªªªªª: renamed from vlan0 [ 123.298459][ T5675] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.305437][ T5675] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.471972][ T5676] device syzkaller0 entered promiscuous mode [ 125.013672][ T5765] device syzkaller0 entered promiscuous mode [ 125.034123][ T5763] device pim6reg1 entered promiscuous mode [ 125.040792][ T2202] syzkaller0: tun_net_xmit 48 [ 125.282730][ T5805] device sit0 entered promiscuous mode [ 126.591755][ T24] audit: type=1400 audit(1722598171.990:156): avc: denied { write } for pid=5842 comm="syz.2.1446" name="cgroup.subtree_control" dev="cgroup2" ino=329 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 126.842403][ T24] audit: type=1400 audit(1722598172.050:157): avc: denied { open } for pid=5842 comm="syz.2.1446" path="" dev="cgroup2" ino=329 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 127.105540][ T5881] device pim6reg1 entered promiscuous mode [ 127.230710][ T5899] syz.2.1461[5899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.230755][ T5899] syz.2.1461[5899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.009539][ T5917] device pim6reg1 entered promiscuous mode [ 128.407713][ T5939] device pim6reg1 entered promiscuous mode [ 128.659069][ T5995] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.666063][ T5995] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.843273][ T6001] device pim6reg1 entered promiscuous mode [ 128.924808][ T6023] syz.3.1495[6023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.924860][ T6023] syz.3.1495[6023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.061686][ T6037] syz.3.1495[6037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.226188][ T6037] syz.3.1495[6037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.435257][ T6061] cgroup: fork rejected by pids controller in /syz2 [ 130.627960][ T473] device bridge_slave_1 left promiscuous mode [ 130.753169][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.929317][ T473] device bridge_slave_0 left promiscuous mode [ 130.935259][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.164876][ T473] device veth0_to_batadv left promiscuous mode [ 131.214372][ T473] bridge0: port 3(veth0_to_batadv) entered disabled state [ 131.240429][ T473] device bridge_slave_1 left promiscuous mode [ 131.246423][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.253624][ T473] device bridge_slave_0 left promiscuous mode [ 131.259745][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.267710][ T473] device veth1_macvtap left promiscuous mode [ 131.277704][ T473] device veth0_vlan left promiscuous mode [ 131.283792][ T473] device veth1_macvtap left promiscuous mode [ 131.501591][ T6194] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.508814][ T6194] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.516312][ T6194] device bridge_slave_0 entered promiscuous mode [ 131.523786][ T6194] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.532390][ T6194] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.542418][ T6194] device bridge_slave_1 entered promiscuous mode [ 131.604066][ T2203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.612075][ T2203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.627811][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.635880][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.646849][ T2200] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.653700][ T2200] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.661178][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.669415][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.677764][ T2200] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.684591][ T2200] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.716737][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.730124][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.743519][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.755627][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.767954][ T6194] device veth0_vlan entered promiscuous mode [ 131.826367][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.854588][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.862307][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.909536][ T6194] device veth1_macvtap entered promiscuous mode [ 131.947626][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.970998][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.043308][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.238111][ T473] device bridge_slave_1 left promiscuous mode [ 133.249227][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.257427][ T473] device bridge_slave_0 left promiscuous mode [ 133.263381][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.593017][ T24] audit: type=1400 audit(1722598179.000:158): avc: denied { setattr } for pid=6345 comm="syz.3.1554" path="/net/tun" dev="devtmpfs" ino=131 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 134.032180][ T6377] syz.2.1563[6377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.032230][ T6377] syz.2.1563[6377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.670600][ T6404] syz.0.1569[6404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.814699][ T6404] syz.0.1569[6404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.110132][ T6426] device macsec0 left promiscuous mode [ 136.010040][ T6485] syz.0.1586[6485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 136.010090][ T6485] syz.0.1586[6485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.518511][ T6569] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.536722][ T6569] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.882055][ T6653] device syzkaller0 entered promiscuous mode [ 137.980343][ T6665] device veth0_vlan left promiscuous mode [ 137.991588][ T6665] device veth0_vlan entered promiscuous mode [ 138.086597][ T6678] device pim6reg1 entered promiscuous mode [ 143.521644][ T6917] device syzkaller0 entered promiscuous mode [ 145.173724][ T6949] device syzkaller0 entered promiscuous mode [ 145.322971][ T6959] bridge0: port 3(veth0_to_batadv) entered blocking state [ 145.348633][ T6959] bridge0: port 3(veth0_to_batadv) entered disabled state [ 145.447819][ T6959] device veth0_to_batadv entered promiscuous mode [ 146.797708][ T7003] device wg2 entered promiscuous mode [ 147.571700][ T7019] device syzkaller0 entered promiscuous mode [ 148.118336][ T7057] device sit0 entered promiscuous mode [ 148.853634][ T7062] device veth1_macvtap left promiscuous mode [ 148.859584][ T7062] device macsec0 entered promiscuous mode [ 149.404311][ T7094] tap0: tun_chr_ioctl cmd 1074025692 [ 150.789262][ T7150] device pim6reg1 entered promiscuous mode [ 154.231490][ T24] audit: type=1400 audit(1722598199.640:159): avc: denied { create } for pid=7301 comm="syz.4.1804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 158.488648][ T7447] device syzkaller0 entered promiscuous mode [ 158.897564][ T7471] bridge0: port 3(veth0_to_batadv) entered blocking state [ 158.909465][ T7471] bridge0: port 3(veth0_to_batadv) entered disabled state [ 158.921770][ T7489] syz.4.1850[7489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.921813][ T7489] syz.4.1850[7489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.986193][ T7471] device veth0_to_batadv entered promiscuous mode [ 159.087322][ T7471] bridge0: port 3(veth0_to_batadv) entered blocking state [ 159.096011][ T7471] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 159.143087][ T7493] device veth0_to_batadv left promiscuous mode [ 159.149416][ T7493] bridge0: port 3(veth0_to_batadv) entered disabled state [ 159.729116][ T7509] device pim6reg1 entered promiscuous mode [ 159.765838][ T7512] device gre0 entered promiscuous mode [ 159.835065][ T7515] bridge_slave_0: mtu greater than device maximum [ 160.760531][ T7565] device veth0_vlan left promiscuous mode [ 160.845364][ T7565] device veth0_vlan entered promiscuous mode [ 161.054905][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.100801][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 161.112903][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.560876][ T7647] device syzkaller0 entered promiscuous mode [ 163.288143][ T7699] device pim6reg1 entered promiscuous mode [ 166.762883][ T7810] device syzkaller0 entered promiscuous mode [ 166.970946][ T7846] device syzkaller0 entered promiscuous mode [ 167.219774][ T7872] syz.4.1959[7872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.219822][ T7872] syz.4.1959[7872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.503193][ T24] audit: type=1400 audit(1722598213.910:160): avc: denied { create } for pid=7931 comm="syz.2.1974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 168.806660][ T24] audit: type=1400 audit(1722598214.220:161): avc: denied { append } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 168.918686][ T24] audit: type=1400 audit(1722598214.220:162): avc: denied { open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 169.026610][ T24] audit: type=1400 audit(1722598214.220:163): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 169.391425][ T7949] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.414888][ T7949] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.521056][ T7949] device bridge_slave_0 entered promiscuous mode [ 169.767360][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.776386][ T7949] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.783641][ T7949] device bridge_slave_1 entered promiscuous mode [ 170.207049][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.214387][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.367215][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.375649][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.383649][ T2127] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.390505][ T2127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.397962][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.406337][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.414318][ T2127] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.421173][ T2127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.450960][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.461335][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.469353][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.713189][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.730769][ T7949] device veth0_vlan entered promiscuous mode [ 170.739038][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.751191][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.773411][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.888289][ T2126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.981784][ T7949] device veth1_macvtap entered promiscuous mode [ 171.008681][ T9] device veth0_to_batadv left promiscuous mode [ 171.014705][ T9] bridge0: port 3(veth0_to_batadv) entered disabled state [ 171.104004][ T9] device bridge_slave_1 left promiscuous mode [ 171.109991][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.117223][ T9] device bridge_slave_0 left promiscuous mode [ 171.123206][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.131680][ T9] device veth0_vlan left promiscuous mode [ 171.562977][ T8006] device syzkaller0 entered promiscuous mode [ 171.594228][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.635212][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.722358][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.730474][ T2127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.604139][ T8058] device syzkaller0 entered promiscuous mode [ 175.712179][ T8229] device syzkaller0 entered promiscuous mode [ 176.066703][ T8249] device wg2 entered promiscuous mode [ 176.579178][ T8280] device macsec0 left promiscuous mode [ 178.201940][ T8300] device syzkaller0 entered promiscuous mode [ 178.266184][ T8313] device wg2 entered promiscuous mode [ 178.729796][ T8337] device syzkaller0 entered promiscuous mode [ 179.019861][ T8359] device syzkaller0 entered promiscuous mode [ 179.611381][ T8446] tap0: tun_chr_ioctl cmd 1074025677 [ 179.616669][ T8446] tap0: linktype set to 65534 [ 179.740793][ T8459] device wg2 left promiscuous mode [ 179.781530][ T8456] device veth0_vlan left promiscuous mode [ 179.884341][ T8456] device veth0_vlan entered promiscuous mode [ 180.132874][ T8474] syz.1.2127[8474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.132920][ T8474] syz.1.2127[8474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.157970][ T8503] device syzkaller0 entered promiscuous mode [ 182.807011][ T8578] device sit0 left promiscuous mode [ 182.818427][ T8578] device sit0 entered promiscuous mode [ 183.018868][ T8596] device pim6reg1 entered promiscuous mode [ 184.540093][ T8666] geneve1: tun_chr_ioctl cmd 1074025698 [ 184.553377][ T8667] geneve1: tun_chr_ioctl cmd 1074025698 [ 185.236663][ T8705] syz.1.2186[8705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.241493][ T8705] syz.1.2186[8705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.782345][ T24] audit: type=1400 audit(1722598231.190:164): avc: denied { create } for pid=8715 comm="syz.3.2190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 185.860154][ T8722] device syzkaller0 entered promiscuous mode [ 185.882506][ T8723] device pim6reg1 entered promiscuous mode [ 185.888615][ T8722] PF_CAN: dropped non conform CAN FD skbuff: dev type 65534, len 65487 [ 186.482563][ T24] audit: type=1400 audit(1722598231.890:165): avc: denied { create } for pid=8750 comm="syz.3.2199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 187.220951][ T8775] device pim6reg1 entered promiscuous mode [ 187.638270][ T8785] device pim6reg1 entered promiscuous mode [ 188.041540][ T8805] device syzkaller0 entered promiscuous mode [ 188.615775][ T24] audit: type=1400 audit(1722598234.020:166): avc: denied { write } for pid=8820 comm="syz.4.2217" name="task" dev="proc" ino=41185 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 188.723665][ T24] audit: type=1400 audit(1722598234.020:167): avc: denied { add_name } for pid=8820 comm="syz.4.2217" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 188.900932][ T24] audit: type=1400 audit(1722598234.020:168): avc: denied { create } for pid=8820 comm="syz.4.2217" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 189.079770][ T24] audit: type=1400 audit(1722598234.020:169): avc: denied { associate } for pid=8820 comm="syz.4.2217" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 189.869536][ T8866] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.876534][ T8866] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.884897][ T8866] device bridge_slave_0 entered promiscuous mode [ 189.891954][ T8866] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.898997][ T8866] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.906465][ T8866] device bridge_slave_1 entered promiscuous mode [ 189.949383][ T8866] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.956238][ T8866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.963319][ T8866] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.970155][ T8866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.991162][ T650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.998808][ T650] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.009872][ T650] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.027386][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.035345][ T649] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.042210][ T649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.089906][ T649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.099044][ T649] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.105876][ T649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.635191][ T8892] device syzkaller0 entered promiscuous mode [ 190.661696][ T650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.669513][ T650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.694326][ T8866] device veth0_vlan entered promiscuous mode [ 190.720855][ T2204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.730229][ T2204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.739349][ T2204] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 190.747043][ T2204] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 190.754815][ T2204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 190.762070][ T2204] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.775107][ T8866] device veth1_macvtap entered promiscuous mode [ 190.885734][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 190.948634][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 190.969997][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.090000][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.099613][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.108904][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.117460][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.172979][ T8954] syz.4.2252[8954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.173030][ T8954] syz.4.2252[8954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.266417][ T8961] syz.4.2252[8961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.440217][ T8961] syz.4.2252[8961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.176893][ T94] udevd[94]: worker [311] terminated by signal 33 (Unknown signal 33) [ 194.196381][ T94] udevd[94]: worker [311] failed while handling '/devices/virtual/block/loop0' [ 194.206145][ T9062] syz.2.2278[9062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.206196][ T9062] syz.2.2278[9062] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.396462][ T9116] syz.2.2294[9116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.407983][ T9116] syz.2.2294[9116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.420010][ T9116] syz.2.2294[9116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.504112][ T9116] syz.2.2294[9116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.343878][ T9201] device syzkaller0 entered promiscuous mode [ 197.379541][ T9210] device pim6reg1 entered promiscuous mode [ 197.639602][ T9229] device sit0 left promiscuous mode [ 197.709234][ T9244] device veth1_macvtap entered promiscuous mode [ 197.715413][ T9244] device macsec0 entered promiscuous mode [ 197.722081][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 197.756268][ T9245] device syzkaller0 entered promiscuous mode [ 198.677373][ T9298] device sit0 entered promiscuous mode [ 200.421758][ T9380] Â: renamed from pim6reg1 [ 202.521940][ T9475] device pim6reg1 entered promiscuous mode [ 203.321944][ T9510] device syzkaller0 entered promiscuous mode [ 203.396479][ T9528] device veth1_macvtap left promiscuous mode [ 203.404657][ T9528] device veth1_macvtap entered promiscuous mode [ 203.412850][ T9528] device macsec0 entered promiscuous mode [ 204.747951][ T9580] device syzkaller0 entered promiscuous mode [ 205.735502][ T9602] device syzkaller0 entered promiscuous mode [ 206.345023][ T9661] device veth1_macvtap left promiscuous mode [ 206.351765][ T9661] device macsec0 entered promiscuous mode [ 206.472442][ T9668] device syzkaller0 entered promiscuous mode [ 206.991140][ T9699] ¯Ê®¸}p: renamed from pim6reg1 [ 207.420510][ T9740] device syzkaller0 entered promiscuous mode [ 207.504033][ T9758] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.511032][ T9758] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.807483][ T9811] device syzkaller0 entered promiscuous mode [ 210.564890][ T9844] device syzkaller0 entered promiscuous mode [ 211.225942][ T9896] device syzkaller0 entered promiscuous mode [ 211.428292][ T9896] bpf_get_probe_write_proto: 2 callbacks suppressed [ 211.428301][ T9896] syz.3.2500[9896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.434946][ T9896] syz.3.2500[9896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.586068][ T9927] device syzkaller0 entered promiscuous mode [ 211.676532][ T9918] device syzkaller0 entered promiscuous mode [ 211.691639][ T9938] device sit0 left promiscuous mode [ 211.705476][ T9938] device sit0 entered promiscuous mode [ 213.760296][T10002] device veth0_vlan left promiscuous mode [ 213.891026][T10002] device veth0_vlan entered promiscuous mode [ 216.786347][T10092] ªªªªªª: renamed from vlan0 [ 218.386275][T10151] ªªªªªª: renamed from vlan0 [ 218.480083][T10168] ¯Ê®¸}p: renamed from pim6reg1 [ 218.717693][T10184] device syzkaller0 entered promiscuous mode [ 219.301592][T10193] device pim6reg1 entered promiscuous mode [ 220.798854][T10270] device pim6reg1 entered promiscuous mode [ 220.929460][T10294] syz.0.2605[10294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.929522][T10294] syz.0.2605[10294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.038848][T10407] device pim6reg1 entered promiscuous mode [ 223.194471][T10441] device veth0_vlan left promiscuous mode [ 223.201491][T10441] device veth0_vlan entered promiscuous mode [ 223.208935][ T2209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 223.218722][ T2209] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 223.227206][ T2209] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.048780][T10488] device wg2 entered promiscuous mode [ 226.684857][T10626] device sit0 entered promiscuous mode [ 227.316141][T10692] device veth0_vlan left promiscuous mode [ 227.370039][T10692] device veth0_vlan entered promiscuous mode [ 227.536447][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.554186][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 227.562041][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 227.759892][T10700] bridge0: port 3(veth0_to_batadv) entered blocking state [ 227.766927][T10700] bridge0: port 3(veth0_to_batadv) entered disabled state [ 227.774164][T10700] device veth0_to_batadv entered promiscuous mode [ 230.505807][T10796] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.512777][T10796] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.524318][T10796] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.531547][T10796] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.554487][T10796] device bridge0 entered promiscuous mode [ 230.689365][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.720955][T10823] device sit0 entered promiscuous mode [ 230.867533][T10822] device syzkaller0 entered promiscuous mode [ 230.904003][T10830] bridge_slave_0: mtu greater than device maximum [ 232.693966][T10937] device veth0_vlan left promiscuous mode [ 232.707745][T10937] device veth0_vlan entered promiscuous mode [ 233.562443][T10968] syz.4.2788[10968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.562492][T10968] syz.4.2788[10968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.720101][T10973] device sit0 entered promiscuous mode [ 233.772001][T10980] syz.0.2794[10980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.772050][T10980] syz.0.2794[10980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.201790][T11006] device syzkaller0 entered promiscuous mode [ 235.768023][T11035] bridge0: port 3(veth0_to_batadv) entered blocking state [ 235.778346][T11035] bridge0: port 3(veth0_to_batadv) entered disabled state [ 235.797280][T11035] device veth0_to_batadv entered promiscuous mode [ 235.803692][T11035] bridge0: port 3(veth0_to_batadv) entered blocking state [ 235.810650][T11035] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 235.827941][T11037] device veth0_to_batadv left promiscuous mode [ 235.834414][T11037] bridge0: port 3(veth0_to_batadv) entered disabled state [ 237.504676][T11155] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.511669][T11155] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.672776][T11158] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.679739][T11158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.686881][T11158] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.693709][T11158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.833728][T11158] device bridge0 entered promiscuous mode [ 238.222765][T11204] syz.4.2855[11204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.222812][T11204] syz.4.2855[11204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.177659][T11338] bridge_slave_0: mtu greater than device maximum [ 241.997476][T11385] syz.4.2902[11385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.997530][T11385] syz.4.2902[11385] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.976364][T11404] syz.0.2908[11404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.116072][T11404] syz.0.2908[11404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.180778][T11410] device pim6reg1 entered promiscuous mode [ 243.817575][T11426] syz.4.2915[11426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.817626][T11426] syz.4.2915[11426] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.869098][ T24] audit: type=1400 audit(1722598290.270:170): avc: denied { create } for pid=11445 comm="syz.3.2921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 244.968474][T11442] device syzkaller0 entered promiscuous mode [ 245.102010][T11455] device veth0_to_batadv left promiscuous mode [ 245.117014][T11455] bridge0: port 3(veth0_to_batadv) entered disabled state [ 245.242468][T11463] device veth0_vlan left promiscuous mode [ 245.279625][T11463] device veth0_vlan entered promiscuous mode [ 245.380041][T11479] device syzkaller0 entered promiscuous mode [ 246.691503][T11518] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.736310][T11518] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.743662][T11518] device bridge_slave_0 entered promiscuous mode [ 246.751582][T11518] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.759016][T11518] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.767449][T11518] device bridge_slave_1 entered promiscuous mode [ 246.844178][T11518] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.851062][T11518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.858184][T11518] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.865026][T11518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.100661][ T2210] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.115523][ T2210] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.230699][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.341012][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.408970][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.420309][ T2212] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.427373][ T2212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.450764][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.466425][ T2212] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.473325][ T2212] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.503229][ T8415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.513273][ T8415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.916085][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.924229][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.932874][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.940743][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.949576][T11518] device veth0_vlan entered promiscuous mode [ 247.956868][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.964078][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.979673][T11567] geneve1: tun_chr_ioctl cmd 1074025698 [ 247.985064][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.993330][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.002255][T11518] device veth1_macvtap entered promiscuous mode [ 248.015784][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.023229][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 248.031309][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 248.043712][ T2211] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 248.051977][ T2211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.320715][ T7] device bridge_slave_1 left promiscuous mode [ 248.327572][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.334925][ T7] device bridge_slave_0 left promiscuous mode [ 248.342056][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.350469][ T7] device veth1_macvtap left promiscuous mode [ 251.155475][ T24] audit: type=1400 audit(1722598296.560:171): avc: denied { create } for pid=11705 comm="syz.2.2999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 251.394847][T11725] bridge0: port 3(veth0_to_batadv) entered blocking state [ 251.401906][T11725] bridge0: port 3(veth0_to_batadv) entered disabled state [ 251.410212][T11725] device veth0_to_batadv entered promiscuous mode [ 251.417184][T11725] bridge0: port 3(veth0_to_batadv) entered blocking state [ 251.424201][T11725] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 251.434505][T11725] device veth0_to_batadv left promiscuous mode [ 251.447409][T11725] bridge0: port 3(veth0_to_batadv) entered disabled state [ 251.539013][T11735] device pim6reg1 entered promiscuous mode [ 251.548761][T11738] device pim6reg1 entered promiscuous mode [ 255.553634][T11932] device pim6reg1 entered promiscuous mode [ 255.636742][T11936] device veth0_vlan left promiscuous mode [ 255.642464][T11936] device veth0_vlan entered promiscuous mode [ 255.655307][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.663448][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.671021][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.593594][T11981] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.602993][T11981] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.610315][T11981] device bridge_slave_0 entered promiscuous mode [ 256.617118][T11981] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.625214][T11981] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.632741][T11981] device bridge_slave_1 entered promiscuous mode [ 256.712356][T11981] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.719242][T11981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.726472][T11981] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.733323][T11981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.029489][ T628] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.064484][ T628] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.086276][ T2211] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.110588][ T2211] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.206212][ T2211] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.213055][ T2211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.456083][ T2214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.513383][ T2214] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.520261][ T2214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.690045][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.711424][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.752557][T12058] device syzkaller0 entered promiscuous mode [ 257.767469][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.775317][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.787106][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.795542][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.805410][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.813727][ T628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.822720][T12062] device macsec0 left promiscuous mode [ 257.835529][T11981] device veth0_vlan entered promiscuous mode [ 257.862453][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.878041][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.898870][T12062] device veth1_macvtap entered promiscuous mode [ 257.905054][T12062] device macsec0 entered promiscuous mode [ 257.919894][T11981] device veth1_macvtap entered promiscuous mode [ 257.934205][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.948261][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.959157][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.967332][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.986331][T12071] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.993322][T12071] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.014151][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 258.029329][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 258.039792][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.048068][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.057322][T12071] device bridge_slave_1 left promiscuous mode [ 258.063631][T12071] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.071719][T12071] device bridge_slave_0 left promiscuous mode [ 258.116264][T12071] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.169241][T12069] device pim6reg1 entered promiscuous mode [ 258.658329][T12150] device syzkaller0 entered promiscuous mode [ 259.566531][ T24] audit: type=1400 audit(1722598304.970:172): avc: denied { create } for pid=12179 comm="syz.3.3132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 259.841089][T12217] FAULT_INJECTION: forcing a failure. [ 259.841089][T12217] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 259.867961][T12217] CPU: 1 PID: 12217 Comm: syz.0.3143 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 259.879138][T12217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 259.889037][T12217] Call Trace: [ 259.892168][T12217] dump_stack_lvl+0x1e2/0x24b [ 259.896675][T12217] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 259.902655][T12217] ? bfq_pos_tree_add_move+0x43b/0x43b [ 259.907951][T12217] dump_stack+0x15/0x17 [ 259.911941][T12217] should_fail+0x3c6/0x510 [ 259.916200][T12217] should_fail_usercopy+0x1a/0x20 [ 259.921062][T12217] _copy_from_user+0x20/0xd0 [ 259.925483][T12217] perf_copy_attr+0x15e/0x760 [ 259.929999][T12217] __se_sys_perf_event_open+0xdd/0x3c30 [ 259.935376][T12217] ? __kasan_check_write+0x14/0x20 [ 259.940325][T12217] ? mutex_lock+0xa5/0x110 [ 259.944575][T12217] ? mutex_trylock+0xa0/0xa0 [ 259.949006][T12217] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 259.954491][T12217] ? __ia32_sys_read+0x90/0x90 [ 259.959073][T12217] __x64_sys_perf_event_open+0xbf/0xd0 [ 259.964459][T12217] do_syscall_64+0x34/0x70 [ 259.968705][T12217] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 259.974429][T12217] RIP: 0033:0x7eff593333b9 [ 259.978693][T12217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.998125][T12217] RSP: 002b:00007eff57fb3048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 260.006370][T12217] RAX: ffffffffffffffda RBX: 00007eff594c1f80 RCX: 00007eff593333b9 [ 260.014180][T12217] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 260.021991][T12217] RBP: 00007eff57fb30a0 R08: 0000000000000000 R09: 0000000000000000 [ 260.029802][T12217] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 260.037613][T12217] R13: 000000000000000b R14: 00007eff594c1f80 R15: 00007ffde12411a8 [ 260.187697][T12241] device sit0 left promiscuous mode [ 260.803424][T12267] FAULT_INJECTION: forcing a failure. [ 260.803424][T12267] name failslab, interval 1, probability 0, space 0, times 1 [ 260.825493][T12267] CPU: 0 PID: 12267 Comm: syz.3.3158 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 260.836671][T12267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 260.846561][T12267] Call Trace: [ 260.849701][T12267] dump_stack_lvl+0x1e2/0x24b [ 260.854211][T12267] ? bfq_pos_tree_add_move+0x43b/0x43b [ 260.859507][T12267] ? wake_up_klogd+0xb8/0xf0 [ 260.863938][T12267] dump_stack+0x15/0x17 [ 260.867918][T12267] should_fail+0x3c6/0x510 [ 260.872174][T12267] ? perf_event_alloc+0xc4/0x1970 [ 260.877035][T12267] __should_failslab+0xa4/0xe0 [ 260.881636][T12267] should_failslab+0x9/0x20 [ 260.885975][T12267] kmem_cache_alloc_trace+0x3a/0x2e0 [ 260.891091][T12267] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 260.896733][T12267] perf_event_alloc+0xc4/0x1970 [ 260.901417][T12267] ? __alloc_fd+0x485/0x540 [ 260.905763][T12267] __se_sys_perf_event_open+0xb12/0x3c30 [ 260.911232][T12267] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 260.916706][T12267] ? __bpf_trace_sys_enter+0x62/0x70 [ 260.921816][T12267] __x64_sys_perf_event_open+0xbf/0xd0 [ 260.927115][T12267] do_syscall_64+0x34/0x70 [ 260.931363][T12267] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 260.937089][T12267] RIP: 0033:0x7f9c0ea303b9 [ 260.941340][T12267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 260.960784][T12267] RSP: 002b:00007f9c0d6b0048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 260.969029][T12267] RAX: ffffffffffffffda RBX: 00007f9c0ebbef80 RCX: 00007f9c0ea303b9 [ 260.976848][T12267] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 260.984652][T12267] RBP: 00007f9c0d6b00a0 R08: 0000000000000000 R09: 0000000000000000 [ 260.992462][T12267] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 261.000273][T12267] R13: 000000000000000b R14: 00007f9c0ebbef80 R15: 00007fffaa639088 [ 262.101006][T12337] syz.2.3176[12337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.101064][T12337] syz.2.3176[12337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.118921][T12343] device veth1_to_hsr entered promiscuous mode [ 262.120388][T12336] FAULT_INJECTION: forcing a failure. [ 262.120388][T12336] name failslab, interval 1, probability 0, space 0, times 0 [ 262.152411][T12336] CPU: 1 PID: 12336 Comm: syz.1.3175 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 262.163576][T12336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 262.173467][T12336] Call Trace: [ 262.176613][T12336] dump_stack_lvl+0x1e2/0x24b [ 262.181115][T12336] ? bfq_pos_tree_add_move+0x43b/0x43b [ 262.186407][T12336] ? perf_event_alloc+0xd06/0x1970 [ 262.191354][T12336] ? ___ratelimit+0xb5/0x580 [ 262.195775][T12336] dump_stack+0x15/0x17 [ 262.199856][T12336] should_fail+0x3c6/0x510 [ 262.204110][T12336] ? selinux_perf_event_alloc+0x51/0x140 [ 262.209585][T12336] __should_failslab+0xa4/0xe0 [ 262.214176][T12336] should_failslab+0x9/0x20 [ 262.218519][T12336] kmem_cache_alloc_trace+0x3a/0x2e0 [ 262.223640][T12336] selinux_perf_event_alloc+0x51/0x140 [ 262.228932][T12336] security_perf_event_alloc+0x62/0x90 [ 262.234226][T12336] perf_event_alloc+0x15b6/0x1970 [ 262.239090][T12336] __se_sys_perf_event_open+0xb12/0x3c30 [ 262.244557][T12336] ? ktime_get+0x10e/0x140 [ 262.248816][T12336] ? __sched_clock_gtod_offset+0xe1/0x100 [ 262.254361][T12336] ? sched_clock+0x3a/0x40 [ 262.258615][T12336] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 262.264087][T12336] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 262.270250][T12336] __x64_sys_perf_event_open+0xbf/0xd0 [ 262.275539][T12336] do_syscall_64+0x34/0x70 [ 262.279792][T12336] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 262.285519][T12336] RIP: 0033:0x7f70b397e3b9 [ 262.289773][T12336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.309210][T12336] RSP: 002b:00007f70b25fe048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 262.317458][T12336] RAX: ffffffffffffffda RBX: 00007f70b3b0cf80 RCX: 00007f70b397e3b9 [ 262.325268][T12336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 262.333080][T12336] RBP: 00007f70b25fe0a0 R08: 0000000000000000 R09: 0000000000000000 [ 262.340889][T12336] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 262.348710][T12336] R13: 000000000000000b R14: 00007f70b3b0cf80 R15: 00007ffc16f56448 [ 262.794723][T12392] FAULT_INJECTION: forcing a failure. [ 262.794723][T12392] name failslab, interval 1, probability 0, space 0, times 0 [ 262.835831][T12392] CPU: 1 PID: 12392 Comm: syz.2.3191 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 262.847006][T12392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 262.856895][T12392] Call Trace: [ 262.860038][T12392] dump_stack_lvl+0x1e2/0x24b [ 262.864554][T12392] ? bfq_pos_tree_add_move+0x43b/0x43b [ 262.869840][T12392] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 262.875476][T12392] dump_stack+0x15/0x17 [ 262.879489][T12392] should_fail+0x3c6/0x510 [ 262.883720][T12392] ? perf_event_alloc+0xc4/0x1970 [ 262.888583][T12392] __should_failslab+0xa4/0xe0 [ 262.893179][T12392] should_failslab+0x9/0x20 [ 262.897518][T12392] kmem_cache_alloc_trace+0x3a/0x2e0 [ 262.902641][T12392] perf_event_alloc+0xc4/0x1970 [ 262.907325][T12392] ? __alloc_fd+0x485/0x540 [ 262.911671][T12392] __se_sys_perf_event_open+0xb12/0x3c30 [ 262.917152][T12392] ? _raw_spin_unlock_irq+0x4e/0x70 [ 262.922259][T12392] ? __switch_to_asm+0x34/0x60 [ 262.926860][T12392] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 262.932414][T12392] ? fpu__clear_all+0x20/0x20 [ 262.937012][T12392] ? __kasan_check_read+0x11/0x20 [ 262.941872][T12392] __x64_sys_perf_event_open+0xbf/0xd0 [ 262.947165][T12392] do_syscall_64+0x34/0x70 [ 262.951426][T12392] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 262.957140][T12392] RIP: 0033:0x7f15a62613b9 [ 262.961401][T12392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 262.980841][T12392] RSP: 002b:00007f15a4ee1048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 262.989083][T12392] RAX: ffffffffffffffda RBX: 00007f15a63eff80 RCX: 00007f15a62613b9 [ 262.996893][T12392] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 263.004703][T12392] RBP: 00007f15a4ee10a0 R08: 0000000000000000 R09: 0000000000000000 [ 263.012514][T12392] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 263.020326][T12392] R13: 000000000000000b R14: 00007f15a63eff80 R15: 00007ffcfe7f8578 [ 263.786323][T12427] device syzkaller0 entered promiscuous mode [ 263.966489][T12437] FAULT_INJECTION: forcing a failure. [ 263.966489][T12437] name failslab, interval 1, probability 0, space 0, times 0 [ 263.989443][T12437] CPU: 0 PID: 12437 Comm: syz.4.3205 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 264.000630][T12437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 264.010514][T12437] Call Trace: [ 264.013653][T12437] dump_stack_lvl+0x1e2/0x24b [ 264.018158][T12437] ? bfq_pos_tree_add_move+0x43b/0x43b [ 264.023457][T12437] dump_stack+0x15/0x17 [ 264.027449][T12437] should_fail+0x3c6/0x510 [ 264.031695][T12437] ? __d_alloc+0x2d/0x6c0 [ 264.035862][T12437] __should_failslab+0xa4/0xe0 [ 264.040466][T12437] should_failslab+0x9/0x20 [ 264.044803][T12437] kmem_cache_alloc+0x3d/0x2e0 [ 264.049405][T12437] __d_alloc+0x2d/0x6c0 [ 264.053568][T12437] ? perf_try_init_event+0x410/0x410 [ 264.058691][T12437] d_alloc_pseudo+0x1d/0x70 [ 264.063032][T12437] alloc_file_pseudo+0x131/0x2f0 [ 264.067805][T12437] ? alloc_empty_file_noaccount+0x80/0x80 [ 264.073361][T12437] anon_inode_getfile+0xa7/0x180 [ 264.078136][T12437] __se_sys_perf_event_open+0xfe4/0x3c30 [ 264.083604][T12437] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 264.089068][T12437] ? fpu__clear_all+0x20/0x20 [ 264.094018][T12437] ? __kasan_check_read+0x11/0x20 [ 264.098876][T12437] __x64_sys_perf_event_open+0xbf/0xd0 [ 264.104167][T12437] do_syscall_64+0x34/0x70 [ 264.108510][T12437] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 264.114322][T12437] RIP: 0033:0x7f5cf10de3b9 [ 264.118578][T12437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.138017][T12437] RSP: 002b:00007f5cefd5e048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 264.146259][T12437] RAX: ffffffffffffffda RBX: 00007f5cf126cf80 RCX: 00007f5cf10de3b9 [ 264.154073][T12437] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 264.161881][T12437] RBP: 00007f5cefd5e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 264.169694][T12437] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 264.177503][T12437] R13: 000000000000000b R14: 00007f5cf126cf80 R15: 00007ffd6b0acf78 [ 264.910308][T12476] FAULT_INJECTION: forcing a failure. [ 264.910308][T12476] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.923151][T12476] CPU: 1 PID: 12476 Comm: syz.1.3219 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 264.934333][T12476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 264.944222][T12476] Call Trace: [ 264.947355][T12476] dump_stack_lvl+0x1e2/0x24b [ 264.951859][T12476] ? bfq_pos_tree_add_move+0x43b/0x43b [ 264.957155][T12476] ? kvm_sched_clock_read+0x18/0x40 [ 264.962190][T12476] dump_stack+0x15/0x17 [ 264.966181][T12476] should_fail+0x3c6/0x510 [ 264.970432][T12476] should_fail_usercopy+0x1a/0x20 [ 264.975294][T12476] strncpy_from_user+0x24/0x2d0 [ 264.979981][T12476] ? update_load_avg+0x541/0x1690 [ 264.984844][T12476] strncpy_from_user_nofault+0x73/0x150 [ 264.990224][T12476] bpf_probe_read_compat_str+0xec/0x180 [ 264.995605][T12476] bpf_prog_c1796171ffc7efef+0x35/0x604 [ 265.000984][T12476] bpf_trace_run3+0x121/0x2c0 [ 265.005496][T12476] ? bpf_trace_run2+0x280/0x280 [ 265.010185][T12476] ? __this_cpu_preempt_check+0x13/0x20 [ 265.015564][T12476] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 265.022076][T12476] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 265.028237][T12476] __bpf_trace_sched_switch+0xb/0x10 [ 265.033357][T12476] __traceiter_sched_switch+0x85/0xc0 [ 265.038564][T12476] __schedule+0x10be/0x1330 [ 265.042905][T12476] ? release_firmware_map_entry+0x18d/0x18d [ 265.048633][T12476] ? _raw_write_unlock_irqrestore+0x40/0x70 [ 265.054362][T12476] preempt_schedule_irq+0xc7/0x140 [ 265.059313][T12476] ? preempt_schedule_notrace+0x140/0x140 [ 265.064864][T12476] ? __irq_exit_rcu+0x40/0x150 [ 265.069463][T12476] irqentry_exit+0x4f/0x60 [ 265.073715][T12476] sysvec_apic_timer_interrupt+0xcb/0xe0 [ 265.079183][T12476] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 265.085000][T12476] RIP: 0010:perf_trace_init+0xa7/0x210 [ 265.090292][T12476] Code: 39 dd 0f 84 0c 01 00 00 49 c7 c4 c0 04 7d 86 49 8d 5d 40 48 89 d8 48 c1 e8 03 42 0f b6 04 30 84 c0 0f 85 c9 00 00 00 48 63 1b <4c> 89 ff 48 89 de e8 1e 39 f9 ff 49 39 df 75 7a 49 8d 5d 10 48 89 [ 265.109733][T12476] RSP: 0018:ffffc900014e7b88 EFLAGS: 00000246 [ 265.115633][T12476] RAX: 0000000000000000 RBX: 00000000000003e5 RCX: ffff888116a98000 [ 265.123447][T12476] RDX: 0000000000000000 RSI: 00000000000003e6 RDI: 000000000000030a [ 265.131260][T12476] RBP: ffffc900014e7bb8 R08: ffffffff817171f2 R09: fffffbfff0cfa08d [ 265.139067][T12476] R10: 0000000000000000 R11: dffffc0000000001 R12: ffffffff867d04c0 [ 265.146881][T12476] R13: ffffffff86ce7c60 R14: dffffc0000000000 R15: 000000000000030a [ 265.154700][T12476] ? perf_trace_init+0xb2/0x210 [ 265.159391][T12476] ? perf_trace_init+0x168/0x210 [ 265.164154][T12476] perf_tp_event_init+0x8c/0x110 [ 265.168925][T12476] perf_try_init_event+0x143/0x410 [ 265.173960][T12476] perf_event_alloc+0xcf5/0x1970 [ 265.178736][T12476] __se_sys_perf_event_open+0xb12/0x3c30 [ 265.184205][T12476] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 265.189672][T12476] ? __irq_exit_rcu+0x40/0x150 [ 265.194273][T12476] __x64_sys_perf_event_open+0xbf/0xd0 [ 265.199565][T12476] do_syscall_64+0x34/0x70 [ 265.203817][T12476] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.209553][T12476] RIP: 0033:0x7f70b397e3b9 [ 265.213799][T12476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.233237][T12476] RSP: 002b:00007f70b25fe048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 265.241570][T12476] RAX: ffffffffffffffda RBX: 00007f70b3b0cf80 RCX: 00007f70b397e3b9 [ 265.249379][T12476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 265.257190][T12476] RBP: 00007f70b25fe0a0 R08: 0000000000000000 R09: 0000000000000000 [ 265.265003][T12476] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 265.272813][T12476] R13: 000000000000000b R14: 00007f70b3b0cf80 R15: 00007ffc16f56448 [ 266.289101][T12515] device syzkaller0 entered promiscuous mode [ 266.600497][T11981] cgroup: fork rejected by pids controller in /syz1 [ 266.812947][T12533] bridge0: port 3(veth0_to_batadv) entered blocking state [ 266.851313][T12533] bridge0: port 3(veth0_to_batadv) entered disabled state [ 267.005605][T12533] device veth0_to_batadv entered promiscuous mode [ 267.096442][T12533] bridge0: port 3(veth0_to_batadv) entered blocking state [ 267.103409][T12533] bridge0: port 3(veth0_to_batadv) entered listening state [ 267.936109][T12547] FAULT_INJECTION: forcing a failure. [ 267.936109][T12547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 267.948950][T12547] CPU: 0 PID: 12547 Comm: syz.4.3238 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 267.960137][T12547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 267.970024][T12547] Call Trace: [ 267.973163][T12547] dump_stack_lvl+0x1e2/0x24b [ 267.977670][T12547] ? bfq_pos_tree_add_move+0x43b/0x43b [ 267.982955][T12547] ? clockevents_program_event+0x214/0x2c0 [ 267.988598][T12547] dump_stack+0x15/0x17 [ 267.992588][T12547] should_fail+0x3c6/0x510 [ 267.996841][T12547] should_fail_usercopy+0x1a/0x20 [ 268.001700][T12547] strncpy_from_user+0x24/0x2d0 [ 268.006389][T12547] ? update_load_avg+0x541/0x1690 [ 268.011248][T12547] strncpy_from_user_nofault+0x73/0x150 [ 268.016630][T12547] bpf_probe_read_compat_str+0xec/0x180 [ 268.022013][T12547] bpf_prog_c1796171ffc7efef+0x35/0xebc [ 268.027392][T12547] bpf_trace_run3+0x121/0x2c0 [ 268.031906][T12547] ? bpf_trace_run2+0x280/0x280 [ 268.036593][T12547] ? __this_cpu_preempt_check+0x13/0x20 [ 268.041972][T12547] ? tracing_record_taskinfo_sched_switch+0x84/0x390 [ 268.048485][T12547] ? __bpf_trace_sched_wakeup_template+0x10/0x10 [ 268.054643][T12547] __bpf_trace_sched_switch+0xb/0x10 [ 268.059763][T12547] __traceiter_sched_switch+0x85/0xc0 [ 268.064975][T12547] __schedule+0x10be/0x1330 [ 268.069311][T12547] ? release_firmware_map_entry+0x18d/0x18d [ 268.075040][T12547] ? sched_clock+0x3a/0x40 [ 268.079293][T12547] ? debug_smp_processor_id+0x17/0x20 [ 268.084499][T12547] ? preempt_schedule+0xd9/0xe0 [ 268.089185][T12547] preempt_schedule_common+0x9b/0xf0 [ 268.094308][T12547] preempt_schedule+0xd9/0xe0 [ 268.098820][T12547] ? schedule_preempt_disabled+0x20/0x20 [ 268.104291][T12547] ? irq_exit_rcu+0x9/0x10 [ 268.108541][T12547] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 268.114188][T12547] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 268.120175][T12547] ? dwc3_otg_host_init+0x4ff/0xc20 [ 268.125204][T12547] preempt_schedule_thunk+0x16/0x18 [ 268.130238][T12547] ? cpumask_any_but+0x6e/0xb0 [ 268.134841][T12547] _raw_spin_unlock+0x60/0x70 [ 268.139354][T12547] __text_poke+0x72e/0x7d0 [ 268.143605][T12547] ? dwc3_otg_host_init+0x4ff/0xc20 [ 268.148641][T12547] ? text_poke+0x20/0x20 [ 268.152732][T12547] ? perf_event_text_poke+0x254/0x320 [ 268.157925][T12547] ? do_sync_core+0x22/0x30 [ 268.162267][T12547] ? on_each_cpu+0x144/0x1a0 [ 268.166692][T12547] ? smp_call_function+0x90/0x90 [ 268.171465][T12547] ? insn_decode+0x308/0x490 [ 268.175891][T12547] ? text_poke_bp_batch+0x2f0/0x600 [ 268.180926][T12547] ? dwc3_otg_host_init+0x500/0xc20 [ 268.185960][T12547] ? memcpy+0x56/0x70 [ 268.189777][T12547] text_poke_bp_batch+0x4c2/0x600 [ 268.194638][T12547] ? text_poke_finish+0x30/0x30 [ 268.199348][T12547] ? text_poke_loc_init+0x580/0x580 [ 268.204362][T12547] ? dwc3_otg_host_init+0x4ff/0xc20 [ 268.209395][T12547] text_poke_bp+0xc8/0x140 [ 268.213648][T12547] ? text_poke_queue+0x1a0/0x1a0 [ 268.218418][T12547] ? mutex_lock+0xa5/0x110 [ 268.222672][T12547] ? mutex_trylock+0xa0/0xa0 [ 268.227100][T12547] ? dwc3_otg_host_init+0x4ff/0xc20 [ 268.232133][T12547] __static_call_transform+0x1be/0x290 [ 268.237426][T12547] ? dwc3_otg_host_init+0x4ff/0xc20 [ 268.242463][T12547] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 268.248800][T12547] arch_static_call_transform+0x145/0x1d0 [ 268.254353][T12547] __static_call_update+0x37f/0x5c0 [ 268.259386][T12547] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 268.265743][T12547] ? dwc3_otg_host_init+0x4ff/0xc20 [ 268.270773][T12547] ? fuse_prog_is_valid_access+0x1f0/0x1f0 [ 268.276409][T12547] ? __kasan_kmalloc+0x9/0x10 [ 268.280922][T12547] ? tracepoint_add_func+0x598/0xa30 [ 268.286033][T12547] ? memcpy+0x56/0x70 [ 268.289853][T12547] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 268.296185][T12547] tracepoint_add_func+0x979/0xa30 [ 268.301136][T12547] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 268.307467][T12547] tracepoint_probe_register+0xff/0x160 [ 268.312852][T12547] ? tracepoint_probe_register_prio+0x190/0x190 [ 268.318923][T12547] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 268.325285][T12547] trace_event_reg+0x1b6/0x260 [ 268.329861][T12547] perf_trace_event_init+0x4a0/0x950 [ 268.334985][T12547] perf_trace_init+0x1c6/0x210 [ 268.339591][T12547] perf_tp_event_init+0x8c/0x110 [ 268.344358][T12547] perf_try_init_event+0x143/0x410 [ 268.349308][T12547] perf_event_alloc+0xcf5/0x1970 [ 268.354082][T12547] __se_sys_perf_event_open+0xb12/0x3c30 [ 268.359547][T12547] ? ktime_get+0x10e/0x140 [ 268.363798][T12547] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 268.369264][T12547] ? hrtimer_interrupt+0x6a8/0x8b0 [ 268.374213][T12547] ? debug_smp_processor_id+0x17/0x20 [ 268.379420][T12547] __x64_sys_perf_event_open+0xbf/0xd0 [ 268.384713][T12547] do_syscall_64+0x34/0x70 [ 268.388969][T12547] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 268.394693][T12547] RIP: 0033:0x7f5cf10de3b9 [ 268.398947][T12547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.418388][T12547] RSP: 002b:00007f5cefd5e048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 268.426632][T12547] RAX: ffffffffffffffda RBX: 00007f5cf126cf80 RCX: 00007f5cf10de3b9 [ 268.434442][T12547] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 268.442256][T12547] RBP: 00007f5cefd5e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 268.450065][T12547] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 268.457876][T12547] R13: 000000000000000b R14: 00007f5cf126cf80 R15: 00007ffd6b0acf78 [ 269.005231][T12544] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.012311][T12544] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.022848][T12544] device bridge_slave_0 entered promiscuous mode [ 269.046386][T12544] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.053225][T12544] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.081518][T12544] device bridge_slave_1 entered promiscuous mode [ 269.387307][T12579] bridge0: port 3(veth0_to_batadv) entered blocking state [ 269.394942][T12579] bridge0: port 3(veth0_to_batadv) entered disabled state [ 269.466910][T12579] device veth0_to_batadv entered promiscuous mode [ 269.483344][T12579] bridge0: port 3(veth0_to_batadv) entered blocking state [ 269.490905][T12579] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 269.521651][T12577] device veth0_to_batadv left promiscuous mode [ 269.583650][T12577] bridge0: port 3(veth0_to_batadv) entered disabled state [ 269.822477][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 269.837792][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.882009][T12597] FAULT_INJECTION: forcing a failure. [ 269.882009][T12597] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.901434][T12597] CPU: 1 PID: 12597 Comm: syz.4.3254 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 269.912612][T12597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 269.922498][T12597] Call Trace: [ 269.925631][T12597] dump_stack_lvl+0x1e2/0x24b [ 269.930146][T12597] ? bfq_pos_tree_add_move+0x43b/0x43b [ 269.935436][T12597] dump_stack+0x15/0x17 [ 269.939424][T12597] should_fail+0x3c6/0x510 [ 269.943678][T12597] should_fail_usercopy+0x1a/0x20 [ 269.948539][T12597] _copy_to_user+0x20/0x90 [ 269.952796][T12597] simple_read_from_buffer+0xc7/0x150 [ 269.958001][T12597] proc_fail_nth_read+0x1a3/0x210 [ 269.962862][T12597] ? proc_fault_inject_write+0x390/0x390 [ 269.968327][T12597] ? security_file_permission+0x86/0xb0 [ 269.973708][T12597] ? rw_verify_area+0x1c3/0x360 [ 269.978395][T12597] ? proc_fault_inject_write+0x390/0x390 [ 269.983862][T12597] vfs_read+0x200/0xba0 [ 269.987856][T12597] ? kernel_read+0x70/0x70 [ 269.992109][T12597] ? __kasan_check_write+0x14/0x20 [ 269.997054][T12597] ? mutex_lock+0xa5/0x110 [ 270.001306][T12597] ? mutex_trylock+0xa0/0xa0 [ 270.005738][T12597] ? __fdget_pos+0x2e7/0x3a0 [ 270.010158][T12597] ? ksys_read+0x77/0x2c0 [ 270.014326][T12597] ksys_read+0x199/0x2c0 [ 270.018410][T12597] ? kvm_sched_clock_read+0x18/0x40 [ 270.023440][T12597] ? vfs_write+0xe70/0xe70 [ 270.027694][T12597] ? debug_smp_processor_id+0x17/0x20 [ 270.032900][T12597] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 270.038807][T12597] __x64_sys_read+0x7b/0x90 [ 270.043143][T12597] do_syscall_64+0x34/0x70 [ 270.047405][T12597] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.053121][T12597] RIP: 0033:0x7f5cf10dcdfc [ 270.057390][T12597] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 270.076827][T12597] RSP: 002b:00007f5cefd5e040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 270.085059][T12597] RAX: ffffffffffffffda RBX: 00007f5cf126cf80 RCX: 00007f5cf10dcdfc [ 270.092869][T12597] RDX: 000000000000000f RSI: 00007f5cefd5e0b0 RDI: 0000000000000007 [ 270.100682][T12597] RBP: 00007f5cefd5e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 270.108509][T12597] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 270.116303][T12597] R13: 000000000000000b R14: 00007f5cf126cf80 R15: 00007ffd6b0acf78 [ 270.163395][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.174613][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.182760][ T2210] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.189611][ T2210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.197471][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.205780][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.214010][ T2210] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.220860][ T2210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.228266][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 270.236290][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.244100][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 270.252121][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.260228][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.268466][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.276751][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.284371][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.293749][T12544] device veth0_vlan entered promiscuous mode [ 270.316511][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.328059][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.348281][ T2210] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.373163][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.395030][ T660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.483900][ T7] device bridge_slave_1 left promiscuous mode [ 270.491191][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.498833][ T7] device bridge_slave_0 left promiscuous mode [ 270.504858][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.513161][ T7] device veth1_macvtap left promiscuous mode [ 270.519107][ T7] device veth0_vlan left promiscuous mode [ 270.611431][T12544] device veth1_macvtap entered promiscuous mode [ 270.635314][ T2214] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.642980][ T2214] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.654042][ T2214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.663121][ T2214] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.671321][ T2214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.792764][T12655] device sit0 entered promiscuous mode [ 271.608703][T12662] device veth1_macvtap left promiscuous mode [ 271.618140][T12662] device macsec0 entered promiscuous mode [ 271.690905][T12682] device veth1_macvtap entered promiscuous mode [ 273.019725][T12752] device pim6reg1 entered promiscuous mode [ 273.249188][T12789] device veth0_vlan left promiscuous mode [ 273.459843][T12789] device veth0_vlan entered promiscuous mode [ 274.788383][T12841] device syzkaller0 entered promiscuous mode [ 279.458989][T13057] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.466882][T13057] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.474589][T13057] device bridge_slave_0 entered promiscuous mode [ 279.482210][T13057] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.489474][T13057] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.496799][T13057] device bridge_slave_1 entered promiscuous mode [ 279.940821][T13057] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.947698][T13057] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.954771][T13057] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.961579][T13057] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.112763][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.121122][ T663] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.130494][ T663] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.144958][ T473] device veth1_macvtap left promiscuous mode [ 280.157187][ T473] device veth0_vlan left promiscuous mode [ 280.284848][ T8415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.303337][ T8415] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.310217][ T8415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.332329][ T8415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.340357][ T8415] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.347238][ T8415] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.541160][ T2216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.569727][ T2216] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.665134][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 280.678903][ T277] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.690177][T13057] device veth0_vlan entered promiscuous mode [ 280.700146][ T2121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.709081][ T2121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.727667][T13057] device veth1_macvtap entered promiscuous mode [ 280.751808][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 280.759189][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.766517][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 280.774445][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 280.782485][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 280.927997][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 280.969067][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.285410][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.297728][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.705787][T13170] device syzkaller0 entered promiscuous mode [ 282.055618][T13193] device pim6reg1 entered promiscuous mode [ 282.196617][ C1] bridge0: port 3(veth0_to_batadv) entered learning state [ 282.454186][T13186] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.653472][T13186] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.670298][T13186] device bridge_slave_0 entered promiscuous mode [ 283.112273][T13186] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.126501][T13186] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.164921][T13186] device bridge_slave_1 entered promiscuous mode [ 283.256889][T13217] geneve1: tun_chr_ioctl cmd 1074025672 [ 283.262920][T13217] geneve1: ignored: set checksum enabled [ 283.368564][T13226] device syzkaller0 entered promiscuous mode [ 283.384236][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.391744][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.417598][ T2216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.425715][ T2216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.458737][ T2216] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.465616][ T2216] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.473567][ T2216] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.483219][ T2216] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.495416][ T2216] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.502279][ T2216] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.585228][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.594894][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.626911][ T2212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.651880][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.679352][T13186] device veth0_vlan entered promiscuous mode [ 283.690107][ T2121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.704332][ T2121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.720382][ T2121] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.744190][T13186] device veth1_macvtap entered promiscuous mode [ 283.781963][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 283.807058][ T2121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.818569][ T2121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.208642][T13254] device macsec0 entered promiscuous mode [ 284.342007][T13257] device syzkaller0 entered promiscuous mode [ 284.449382][T13268] device syzkaller0 entered promiscuous mode [ 284.678452][T13316] device syzkaller0 entered promiscuous mode [ 285.183630][T13327] device syzkaller0 entered promiscuous mode [ 285.552415][ T473] device bridge_slave_1 left promiscuous mode [ 285.581753][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.592807][ T473] device bridge_slave_0 left promiscuous mode [ 285.598971][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.607038][ T473] device veth1_macvtap left promiscuous mode [ 285.933601][T13347] device syzkaller0 entered promiscuous mode [ 286.266724][T13381] device syzkaller0 entered promiscuous mode [ 286.386528][T13386] device syzkaller0 entered promiscuous mode [ 286.990172][T13416] device veth0_vlan left promiscuous mode [ 286.998285][T13416] device veth0_vlan entered promiscuous mode [ 287.057644][ T2198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.083423][ T2198] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.140839][ T2198] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.202089][T13428] device pim6reg1 entered promiscuous mode [ 287.770791][T13455] device sit0 entered promiscuous mode [ 288.390128][T13479] device veth1_macvtap left promiscuous mode [ 288.395992][T13479] device macsec0 entered promiscuous mode [ 288.404949][T13480] device veth1_macvtap entered promiscuous mode [ 288.631482][T13496] syz.2.3498[13496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.631525][T13496] syz.2.3498[13496] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.029908][ T473] device bridge_slave_1 left promiscuous mode [ 289.167532][ T473] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.175143][ T473] device bridge_slave_0 left promiscuous mode [ 289.217882][ T473] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.231469][ T473] device veth1_macvtap left promiscuous mode [ 289.309312][T13529] lo: mtu less than device minimum [ 289.449386][T13543] device syzkaller0 entered promiscuous mode [ 290.724073][T13595] device vxcan1 entered promiscuous mode [ 291.544558][T13620] device sit0 entered promiscuous mode [ 291.991866][T13640] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.086689][T13640] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.189307][T13640] device bridge_slave_0 entered promiscuous mode [ 292.209935][T13640] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.217054][T13640] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.236968][T13640] device bridge_slave_1 entered promiscuous mode [ 292.365053][T13640] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.371923][T13640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.379015][T13640] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.385797][T13640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.409151][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.483939][ T2200] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.491331][ T2200] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.518548][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.533960][ T2231] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.540830][ T2231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.548141][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.556197][ T2231] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.563029][ T2231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.601450][T13698] device syzkaller0 entered promiscuous mode [ 292.657555][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.668275][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.715292][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 292.726781][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.744504][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.759714][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.775719][T13640] device veth0_vlan entered promiscuous mode [ 292.795257][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.805442][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.823767][T13640] device veth1_macvtap entered promiscuous mode [ 292.845324][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 292.898615][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 292.919132][ T648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 292.942845][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 292.958341][ T2123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.198744][ T7] device bridge_slave_1 left promiscuous mode [ 293.212570][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.320464][ T7] device bridge_slave_0 left promiscuous mode [ 293.403701][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.468571][ T7] device veth1_macvtap left promiscuous mode [ 293.474428][ T7] device veth0_vlan left promiscuous mode [ 293.791896][T13776] device syzkaller0 entered promiscuous mode [ 294.116649][T13799] syz.2.3580[13799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.118377][T13799] syz.2.3580[13799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.841814][T13845] device syzkaller0 entered promiscuous mode [ 294.984585][T13843] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.991558][T13843] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.999333][T13843] device bridge_slave_0 entered promiscuous mode [ 295.009069][T13843] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.016352][T13843] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.023612][T13843] device bridge_slave_1 entered promiscuous mode [ 296.427506][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.437822][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.460837][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.469201][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.477859][ T2231] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.484715][ T2231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.492897][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 296.501212][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.509461][ T2231] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.516330][ T2231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.525755][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.533712][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.541799][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.549865][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.558525][ T2231] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 296.686456][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.906152][T13843] device veth0_vlan entered promiscuous mode [ 296.925361][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.933237][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 296.940478][ T612] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.069055][ T2200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.079215][T13843] device veth1_macvtap entered promiscuous mode [ 297.104945][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.113956][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.207511][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.265594][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.365541][T13941] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.372606][T13941] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.556080][ C1] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 297.563217][ C1] bridge0: topology change detected, propagating [ 297.590648][T13943] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.597528][T13943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.604637][T13943] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.611428][T13943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.619303][T13943] device bridge0 entered promiscuous mode [ 297.640469][ T7] device veth1_macvtap left promiscuous mode [ 297.657666][ T7] device veth0_vlan left promiscuous mode [ 297.850221][T13962] device syzkaller0 entered promiscuous mode [ 298.242007][T13975] device syzkaller0 entered promiscuous mode [ 298.390081][T13981] device syzkaller0 entered promiscuous mode [ 299.945986][T14037] device syzkaller0 entered promiscuous mode [ 300.265707][T14077] device sit0 left promiscuous mode [ 300.954283][T14092] device sit0 entered promiscuous mode [ 301.924574][T14179] device syzkaller0 entered promiscuous mode [ 302.722731][T14241] device sit0 left promiscuous mode [ 302.744406][T14241] device sit0 entered promiscuous mode [ 303.168872][T14250] device wg2 entered promiscuous mode [ 304.200878][T14330] device veth0_vlan left promiscuous mode [ 304.216846][T14330] device veth0_vlan entered promiscuous mode [ 305.374173][T14407] device veth0_vlan left promiscuous mode [ 305.380661][T14407] device veth0_vlan entered promiscuous mode [ 305.396832][ T624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.432538][ T624] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.440350][ T624] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.456436][T14425] device pim6reg1 entered promiscuous mode [ 305.628869][T14437] device pim6reg1 entered promiscuous mode [ 305.643401][ T24] audit: type=1400 audit(1722598351.050:173): avc: denied { attach_queue } for pid=14436 comm="syz.0.3755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 305.649130][T14449] device veth0_vlan left promiscuous mode [ 305.707496][T14449] device veth0_vlan entered promiscuous mode [ 305.843301][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.867628][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.886464][ T651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.954074][T14467] device pim6reg1 entered promiscuous mode [ 308.102596][T14566] syz.2.3791[14566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.102644][T14566] syz.2.3791[14566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.169992][T14567] syz.2.3791[14567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.196278][T14567] syz.2.3791[14567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.209637][T14566] syz.2.3791[14566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.348039][T14566] syz.2.3791[14566] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.660632][T14578] device pim6reg1 entered promiscuous mode [ 309.151754][T14590] device syzkaller0 entered promiscuous mode [ 309.553649][ T24] audit: type=1400 audit(1722598354.960:174): avc: denied { create } for pid=14603 comm="syz.0.3805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 310.418667][ T24] audit: type=1400 audit(1722598355.830:175): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 310.691503][ T24] audit: type=1400 audit(1722598355.830:176): avc: denied { unlink } for pid=76 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 311.089052][ T24] audit: type=1400 audit(1722598355.830:177): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 311.172017][T14670] device pim6reg1 entered promiscuous mode [ 311.191573][T14663] device pim6reg1 entered promiscuous mode [ 311.212490][T14637] device syzkaller0 entered promiscuous mode [ 311.309178][ T24] audit: type=1400 audit(1722598356.710:178): avc: denied { create } for pid=14675 comm="syz.3.3825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 311.594892][T14690] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.601839][T14690] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.609237][T14690] device bridge0 left promiscuous mode [ 313.315409][T14791] device syzkaller0 entered promiscuous mode [ 313.447115][T14821] device pim6reg1 entered promiscuous mode [ 313.714446][T14840] bridge0: port 3(veth0_to_batadv) entered blocking state [ 313.724599][T14840] bridge0: port 3(veth0_to_batadv) entered disabled state [ 313.897771][T14840] device veth0_to_batadv entered promiscuous mode [ 313.917493][T14846] device veth0_to_batadv left promiscuous mode [ 313.924150][T14846] bridge0: port 3(veth0_to_batadv) entered disabled state [ 314.552697][T14871] device pim6reg1 entered promiscuous mode [ 315.002742][T14897] bridge0: port 3(veth0_to_batadv) entered blocking state [ 315.017844][T14897] bridge0: port 3(veth0_to_batadv) entered disabled state [ 315.095524][T14897] device veth0_to_batadv entered promiscuous mode [ 315.121901][T14897] bridge0: port 3(veth0_to_batadv) entered blocking state [ 315.129521][T14897] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 315.166304][T14898] device veth0_to_batadv left promiscuous mode [ 315.172401][T14898] bridge0: port 3(veth0_to_batadv) entered disabled state [ 315.501363][T14922] device pim6reg1 entered promiscuous mode [ 315.938682][T14945] device pim6reg1 entered promiscuous mode [ 316.054878][T14952] bridge0: port 3(veth0_to_batadv) entered blocking state [ 316.063335][T14952] bridge0: port 3(veth0_to_batadv) entered disabled state [ 316.156651][T14952] device veth0_to_batadv entered promiscuous mode [ 316.174225][T14952] bridge0: port 3(veth0_to_batadv) entered blocking state [ 316.182223][T14952] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 316.226252][T14955] device wg2 left promiscuous mode [ 316.232493][T14953] device veth0_to_batadv left promiscuous mode [ 316.253549][T14953] bridge0: port 3(veth0_to_batadv) entered disabled state [ 316.266680][T14961] device pim6reg1 entered promiscuous mode [ 317.210435][T14985] syz.1.3914[14985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.223150][T14985] syz.1.3914[14985] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.251324][T14993] device sit0 entered promiscuous mode [ 318.140995][T15003] bridge0: port 3(veth0_to_batadv) entered blocking state [ 318.149022][T15003] bridge0: port 3(veth0_to_batadv) entered disabled state [ 318.215940][T15003] device veth0_to_batadv entered promiscuous mode [ 318.232501][T15003] bridge0: port 3(veth0_to_batadv) entered blocking state [ 318.239977][T15003] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 318.273481][T15012] device veth0_to_batadv left promiscuous mode [ 318.289403][T15012] bridge0: port 3(veth0_to_batadv) entered disabled state [ 318.653667][T15029] syz.0.3927[15029] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.697118][T15039] device sit0 left promiscuous mode [ 318.767432][T15039] device sit0 entered promiscuous mode [ 319.445664][T15049] device team_slave_1 entered promiscuous mode [ 319.462549][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.493915][ T501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 319.581420][T15060] bridge0: port 3(veth0_to_batadv) entered blocking state [ 319.605092][T15060] bridge0: port 3(veth0_to_batadv) entered disabled state [ 319.674114][T15060] device veth0_to_batadv entered promiscuous mode [ 319.692440][T15060] bridge0: port 3(veth0_to_batadv) entered blocking state [ 319.700068][T15060] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 319.731612][T15063] device syzkaller0 entered promiscuous mode [ 319.745703][T15062] device veth0_to_batadv left promiscuous mode [ 319.752198][T15062] bridge0: port 3(veth0_to_batadv) entered disabled state [ 320.868165][T15137] device sit0 left promiscuous mode [ 321.751564][T15192] ref_ctr_offset mismatch. inode: 0x18a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 322.137984][T15216] bridge0: port 3(veth0_to_batadv) entered disabled state [ 322.144989][T15216] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.151909][T15216] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.155084][T15276] device veth1_macvtap left promiscuous mode [ 323.774603][T15321] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.781587][T15321] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.170740][T15353] syz.0.4015[15353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.170783][T15353] syz.0.4015[15353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.534092][T15381] device syzkaller0 entered promiscuous mode [ 327.111785][T15607] device pim6reg1 entered promiscuous mode [ 327.809625][T15661] device pim6reg1 entered promiscuous mode [ 328.007835][T15690] device syzkaller0 entered promiscuous mode [ 328.094779][T15708] bridge0: port 3(gretap0) entered blocking state [ 328.111428][T15708] bridge0: port 3(gretap0) entered disabled state [ 328.124289][T15708] device gretap0 entered promiscuous mode [ 328.136273][T15708] bridge0: port 3(gretap0) entered blocking state [ 328.142523][T15708] bridge0: port 3(gretap0) entered forwarding state [ 329.051647][T15758] syz.3.4119[15758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.051698][T15758] syz.3.4119[15758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.461163][T15789] device sit0 left promiscuous mode [ 332.603201][T16017] device veth0_vlan left promiscuous mode [ 332.609396][T16017] device veth0_vlan entered promiscuous mode [ 332.616286][ T2208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.624240][ T2208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 332.632331][ T2208] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.505602][T16175] device sit0 left promiscuous mode [ 341.291354][ T7] bridge0: port 3(gretap0) entered disabled state [ 341.327683][ T7] device gretap0 left promiscuous mode [ 341.432372][ T7] bridge0: port 3(gretap0) entered disabled state [ 341.638472][ T7] device bridge_slave_1 left promiscuous mode [ 341.647485][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.747008][ T7] device bridge_slave_0 left promiscuous mode [ 341.778527][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.801360][ T7] device veth1_macvtap left promiscuous mode [ 341.811523][ T7] device veth0_vlan left promiscuous mode [ 343.917554][T16518] syz.3.4324[16518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.917606][T16518] syz.3.4324[16518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.768424][T16608] ip6tnl0: mtu greater than device maximum [ 349.166211][T16691] device sit0 entered promiscuous mode [ 353.066490][ T7] device bridge_slave_1 left promiscuous mode [ 353.072409][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.079593][ T7] device bridge_slave_0 left promiscuous mode [ 353.085497][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.092968][ T7] device bridge_slave_1 left promiscuous mode [ 353.098906][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.106051][ T7] device bridge_slave_0 left promiscuous mode [ 353.111952][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.119693][ T7] device veth1_macvtap left promiscuous mode [ 353.125479][ T7] device veth0_vlan left promiscuous mode [ 358.257600][T16856] syz.0.4411[16856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.257652][T16856] syz.0.4411[16856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 358.441408][T16860] device veth0_vlan left promiscuous mode [ 358.508526][T16860] device veth0_vlan entered promiscuous mode [ 358.519229][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.527346][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 358.534598][ T328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.467313][T16963] ªªªªªª: renamed from vlan0 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=1 req=4277 state=3 status=67 (errno 9: Bad file descriptor) [ 368.356948][ T350] device veth0_to_batadv left promiscuous mode [ 368.362994][ T350] bridge0: port 3(veth0_to_batadv) entered disabled state [ 368.370325][ T350] device bridge_slave_1 left promiscuous mode [ 368.376322][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.383302][ T350] device bridge_slave_0 left promiscuous mode [ 368.389255][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.396563][ T350] device bridge_slave_1 left promiscuous mode [ 368.402454][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.409668][ T350] device bridge_slave_0 left promiscuous mode [ 368.415560][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.423308][ T350] device bridge_slave_1 left promiscuous mode [ 368.429271][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.436366][ T350] device bridge_slave_0 left promiscuous mode [ 368.442265][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.449700][ T350] device bridge_slave_1 left promiscuous mode [ 368.455586][ T350] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.462777][ T350] device bridge_slave_0 left promiscuous mode [ 368.468728][ T350] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.476540][ T350] device veth1_macvtap left promiscuous mode [ 368.482511][ T350] device veth1_macvtap left promiscuous mode