last executing test programs: 24.066058278s ago: executing program 2 (id=1039): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100020000000007010000f8f7ffffb702000008000000b70300000000000085000000060000009500000000000000bedd00c1b1194e0f1d89a0d7cdb38d63667cb555e0e3798d05f72a31ec02ff63062bb22460797e13abdc0312f2e2800d5422979014546f488d391970a36893879d609f50b0b4a880e8af3f1037ce28030fa0bdac1da7b50eea63ebab"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x39, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0100010000000400000001000000000000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{}, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000300)={[{0x2b, 'hugetlb'}, {0x2d, 'net'}, {0x66f770ddd60577d2, 'cpu'}, {0x2d, 'io'}, {0x2d, 'net'}, {0x2d, 'pids'}]}, 0x22) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 19.615463972s ago: executing program 2 (id=1039): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100020000000007010000f8f7ffffb702000008000000b70300000000000085000000060000009500000000000000bedd00c1b1194e0f1d89a0d7cdb38d63667cb555e0e3798d05f72a31ec02ff63062bb22460797e13abdc0312f2e2800d5422979014546f488d391970a36893879d609f50b0b4a880e8af3f1037ce28030fa0bdac1da7b50eea63ebab"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x39, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0100010000000400000001000000000000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{}, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000300)={[{0x2b, 'hugetlb'}, {0x2d, 'net'}, {0x66f770ddd60577d2, 'cpu'}, {0x2d, 'io'}, {0x2d, 'net'}, {0x2d, 'pids'}]}, 0x22) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 13.494802426s ago: executing program 2 (id=1039): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100020000000007010000f8f7ffffb702000008000000b70300000000000085000000060000009500000000000000bedd00c1b1194e0f1d89a0d7cdb38d63667cb555e0e3798d05f72a31ec02ff63062bb22460797e13abdc0312f2e2800d5422979014546f488d391970a36893879d609f50b0b4a880e8af3f1037ce28030fa0bdac1da7b50eea63ebab"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x39, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0100010000000400000001000000000000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{}, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000300)={[{0x2b, 'hugetlb'}, {0x2d, 'net'}, {0x66f770ddd60577d2, 'cpu'}, {0x2d, 'io'}, {0x2d, 'net'}, {0x2d, 'pids'}]}, 0x22) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 9.253123939s ago: executing program 2 (id=1039): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100020000000007010000f8f7ffffb702000008000000b70300000000000085000000060000009500000000000000bedd00c1b1194e0f1d89a0d7cdb38d63667cb555e0e3798d05f72a31ec02ff63062bb22460797e13abdc0312f2e2800d5422979014546f488d391970a36893879d609f50b0b4a880e8af3f1037ce28030fa0bdac1da7b50eea63ebab"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x39, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0100010000000400000001000000000000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{}, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000300)={[{0x2b, 'hugetlb'}, {0x2d, 'net'}, {0x66f770ddd60577d2, 'cpu'}, {0x2d, 'io'}, {0x2d, 'net'}, {0x2d, 'pids'}]}, 0x22) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 6.230807846s ago: executing program 0 (id=1615): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r1, 0x0, 0x3, 0x6, &(0x7f0000000300)="d7d9e3", &(0x7f0000000340)=""/6, 0x7fffffff, 0x0, 0x9f0, 0x39, &(0x7f0000001340)="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", &(0x7f00000003c0)="0267f69896107f6c98cb8188833c08eddcadf99f25817c85d2725e815de6fe4f410a38baaf7960c306f8660fa14aeff68eee31a23eb615de3b", 0x0, 0x0, 0x5}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r3}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r7, &(0x7f0000000200), 0x43451) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 5.855377288s ago: executing program 1 (id=1620): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x10, &(0x7f0000000580)=@framed={{}, [@snprintf={{0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}, {0x3, 0x0}, {0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x4, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x94}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000400)={r3, 0x0, 0x0}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x101081, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000200)={'nr0\x00'}) close(r4) 5.316466541s ago: executing program 1 (id=1624): bpf$TOKEN_CREATE(0x24, &(0x7f0000000100), 0x8) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079104800000006000000003a0000000095000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079104800000006000000003a0000000095000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r0) (async) close(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[], 0x48) socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000001c0)={'wg1\x00', 0x2000}) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) (async) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0f00000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000002b9d7fc786df23015a825b80000656654b87841534901000000000000000000"], 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0f00000004000000040000000600000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000002b9d7fc786df23015a825b80000656654b87841534901000000000000000000"], 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r6, &(0x7f0000000040), 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000240)={r6, &(0x7f00000002c0), 0x20000000}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xb, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000c0ffffff000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe000000006609000000000000dbaaf0ffe1000000bf8600000000000007080000f8ffffffbfa40000b8c616a900000007040000f0ffffffd50000000800000018", @ANYRES32=r7, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005d9800000000000056080000000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4.952186683s ago: executing program 1 (id=1628): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) close(r2) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) syz_open_procfs$namespace(0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x5670}, 0x8000, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0100000005000000090000008400000044010000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000c57a6acd51ebf417000000000000000000000000b7814427f2826d2d8e3be8fb91f9ce4628e17473f3f042d53c"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x5, 0x1, 0x968, 0x1, r3, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x8, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x19, 0xa6e, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x20000, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r7}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r8}, 0x10) 4.823956304s ago: executing program 2 (id=1039): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100020000000007010000f8f7ffffb702000008000000b70300000000000085000000060000009500000000000000bedd00c1b1194e0f1d89a0d7cdb38d63667cb555e0e3798d05f72a31ec02ff63062bb22460797e13abdc0312f2e2800d5422979014546f488d391970a36893879d609f50b0b4a880e8af3f1037ce28030fa0bdac1da7b50eea63ebab"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x39, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0100010000000400000001000000000000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{}, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000300)={[{0x2b, 'hugetlb'}, {0x2d, 'net'}, {0x66f770ddd60577d2, 'cpu'}, {0x2d, 'io'}, {0x2d, 'net'}, {0x2d, 'pids'}]}, 0x22) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.670840715s ago: executing program 0 (id=1630): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42", @ANYRES16=r1], 0xfdef) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8, 0x0, 0x2, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000680)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033300fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000000040002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r12, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000c40)="7102b87fd4a29eb711d3d8dd9d30af2321e6f6e273aa268bf88d9b6b401a48d9897f02e252e0882cc55d14a5949d95b3fa8e0fdefbdb9d5f2b2402455bb8ea9669c041e99a804b3a84e5be4329c6ac5ccfd26d65bf13d7dc9ce767be3e7d49acf525dca7123b6bc44d49b40ce43b8cb32004f23c12750711d0858c8d0d41dc8700148a722a3cbc6abb644537cc9988c84675409be1b18298b0ec383bda34bfbcca2d71d63e2f097fc59fe25c27c8dd1d893dd361b0fee1c66b8b31c07fb4b2a8ddfecf480d68ed284feb7ce103ef4b9f86e7731d0d21aed50dd887bd2217bc31b1ee7e1f8928c40d1b6fffdbf1eef39151466bd33eefce34a00f5932b41cd3e8eae6b2e2cfec5a968270f4a34e8ea5cc115189aff201dd0e4547d39e63aaf67f4e8ad5d3adf9ce876356cc36fcfd9aee0268f3e9f2eb07", 0x137}, {&(0x7f0000001c80)="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", 0x472}], 0x2}, 0x0) setsockopt$sock_attach_bpf(r11, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$inet(r12, &(0x7f0000001c40)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r13) 2.670638135s ago: executing program 1 (id=1631): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x1e}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0xb, 0x8400, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000000), 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000002000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100fb009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000240)={0x2, 0x80, 0x9, 0x9, 0x1, 0x2, 0x0, 0x4, 0x8028, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x840, 0xfffffffffffffc00, 0x2, 0x4, 0x6, 0x4, 0x3, 0x0, 0x8, 0x0, 0xffffffff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000580)={0x3, 0x80, 0xf1, 0x9, 0x7, 0xfc, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x7, 0xd69}, 0x1000a, 0xe41, 0xc, 0x4, 0x6, 0x20000, 0xf, 0x0, 0x9, 0x0, 0x7fffffff}) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 1.747360771s ago: executing program 3 (id=1639): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 1.746604921s ago: executing program 0 (id=1640): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (fail_nth: 1) 1.714885631s ago: executing program 3 (id=1642): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000e030755582a8df490800000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00'/20, @ANYRES32, @ANYBLOB="000000f2ffffff0000000000000000000000000013b78f97c416414d86cd5b3ae9521da555e986b0775789de6bf4c9de0d4abf36b6ef8f69cc1fc52dff3b9560eacdd5197a52db29072a0b4b3d0c743ba9310c9496154f5e604a3a592984d940056a16b56db36279169af6879f15391a1a8b46aafb552170541d883abf3ef56f385b2a97eabc3237cc648d99591f04ed94", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r4) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000efffffffffffffff0000000000000000000000000000f83821b1d2fb7d4d2a46933d86a76eda6af8c65a31e047c2fe9a657a869d75cf86ce3883e1fbc0f8bc618ac4b97c095598a8a67ea186a6017b4f63c6ec1942fb4eaca09049df49ecbf248da86ff435f9433952729120c9a090f7b3aac0abeea8"], 0x50) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x4}, 0x0, 0x7ffffffffc, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000c870ffe2fb88cff573d8b607b19d6b3400000000000092ac33b4ee68080036e4a0d053385295e68d0200405d56d9ba2d2cde70cf4887acd6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 1.192280464s ago: executing program 0 (id=1643): syz_clone(0xea003000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=ANY=[@ANYBLOB="2800000000000000290000001c69000095dea77a3ff3fce47b9c4b8655f87ff1d501b5c0ede6f6eec0000000000000000201000008000000d57bd46780c9f1b47cb36499a434f2542afe43da88741e7c942797e38b4840f83b5f2037097df0999872fe547896f0fc512de9e078003e71848bc7f144b770c84c88ec4ca5b73705f3a7bfe0442dcacc1129006104ec6ecdf0e5ae94f636d5e8b755f79da78f2a3a1251824e628d2f3a5c3259ca3cc5cc9ee028938ee05c160367710d3b58f094bec375b6b27839bdc554992cd005cec697ea888d9926d9235519398e0ccd39d78aa7db3f5b12b77943f8"], 0x1e0}, 0x20000000) setsockopt$sock_attach_bpf(r1, 0x1, 0x22, &(0x7f00000018c0), 0x4) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d00)=""/78, 0x10}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300000000000000000000000000fa084749000000000000000c0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r2, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = openat$cgroup_procs(r2, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f00000006c0)={0x0, r4}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xffffffffffffff4f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r8, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe6, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000340), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e000000e7000000000000800400000000400100", @ANYRES32=r8, @ANYBLOB="008000"/20, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0400100002000000050000000d1900ea6b52c04033fb1000ddf7aa57e359b5ae65214d5323738a147308194ad7fd67a45127444b9b2926206afabe6b5cf10e16c98593c67efba25773a1025123b1fb88510318412bff38e72c489869ca59a5989b7a863e2ba10d9f6ba23f6c82ad420b7aec", @ANYRES32=r8, @ANYBLOB], 0x50) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r11}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) 1.110002214s ago: executing program 3 (id=1645): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x42f2}, 0x0, 0xc8}, 0x0, 0xb, 0xffffffffffffffff, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) 1.059928314s ago: executing program 3 (id=1647): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r0, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x4, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200f87504000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="000000000300"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x1, @ANYBLOB="0000000000000000000000fd080000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000a40)=ANY=[@ANYBLOB="7b407d54090b2a713c39ba0003595a2776a4eda4d7aebc0a136185cfdd37101f2e648fbaaf307ace5b61e2d43e8f3982231d42849d8e8e6c170588825dd9ca7a812126342f1f9bb47476a3e49f01a93c485664f789258e2b6c7c56fec24b127c9364a7b2c552782730809757d1c50054327a216cf4e98f6aee336750857d7dbdf592c740f6625c3d06fb1385951ff058b1b5fd5ab3980d0e8ec30bd1a470fc9e38d244d7814113ba37c07ff8de5dd054a7a06a6721d8c7579f7f8f9331f37ff40e2144b4a061f6cbde102c3958090db72591be7876d721bdef7ad265b7114abdd2e1c2a9b13fd5405f919e589f5b9421a14e42c984f94d"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28010000000000000100", @ANYRESDEC=r2], 0x128}, 0x14) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8937, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) close(0xffffffffffffffff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000700)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000003c0)=0x1ff, 0x12) mkdirat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 925.905785ms ago: executing program 1 (id=1649): r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/269], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xffffffffffffffa1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) 896.896485ms ago: executing program 3 (id=1650): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff83) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 793.035596ms ago: executing program 4 (id=1653): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 739.289126ms ago: executing program 4 (id=1654): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000540)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000882b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7], 0x18}, 0x0) sendmsg$unix(r5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r7], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) close(r8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xe) 611.000567ms ago: executing program 4 (id=1655): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (fail_nth: 2) 173.989269ms ago: executing program 3 (id=1656): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x110000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0xc, 0x1, 0x4, 0x8000, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3, 0xa, @value, @void, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg(r4, 0x0, 0x40fd) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001a00)=ANY=[@ANYRES8=r0, @ANYRES32, @ANYBLOB="018000"/20, @ANYRES32, @ANYBLOB="04000000020000000200000000000000000000000000000000000000614bc2b5b72e2c12eb6342c4d6d1e874bb1b71bbb144afd9cc713776d8a4fa5fe85dc666393e27a53ed3f81b9d6dce53b97c99444f3f2af60d9b3905950440d6c255a02bcdc7d8d90803841d792f416d"], 0x50) syz_clone(0x40b04000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 147.385699ms ago: executing program 4 (id=1657): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x42f2}, 0x0, 0xc8}, 0x0, 0xb, 0xffffffffffffffff, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xe) 142.203589ms ago: executing program 0 (id=1658): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) 127.60925ms ago: executing program 4 (id=1659): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xf12a45ecb845d44d, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000180)="b89e37d2d7a55c74698e1f0609459914c5fcf67ec5ff60d9589cf48a872767abac380cb722f0a28576ac6eabfc99cd053223d26f449eb515f898a58902d725cd32de8585d706c822abf2a6a468aea56bbe00ff57d6d887f4c58ce2002f83884ac11b4249c989e927ac6e0956af237bbb524dbdf644b7e8890e576e8235671c406e2d973bc18dce1b46dd", 0x8a}, {&(0x7f0000000040)}, {0xfffffffffffffffe}, {&(0x7f0000000280)="9ac8ee8f8c24aafdfd82e7b249306234eeb5a597a661ef3cbec75f65a1ef7fc8f7002b1a9ae736871842e53f80b913c687803e13d0b58b2f9869e082358ab186550a8d4b4dd623cf399a17bad369bdb574cca4173e989985da567642cc0337b4390e812708841a835a644998643ea020b3c9a90e7be5e66133554da5828ad81985c10fcf8e12cd947fe4038a79d7a7b40d30b1aefc42ef2e16984e79040e690aaefe7bbbd7ed5bccd2f72fd8840c43486174a8701eba7fa48b37c9fa67931535aee7d12166f7e0f3afb83c", 0xcb}, {&(0x7f0000000380)="9cfb52add6ac692d2fe64c02f2dbd5f564e0c8a420ba83179bc1d4fc418211054c8cfb3489c419195355552a6872a3198d287a5bdac46b0d340e80bf68d1389c6a455f51fc691aec7aac485fe307b3a52e473ca64b8a6868054b5e1c87587e6eedac9ec848c4d49b82af2de08fe6a2bc", 0x70}, {&(0x7f00000004c0)="81ab535efb1ad37f4f05ca9136de313b998bb85b60a1148dc39ae02c5c34ee9bb0762b0c0c04c01a9225e8e7811035c59a1472032612ff90762cd91b0b87cd18ff874619c0a974cb690e940bdb54c684c4e2f7060c", 0x55}, {&(0x7f0000000400)="e7142aba71fb52daed6d3a438a6ffac1ae75c90dd21b15c188c2c1", 0x1b}, {&(0x7f0000000540)="62e21cebf1a450d7f123571b98759a192b46534aeb8420314c07858c2d96d08600f9b9fed680a16d927a18ad3686c1ca2470d4295a86822d7197ea94c33ffac40a6dd1950e8743291efc40d33eda12b1f8de58028d40d6f813ae5261a2e617ffdbb2e96d0e3df79c69", 0x69}, {&(0x7f00000005c0)="835ddf795cad78e36c5274c07090053035b115d60fa20d3f0213d0bbaba2e280314ee3f3f0326247ab", 0x29}], 0x9, &(0x7f0000000600)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xa4}}], 0x18}, 0x40060) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 69.55104ms ago: executing program 4 (id=1660): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r0, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x4, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200f87504000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="000000000300"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x1, @ANYBLOB="0000000000000000000000fd080000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000a40)=ANY=[@ANYBLOB="7b407d54090b2a713c39ba0003595a2776a4eda4d7aebc0a136185cfdd37101f2e648fbaaf307ace5b61e2d43e8f3982231d42849d8e8e6c170588825dd9ca7a812126342f1f9bb47476a3e49f01a93c485664f789258e2b6c7c56fec24b127c9364a7b2c552782730809757d1c50054327a216cf4e98f6aee336750857d7dbdf592c740f6625c3d06fb1385951ff058b1b5fd5ab3980d0e8ec30bd1a470fc9e38d244d7814113ba37c07ff8de5dd054a7a06a6721d8c7579f7f8f9331f37ff40e2144b4a061f6cbde102c3958090db72591be7876d721bdef7ad265b7114abdd2e1c2a9b13fd5405f919e589f5b9421a14e42c984f94d"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="28010000000000000100", @ANYRESDEC=r2], 0x128}, 0x14) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8937, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000700)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f00000003c0)=0x1ff, 0x12) mkdirat$cgroup(r3, &(0x7f0000000080)='syz0\x00', 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 69.18582ms ago: executing program 0 (id=1661): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) close(0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x4, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4}, 0x18) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x109040, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) 43.30668ms ago: executing program 1 (id=1662): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8a04ff00000000bfa200000000000007020000f8ffffffb703f50008000000b704000000000011850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0xffffffffffffefff, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000004c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x98, &(0x7f00000004c0), 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xd6, 0x8, 0xffffff66, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7200, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 0s ago: executing program 2 (id=1039): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100020000000007010000f8f7ffffb702000008000000b70300000000000085000000060000009500000000000000bedd00c1b1194e0f1d89a0d7cdb38d63667cb555e0e3798d05f72a31ec02ff63062bb22460797e13abdc0312f2e2800d5422979014546f488d391970a36893879d609f50b0b4a880e8af3f1037ce28030fa0bdac1da7b50eea63ebab"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x39, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab", 0x0, 0x31, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0100010000000400000001000000000000000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{}, &(0x7f0000000600), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_subtree(r5, &(0x7f0000000300)={[{0x2b, 'hugetlb'}, {0x2d, 'net'}, {0x66f770ddd60577d2, 'cpu'}, {0x2d, 'io'}, {0x2d, 'net'}, {0x2d, 'pids'}]}, 0x22) write$cgroup_subtree(r5, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) kernel console output (not intermixed with test programs): 82351][ T293] device veth1_macvtap entered promiscuous mode [ 23.641079][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.650307][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.679231][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.690250][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.811754][ C0] hrtimer: interrupt took 31391 ns [ 24.694494][ T326] ref_ctr_offset mismatch. inode: 0x11 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 25.439976][ T340] device veth0_vlan left promiscuous mode [ 25.472858][ T340] device veth0_vlan entered promiscuous mode [ 25.707793][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 25.726372][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 25.777750][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 25.957294][ T343] ref_ctr_offset mismatch. inode: 0x16 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 26.136561][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 26.136576][ T30] audit: type=1400 audit(1732143203.193:112): avc: denied { create } for pid=351 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.284242][ T349] device pim6reg1 entered promiscuous mode [ 26.336182][ T30] audit: type=1400 audit(1732143203.283:113): avc: denied { create } for pid=348 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 26.375976][ T354] device veth1_macvtap left promiscuous mode [ 26.555302][ T30] audit: type=1400 audit(1732143203.623:114): avc: denied { setopt } for pid=348 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.928720][ T363] ref_ctr_offset mismatch. inode: 0x1c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 26.972247][ T30] audit: type=1400 audit(1732143204.043:115): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 26.978247][ T370] device syzkaller0 entered promiscuous mode [ 27.067532][ T365] device vlan1 entered promiscuous mode [ 27.188424][ T30] audit: type=1400 audit(1732143204.243:116): avc: denied { confidentiality } for pid=369 comm="syz.1.14" lockdown_reason="use of bpf to read kernel RAM" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=lockdown permissive=1 [ 27.577955][ T30] audit: type=1400 audit(1732143204.653:117): avc: denied { create } for pid=384 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 27.716159][ T378] ref_ctr_offset mismatch. inode: 0x1b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 27.830443][ T30] audit: type=1400 audit(1732143204.893:118): avc: denied { read } for pid=384 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.884292][ T30] audit: type=1400 audit(1732143204.953:119): avc: denied { write } for pid=384 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.123583][ T30] audit: type=1400 audit(1732143205.183:120): avc: denied { ioctl } for pid=394 comm="syz.3.21" path="/dev/ppp" dev="devtmpfs" ino=150 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 28.579739][ T30] audit: type=1400 audit(1732143205.653:121): avc: denied { relabelfrom } for pid=401 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 28.970837][ T411] device pim6reg1 entered promiscuous mode [ 29.168062][ T414] device veth1_macvtap left promiscuous mode [ 29.980623][ T429] device syzkaller0 entered promiscuous mode [ 31.259392][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 31.259407][ T30] audit: type=1400 audit(1732143208.323:123): avc: denied { write } for pid=446 comm="syz.3.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 32.986207][ T470] ref_ctr_offset mismatch. inode: 0x4d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 35.606385][ T525] device syzkaller0 entered promiscuous mode [ 36.721576][ T533] ref_ctr_offset mismatch. inode: 0x5e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 36.753012][ T531] ref_ctr_offset mismatch. inode: 0x3b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 37.264237][ T546] ref_ctr_offset mismatch. inode: 0x26 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 37.344901][ T551] device syzkaller0 entered promiscuous mode [ 37.390871][ T558] device syzkaller0 entered promiscuous mode [ 37.983033][ T569] device syzkaller0 entered promiscuous mode [ 38.371537][ T579] ref_ctr_offset mismatch. inode: 0x50 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 38.486617][ T583] ref_ctr_offset mismatch. inode: 0x56 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 38.742303][ T30] audit: type=1400 audit(1732143215.813:124): avc: denied { write } for pid=584 comm="syz.2.70" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 38.944977][ T609] ÿÿÿÿÿÿ: renamed from vlan1 [ 38.960971][ T604] device syzkaller0 entered promiscuous mode [ 39.944803][ T623] device syzkaller0 entered promiscuous mode [ 40.719920][ T642] device syzkaller0 entered promiscuous mode [ 41.100049][ T655] device syzkaller0 entered promiscuous mode [ 42.334719][ T684] device syzkaller0 entered promiscuous mode [ 43.356531][ T701] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 43.387263][ T701] pim6reg0: linktype set to 778 [ 43.607905][ T701] pim6reg0: tun_chr_ioctl cmd 2147767511 [ 43.768588][ T708] ref_ctr_offset mismatch. inode: 0x7d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 44.035872][ T30] audit: type=1400 audit(1732143221.103:125): avc: denied { ioctl } for pid=702 comm="syz.4.103" path="socket:[17166]" dev="sockfs" ino=17166 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.290014][ T723] ref_ctr_offset mismatch. inode: 0x70 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 44.341730][ T726] ref_ctr_offset mismatch. inode: 0x7f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 44.608465][ T736] FAULT_INJECTION: forcing a failure. [ 44.608465][ T736] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 44.767608][ T736] CPU: 0 PID: 736 Comm: syz.0.113 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 44.777165][ T736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 44.787056][ T736] Call Trace: [ 44.790188][ T736] [ 44.792958][ T736] dump_stack_lvl+0x151/0x1c0 [ 44.797471][ T736] ? io_uring_drop_tctx_refs+0x190/0x190 [ 44.802947][ T736] dump_stack+0x15/0x20 [ 44.806928][ T736] should_fail+0x3c6/0x510 [ 44.811184][ T736] should_fail_usercopy+0x1a/0x20 [ 44.816041][ T736] _copy_from_user+0x20/0xd0 [ 44.820559][ T736] __sys_bpf+0x1e9/0x760 [ 44.824641][ T736] ? fput_many+0x160/0x1b0 [ 44.828889][ T736] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 44.834102][ T736] ? debug_smp_processor_id+0x17/0x20 [ 44.839300][ T736] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 44.845206][ T736] __x64_sys_bpf+0x7c/0x90 [ 44.849466][ T736] x64_sys_call+0x87f/0x9a0 [ 44.853798][ T736] do_syscall_64+0x3b/0xb0 [ 44.858050][ T736] ? clear_bhb_loop+0x35/0x90 [ 44.862564][ T736] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 44.868291][ T736] RIP: 0033:0x7f25aac9d819 [ 44.872549][ T736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.891990][ T736] RSP: 002b:00007f25a9316038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 44.900233][ T736] RAX: ffffffffffffffda RBX: 00007f25aae54fa0 RCX: 00007f25aac9d819 [ 44.908042][ T736] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000000 [ 44.915855][ T736] RBP: 00007f25a9316090 R08: 0000000000000000 R09: 0000000000000000 [ 44.923661][ T736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.931472][ T736] R13: 0000000000000000 R14: 00007f25aae54fa0 R15: 00007ffe29e63b38 [ 44.939292][ T736] [ 45.082305][ T741] syz.2.114 (741) used greatest stack depth: 21952 bytes left [ 45.437642][ T761] ref_ctr_offset mismatch. inode: 0x93 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 45.517272][ T776] FAULT_INJECTION: forcing a failure. [ 45.517272][ T776] name failslab, interval 1, probability 0, space 0, times 1 [ 45.626735][ T776] CPU: 0 PID: 776 Comm: syz.1.127 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 45.636286][ T776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 45.646180][ T776] Call Trace: [ 45.649302][ T776] [ 45.652078][ T776] dump_stack_lvl+0x151/0x1c0 [ 45.656594][ T776] ? io_uring_drop_tctx_refs+0x190/0x190 [ 45.662065][ T776] ? avc_denied+0x1b0/0x1b0 [ 45.666399][ T776] ? proc_fail_nth_write+0x20b/0x290 [ 45.671525][ T776] dump_stack+0x15/0x20 [ 45.675514][ T776] should_fail+0x3c6/0x510 [ 45.679768][ T776] __should_failslab+0xa4/0xe0 [ 45.684369][ T776] should_failslab+0x9/0x20 [ 45.688707][ T776] slab_pre_alloc_hook+0x37/0xd0 [ 45.693512][ T776] kmem_cache_alloc_trace+0x48/0x210 [ 45.698600][ T776] ? ringbuf_map_alloc+0x1b0/0x320 [ 45.703551][ T776] ringbuf_map_alloc+0x1b0/0x320 [ 45.708330][ T776] map_create+0x411/0x2050 [ 45.712574][ T776] __sys_bpf+0x296/0x760 [ 45.716652][ T776] ? fput_many+0x160/0x1b0 [ 45.720912][ T776] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 45.726121][ T776] ? debug_smp_processor_id+0x17/0x20 [ 45.731320][ T776] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 45.737310][ T776] __x64_sys_bpf+0x7c/0x90 [ 45.741561][ T776] x64_sys_call+0x87f/0x9a0 [ 45.745901][ T776] do_syscall_64+0x3b/0xb0 [ 45.750154][ T776] ? clear_bhb_loop+0x35/0x90 [ 45.754665][ T776] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 45.760567][ T776] RIP: 0033:0x7fe94b863819 [ 45.764822][ T776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.784263][ T776] RSP: 002b:00007fe949edc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.792510][ T776] RAX: ffffffffffffffda RBX: 00007fe94ba1afa0 RCX: 00007fe94b863819 [ 45.800319][ T776] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000000 [ 45.808129][ T776] RBP: 00007fe949edc090 R08: 0000000000000000 R09: 0000000000000000 [ 45.815939][ T776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.823754][ T776] R13: 0000000000000000 R14: 00007fe94ba1afa0 R15: 00007fff1e40cdb8 [ 45.831590][ T776] [ 45.841446][ T779] syz.2.128[779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.841506][ T779] syz.2.128[779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.919031][ T30] audit: type=1400 audit(1732143222.993:126): avc: denied { create } for pid=773 comm="syz.3.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 46.497175][ T818] FAULT_INJECTION: forcing a failure. [ 46.497175][ T818] name failslab, interval 1, probability 0, space 0, times 0 [ 46.663493][ T818] CPU: 0 PID: 818 Comm: syz.1.140 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 46.673051][ T818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 46.682945][ T818] Call Trace: [ 46.686066][ T818] [ 46.688846][ T818] dump_stack_lvl+0x151/0x1c0 [ 46.693360][ T818] ? io_uring_drop_tctx_refs+0x190/0x190 [ 46.698835][ T818] ? x64_sys_call+0x87f/0x9a0 [ 46.703343][ T818] dump_stack+0x15/0x20 [ 46.707331][ T818] should_fail+0x3c6/0x510 [ 46.711585][ T818] __should_failslab+0xa4/0xe0 [ 46.716187][ T818] should_failslab+0x9/0x20 [ 46.720535][ T818] slab_pre_alloc_hook+0x37/0xd0 [ 46.725305][ T818] __kmalloc+0x6d/0x270 [ 46.729292][ T818] ? bpf_map_area_alloc+0x4c/0xf0 [ 46.734151][ T818] bpf_map_area_alloc+0x4c/0xf0 [ 46.738837][ T818] bpf_ringbuf_alloc+0x39/0x380 [ 46.743522][ T818] ? kmem_cache_alloc_trace+0x115/0x210 [ 46.748905][ T818] ? ringbuf_map_alloc+0x1b0/0x320 [ 46.753850][ T818] ? bpf_map_init_from_attr+0x15b/0x380 [ 46.759242][ T818] ringbuf_map_alloc+0x202/0x320 [ 46.764009][ T818] map_create+0x411/0x2050 [ 46.768264][ T818] __sys_bpf+0x296/0x760 [ 46.772339][ T818] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 46.777551][ T818] ? debug_smp_processor_id+0x17/0x20 [ 46.782752][ T818] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 46.788702][ T818] __x64_sys_bpf+0x7c/0x90 [ 46.792911][ T818] x64_sys_call+0x87f/0x9a0 [ 46.797247][ T818] do_syscall_64+0x3b/0xb0 [ 46.801502][ T818] ? clear_bhb_loop+0x35/0x90 [ 46.806021][ T818] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 46.811746][ T818] RIP: 0033:0x7fe94b863819 [ 46.815996][ T818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.835443][ T818] RSP: 002b:00007fe949edc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.843679][ T818] RAX: ffffffffffffffda RBX: 00007fe94ba1afa0 RCX: 00007fe94b863819 [ 46.851492][ T818] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000000 [ 46.859307][ T818] RBP: 00007fe949edc090 R08: 0000000000000000 R09: 0000000000000000 [ 46.867116][ T818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.874926][ T818] R13: 0000000000000000 R14: 00007fe94ba1afa0 R15: 00007fff1e40cdb8 [ 46.882861][ T818] [ 46.950626][ T815] ref_ctr_offset mismatch. inode: 0xbb offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 47.319555][ T30] audit: type=1400 audit(1732143224.393:127): avc: denied { create } for pid=839 comm="syz.3.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 47.395303][ T856] FAULT_INJECTION: forcing a failure. [ 47.395303][ T856] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 47.414349][ T856] CPU: 0 PID: 856 Comm: syz.2.154 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 47.423894][ T856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 47.433790][ T856] Call Trace: [ 47.436918][ T856] [ 47.439692][ T856] dump_stack_lvl+0x151/0x1c0 [ 47.444205][ T856] ? io_uring_drop_tctx_refs+0x190/0x190 [ 47.449672][ T856] dump_stack+0x15/0x20 [ 47.453691][ T856] should_fail+0x3c6/0x510 [ 47.457916][ T856] should_fail_alloc_page+0x5a/0x80 [ 47.462948][ T856] prepare_alloc_pages+0x15c/0x700 [ 47.467897][ T856] ? __alloc_pages_bulk+0xe40/0xe40 [ 47.472932][ T856] __alloc_pages+0x18c/0x8f0 [ 47.477358][ T856] ? prep_new_page+0x110/0x110 [ 47.481955][ T856] ? __kmalloc+0x13a/0x270 [ 47.486208][ T856] ? bpf_map_area_alloc+0x4c/0xf0 [ 47.491069][ T856] bpf_ringbuf_alloc+0xd3/0x380 [ 47.495757][ T856] ringbuf_map_alloc+0x202/0x320 [ 47.500536][ T856] map_create+0x411/0x2050 [ 47.504869][ T856] __sys_bpf+0x296/0x760 [ 47.508952][ T856] ? fput_many+0x160/0x1b0 [ 47.513202][ T856] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 47.518413][ T856] ? debug_smp_processor_id+0x17/0x20 [ 47.523616][ T856] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 47.529517][ T856] __x64_sys_bpf+0x7c/0x90 [ 47.533771][ T856] x64_sys_call+0x87f/0x9a0 [ 47.538108][ T856] do_syscall_64+0x3b/0xb0 [ 47.542361][ T856] ? clear_bhb_loop+0x35/0x90 [ 47.546874][ T856] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 47.552608][ T856] RIP: 0033:0x7f293cd93819 [ 47.556862][ T856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.576556][ T856] RSP: 002b:00007f293b40c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.584802][ T856] RAX: ffffffffffffffda RBX: 00007f293cf4afa0 RCX: 00007f293cd93819 [ 47.592615][ T856] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000000 [ 47.600423][ T856] RBP: 00007f293b40c090 R08: 0000000000000000 R09: 0000000000000000 [ 47.608243][ T856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.616047][ T856] R13: 0000000000000000 R14: 00007f293cf4afa0 R15: 00007fff4fc2a628 [ 47.623867][ T856] [ 47.727483][ T865] ref_ctr_offset mismatch. inode: 0xbe offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 48.160270][ T892] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 48.165783][ T892] pim6reg0: linktype set to 778 [ 48.333960][ T887] pim6reg0: tun_chr_ioctl cmd 2147767511 [ 48.583779][ T909] FAULT_INJECTION: forcing a failure. [ 48.583779][ T909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 48.676752][ T909] CPU: 1 PID: 909 Comm: syz.2.167 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 48.686391][ T909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 48.696284][ T909] Call Trace: [ 48.699406][ T909] [ 48.702185][ T909] dump_stack_lvl+0x151/0x1c0 [ 48.706701][ T909] ? io_uring_drop_tctx_refs+0x190/0x190 [ 48.712259][ T909] dump_stack+0x15/0x20 [ 48.716248][ T909] should_fail+0x3c6/0x510 [ 48.720498][ T909] should_fail_alloc_page+0x5a/0x80 [ 48.725535][ T909] prepare_alloc_pages+0x15c/0x700 [ 48.730482][ T909] ? __alloc_pages+0x8f0/0x8f0 [ 48.735081][ T909] ? __alloc_pages_bulk+0xe40/0xe40 [ 48.740118][ T909] __alloc_pages+0x18c/0x8f0 [ 48.744538][ T909] ? prep_new_page+0x110/0x110 [ 48.749141][ T909] ? __kmalloc+0x13a/0x270 [ 48.753393][ T909] ? bpf_map_area_alloc+0x4c/0xf0 [ 48.758343][ T909] bpf_ringbuf_alloc+0xd3/0x380 [ 48.763025][ T909] ringbuf_map_alloc+0x202/0x320 [ 48.767799][ T909] map_create+0x411/0x2050 [ 48.772051][ T909] __sys_bpf+0x296/0x760 [ 48.776128][ T909] ? fput_many+0x160/0x1b0 [ 48.780390][ T909] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 48.785599][ T909] ? debug_smp_processor_id+0x17/0x20 [ 48.790796][ T909] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 48.796701][ T909] __x64_sys_bpf+0x7c/0x90 [ 48.800954][ T909] x64_sys_call+0x87f/0x9a0 [ 48.805289][ T909] do_syscall_64+0x3b/0xb0 [ 48.809551][ T909] ? clear_bhb_loop+0x35/0x90 [ 48.814060][ T909] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 48.819784][ T909] RIP: 0033:0x7f293cd93819 [ 48.824046][ T909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.843481][ T909] RSP: 002b:00007f293b40c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.851723][ T909] RAX: ffffffffffffffda RBX: 00007f293cf4afa0 RCX: 00007f293cd93819 [ 48.859534][ T909] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000000 [ 48.867349][ T909] RBP: 00007f293b40c090 R08: 0000000000000000 R09: 0000000000000000 [ 48.875165][ T909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.882970][ T909] R13: 0000000000000000 R14: 00007f293cf4afa0 R15: 00007fff4fc2a628 [ 48.890789][ T909] [ 49.223520][ T924] device syzkaller0 entered promiscuous mode [ 49.636899][ T924] bond_slave_1: mtu less than device minimum [ 49.933866][ T938] device wg2 entered promiscuous mode [ 50.110225][ T947] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 50.115732][ T947] pim6reg0: linktype set to 778 [ 50.131122][ T947] pim6reg0: tun_chr_ioctl cmd 2147767511 [ 50.143572][ T948] ref_ctr_offset mismatch. inode: 0x9c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 50.159437][ T30] audit: type=1400 audit(1732143227.233:128): avc: denied { create } for pid=951 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 50.256510][ T950] device wg2 entered promiscuous mode [ 50.351044][ T971] device syzkaller0 entered promiscuous mode [ 50.709858][ T997] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 50.813013][ T997] pim6reg0: linktype set to 778 [ 50.817776][ T30] audit: type=1400 audit(1732143227.883:129): avc: denied { write } for pid=999 comm="syz.3.194" name="cgroup.subtree_control" dev="cgroup2" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 50.874955][ T1002] pim6reg0: tun_chr_ioctl cmd 2147767511 [ 50.884882][ T30] audit: type=1400 audit(1732143227.933:130): avc: denied { open } for pid=999 comm="syz.3.194" path="" dev="cgroup2" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 51.133862][ T1007] ªªªªªª: renamed from vlan0 [ 51.351870][ T1013] device syzkaller0 entered promiscuous mode [ 51.435660][ T30] audit: type=1400 audit(1732143228.503:131): avc: denied { tracepoint } for pid=1017 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 51.472131][ T1020] ªªªªªª: renamed from vlan0 [ 54.006671][ C0] sched: RT throttling activated [ 58.018510][ T30] audit: type=1400 audit(1732143235.093:132): avc: denied { create } for pid=1068 comm="syz.3.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 58.063269][ T1069] device wg2 left promiscuous mode [ 58.130808][ T30] audit: type=1400 audit(1732143235.183:133): avc: denied { create } for pid=1075 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.272375][ T1081] ref_ctr_offset mismatch. inode: 0x102 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 58.295114][ T1078] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 58.433641][ T1078] device syzkaller0 entered promiscuous mode [ 58.698163][ T30] audit: type=1400 audit(1732143235.773:134): avc: denied { setopt } for pid=1080 comm="syz.4.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 58.831873][ T30] audit: type=1400 audit(1732143235.903:135): avc: denied { create } for pid=1104 comm="syz.2.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 59.478095][ T30] audit: type=1400 audit(1732143236.553:136): avc: denied { write } for pid=1104 comm="syz.2.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 60.027114][ T1123] ref_ctr_offset mismatch. inode: 0x112 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 60.399676][ T1129] ref_ctr_offset mismatch. inode: 0xd1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 60.713054][ T1138] device syzkaller0 entered promiscuous mode [ 61.945066][ T1173] bond_slave_1: mtu less than device minimum [ 62.196478][ T1185] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 62.228231][ T1185] pim6reg0: linktype set to 778 [ 62.383909][ T1182] ref_ctr_offset mismatch. inode: 0x136 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 62.449422][ T1079] syz.4.213 (1079) used greatest stack depth: 21760 bytes left [ 62.481927][ T1189] ref_ctr_offset mismatch. inode: 0xe1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 62.536993][ T1199] syz.4.247[1199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.622958][ T1202] device veth0_vlan left promiscuous mode [ 62.650384][ T1202] device veth0_vlan entered promiscuous mode [ 62.665484][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 62.673717][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 62.687326][ T101] udevd[101]: worker [535] terminated by signal 33 (Unknown signal 33) [ 62.695560][ T101] udevd[101]: worker [535] failed while handling '/devices/virtual/block/loop2' [ 62.705785][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 62.714588][ T1193] device wg2 entered promiscuous mode [ 62.952853][ T1225] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.965855][ T1225] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.117747][ T1231] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.124607][ T1231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.131757][ T1231] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.138606][ T1231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.292839][ T1231] device bridge0 entered promiscuous mode [ 63.352438][ T1238] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 63.455789][ T1238] device syzkaller0 entered promiscuous mode [ 63.573544][ T1250] device sit0 entered promiscuous mode [ 63.627424][ T30] audit: type=1400 audit(1732143240.683:137): avc: denied { create } for pid=1253 comm="syz.2.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 64.225094][ T1276] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 64.246901][ T1276] pim6reg0: linktype set to 778 [ 65.974158][ T1342] device syzkaller0 entered promiscuous mode [ 68.470289][ T1375] ref_ctr_offset mismatch. inode: 0x162 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 68.572774][ T1382] nr0: tun_chr_ioctl cmd 1074025677 [ 68.648104][ T1382] nr0: linktype set to 823 [ 70.917528][ T1427] ref_ctr_offset mismatch. inode: 0x121 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 72.612084][ T1492] device pim6reg1 entered promiscuous mode [ 72.618260][ T1490] ref_ctr_offset mismatch. inode: 0x128 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 73.329342][ T1510] bond_slave_1: mtu less than device minimum [ 73.435793][ T1525] device sit0 left promiscuous mode [ 73.617411][ T1540] syz.3.350 uses obsolete (PF_INET,SOCK_PACKET) [ 73.679527][ T30] audit: type=1400 audit(1732143250.753:138): avc: denied { create } for pid=1539 comm="syz.3.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 73.724770][ T1537] ref_ctr_offset mismatch. inode: 0x15b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 74.161943][ T1573] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.168987][ T1573] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.215834][ T1575] device bridge_slave_1 left promiscuous mode [ 74.223605][ T1575] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.244911][ T1575] device bridge_slave_0 left promiscuous mode [ 74.260755][ T1575] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.415970][ T1585] device syzkaller0 entered promiscuous mode [ 74.453733][ T1588] device sit0 entered promiscuous mode [ 74.531533][ T1582] device pimreg0 entered promiscuous mode [ 74.790488][ T30] audit: type=1400 audit(1732143251.863:139): avc: denied { read } for pid=1591 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 75.349626][ T1617] device syzkaller0 entered promiscuous mode [ 75.926573][ T1640] ref_ctr_offset mismatch. inode: 0x1ba offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 76.134692][ T1657] device pim6reg1 entered promiscuous mode [ 76.336525][ T30] audit: type=1400 audit(1732143253.403:140): avc: denied { create } for pid=1683 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 76.594472][ T1689] ref_ctr_offset mismatch. inode: 0x1ba offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 77.135530][ T30] audit: type=1400 audit(1732143254.203:141): avc: denied { create } for pid=1696 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 77.828336][ T1718] device macsec0 entered promiscuous mode [ 78.409156][ T1730] ref_ctr_offset mismatch. inode: 0x1eb offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 78.687140][ T1745] ÿÿÿÿÿÿÿÿ: renamed from vlan1 [ 79.409739][ T30] audit: type=1400 audit(1732143256.473:142): avc: denied { create } for pid=1763 comm="syz.0.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 79.487497][ T1764] device veth0_vlan left promiscuous mode [ 79.508367][ T1764] device veth0_vlan entered promiscuous mode [ 79.618926][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.645897][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 79.654327][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.886761][ T1779] ref_ctr_offset mismatch. inode: 0x1d4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 80.198395][ T1850] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.212096][ T1850] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.452140][ T30] audit: type=1400 audit(1732143257.523:143): avc: denied { create } for pid=1859 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 80.495447][ T1868] device syzkaller0 entered promiscuous mode [ 80.699600][ T1885] ref_ctr_offset mismatch. inode: 0x1e5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 81.032552][ T1886] device bridge_slave_1 left promiscuous mode [ 81.045235][ T1886] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.087186][ T1886] device bridge_slave_0 left promiscuous mode [ 81.094342][ T1886] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.335864][ T1939] ref_ctr_offset mismatch. inode: 0x22b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 86.950174][ T1956] device pim6reg1 entered promiscuous mode [ 86.984957][ T1971] device sit0 entered promiscuous mode [ 87.653008][ T1979] device syzkaller0 entered promiscuous mode [ 87.792762][ T1981] device syzkaller0 entered promiscuous mode [ 88.042191][ T1992] ref_ctr_offset mismatch. inode: 0x240 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 89.922016][ T30] audit: type=1400 audit(1732143266.973:144): avc: denied { ioctl } for pid=2016 comm="syz.1.471" path="socket:[20070]" dev="sockfs" ino=20070 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 90.710093][ T2028] device veth1_macvtap left promiscuous mode [ 90.776799][ T2028] device macsec0 entered promiscuous mode [ 93.018276][ T2043] device syzkaller0 entered promiscuous mode [ 95.178044][ T2068] device syzkaller0 entered promiscuous mode [ 95.234942][ T30] audit: type=1400 audit(1732143272.303:145): avc: denied { create } for pid=2070 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 95.254374][ T2076] device sit0 left promiscuous mode [ 95.388517][ T2079] device sit0 entered promiscuous mode [ 95.884589][ T2089] device sit0 entered promiscuous mode [ 96.533567][ T2101] device syzkaller0 entered promiscuous mode [ 96.550983][ T2104] €Â0: renamed from pim6reg1 [ 96.635299][ T2106] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 96.712582][ T2106] pim6reg0: linktype set to 778 [ 96.718223][ T30] audit: type=1400 audit(1732143273.793:146): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 96.746917][ T30] audit: type=1400 audit(1732143273.793:147): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 97.433653][ T2127] device syzkaller0 entered promiscuous mode [ 99.657566][ T30] audit: type=1400 audit(1732143276.733:148): avc: denied { create } for pid=2208 comm="syz.3.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 100.057967][ T2218] device syzkaller0 entered promiscuous mode [ 100.738648][ T2252] device syzkaller0 entered promiscuous mode [ 101.212253][ T2274] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 101.218029][ T2274] pim6reg0: linktype set to 778 [ 101.295304][ T2286] device pim6reg1 entered promiscuous mode [ 102.014467][ T2310] bond_slave_1: mtu less than device minimum [ 102.182202][ T2319] device syzkaller0 entered promiscuous mode [ 103.548296][ T2370] device syzkaller0 entered promiscuous mode [ 104.074112][ T2395] device syzkaller0 entered promiscuous mode [ 106.547420][ T2447] device veth0_vlan left promiscuous mode [ 106.670474][ T2445] ref_ctr_offset mismatch. inode: 0x248 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 106.756366][ T2447] device veth0_vlan entered promiscuous mode [ 106.853522][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.877831][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 107.051839][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.300357][ T2476] device syzkaller0 entered promiscuous mode [ 109.277732][ T2485] ref_ctr_offset mismatch. inode: 0x2c1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 109.848995][ T2498] device macsec0 left promiscuous mode [ 110.898360][ T2467] syz.2.594 (2467) used greatest stack depth: 21240 bytes left [ 111.333681][ T30] audit: type=1400 audit(1732143288.403:149): avc: denied { create } for pid=2527 comm="syz.0.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 111.425514][ T30] audit: type=1400 audit(1732143288.403:150): avc: denied { create } for pid=2527 comm="syz.0.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 112.140591][ T2539] ref_ctr_offset mismatch. inode: 0x2d4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 112.563286][ T2562] ref_ctr_offset mismatch. inode: 0x2e4 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 114.069106][ T2594] syz.4.633[2594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.069566][ T2594] syz.4.633[2594] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.603040][ T2612] ref_ctr_offset mismatch. inode: 0x2f9 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 116.949000][ T2677] ref_ctr_offset mismatch. inode: 0x2a5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 117.571562][ T2692] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 117.597406][ T2692] pim6reg0: linktype set to 778 [ 118.080677][ T2707] ref_ctr_offset mismatch. inode: 0x270 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 118.417620][ T2710] ref_ctr_offset mismatch. inode: 0x333 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 118.774415][ T2731] device veth0_vlan left promiscuous mode [ 118.780323][ T2731] device veth0_vlan entered promiscuous mode [ 118.787211][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 118.797296][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 118.804331][ T30] audit: type=1400 audit(1732143295.873:151): avc: denied { create } for pid=2730 comm="syz.4.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 118.844198][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 118.973556][ T2734] bridge0: port 3(veth0_to_batadv) entered blocking state [ 119.016987][ T2734] bridge0: port 3(veth0_to_batadv) entered disabled state [ 119.085857][ T2734] device veth0_to_batadv entered promiscuous mode [ 119.098439][ T2734] bridge0: port 3(veth0_to_batadv) entered blocking state [ 119.106013][ T2734] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 119.314882][ T2753] device pim6reg1 entered promiscuous mode [ 119.783949][ T2781] tap0: tun_chr_ioctl cmd 2147767517 [ 119.804423][ T2781] device syzkaller0 entered promiscuous mode [ 120.836024][ T2873] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 120.917875][ T2873] pim6reg0: linktype set to 778 [ 121.083372][ T2876] device macsec0 left promiscuous mode [ 121.261959][ T2877] device veth1_macvtap entered promiscuous mode [ 121.268099][ T2877] device macsec0 entered promiscuous mode [ 121.274137][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 122.981133][ T2985] ref_ctr_offset mismatch. inode: 0x314 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 123.041295][ T2976] ref_ctr_offset mismatch. inode: 0x2fa offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 124.925973][ T3019] device syzkaller0 entered promiscuous mode [ 125.062197][ T3029] device veth1_macvtap left promiscuous mode [ 127.464365][ T3076] ref_ctr_offset mismatch. inode: 0x32d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 130.885262][ T3143] device syzkaller0 entered promiscuous mode [ 131.963450][ T3161] ref_ctr_offset mismatch. inode: 0x33e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 132.375719][ T3177] device pim6reg1 entered promiscuous mode [ 134.388158][ T3216] ref_ctr_offset mismatch. inode: 0x2fb offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 134.408110][ T3219] syz.4.816[3219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.408182][ T3219] syz.4.816[3219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.532518][ T3220] device syzkaller0 entered promiscuous mode [ 134.633784][ T3240] device syzkaller0 entered promiscuous mode [ 135.276410][ T3242] device syzkaller0 entered promiscuous mode [ 136.113372][ T3271] device pim6reg1 entered promiscuous mode [ 136.325735][ T3274] ref_ctr_offset mismatch. inode: 0x37a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 136.870358][ T3291] device sit0 entered promiscuous mode [ 137.279646][ T3285] device syzkaller0 entered promiscuous mode [ 137.730660][ T3305] device syzkaller0 entered promiscuous mode [ 138.612681][ T3324] ref_ctr_offset mismatch. inode: 0x38f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 138.640912][ T3328] device syzkaller0 entered promiscuous mode [ 139.416015][ T3348] device syzkaller0 entered promiscuous mode [ 139.688531][ T3358] device sit0 left promiscuous mode [ 141.056734][ T3376] ref_ctr_offset mismatch. inode: 0x335 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 141.616218][ T3384] device veth0_vlan left promiscuous mode [ 141.641491][ T3384] device veth0_vlan entered promiscuous mode [ 141.840607][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.855070][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 141.866899][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 142.681016][ T3434] ref_ctr_offset mismatch. inode: 0x341 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 142.796737][ T3438] device syzkaller0 entered promiscuous mode [ 143.152699][ T3447] device pim6reg1 entered promiscuous mode [ 143.823527][ T3466] device syzkaller0 entered promiscuous mode [ 143.997827][ T3480] ref_ctr_offset mismatch. inode: 0x35c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 144.332076][ T3505] device pim6reg1 entered promiscuous mode [ 144.519439][ T3516] device syzkaller0 entered promiscuous mode [ 144.977704][ T3531] ref_ctr_offset mismatch. inode: 0x3e0 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 146.095468][ T3566] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x32 [ 146.525094][ T3572] ref_ctr_offset mismatch. inode: 0x41f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 146.683404][ T3584] device syzkaller0 entered promiscuous mode [ 147.007423][ T3610] ref_ctr_offset mismatch. inode: 0x435 offset: 0x0 ref_ctr_offset(old): 0x1fe ref_ctr_offset(new): 0x0 [ 147.143484][ T3598] device sit0 left promiscuous mode [ 147.728901][ T30] audit: type=1400 audit(1732143324.803:152): avc: denied { ioctl } for pid=3635 comm="syz.1.939" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5460 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 148.059353][ T3649] device syzkaller0 entered promiscuous mode [ 148.261566][ T3653] ref_ctr_offset mismatch. inode: 0x440 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 148.750183][ T3676] device pim6reg1 entered promiscuous mode [ 148.880628][ T3686] device pim6reg1 entered promiscuous mode [ 149.463604][ T30] audit: type=1400 audit(1732143326.533:153): avc: denied { append } for pid=3711 comm="syz.2.964" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 150.048295][ T3730] Â: renamed from pim6reg1 [ 150.191099][ T30] audit: type=1400 audit(1732143327.263:154): avc: denied { create } for pid=3731 comm="syz.1.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 151.187114][ T3764] device syzkaller0 entered promiscuous mode [ 152.127823][ T3786] syz.1.985[3786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.127882][ T3786] syz.1.985[3786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.052690][ T3843] syz.2.1002[3843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.181262][ T3842] syz.2.1002[3842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.197129][ T3843] syz.2.1002[3843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.216566][ T3845] device syzkaller0 entered promiscuous mode [ 155.216910][ T3842] syz.2.1002[3842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.056948][ T3852] device veth1_macvtap left promiscuous mode [ 156.161792][ T3855] device veth1_macvtap entered promiscuous mode [ 156.168054][ T3855] device macsec0 entered promiscuous mode [ 156.289751][ T3863] ref_ctr_offset mismatch. inode: 0x428 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 156.484385][ T3891] device syzkaller0 entered promiscuous mode [ 156.877639][ T3897] ref_ctr_offset mismatch. inode: 0x42f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 157.016917][ T3900] device syzkaller0 entered promiscuous mode [ 157.623106][ T3910] device syzkaller0 entered promiscuous mode [ 160.554463][ T293] syz-executor (293) used greatest stack depth: 20688 bytes left [ 161.278363][ T449] device veth0_to_batadv left promiscuous mode [ 161.296968][ T449] bridge0: port 3(veth0_to_batadv) entered disabled state [ 161.340132][ T449] device bridge_slave_1 left promiscuous mode [ 161.346097][ T449] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.403515][ T449] device bridge_slave_0 left promiscuous mode [ 161.422566][ T449] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.489263][ T449] device veth1_macvtap left promiscuous mode [ 161.589695][ T30] audit: type=1400 audit(1732143338.663:155): avc: denied { create } for pid=3984 comm="syz.4.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 162.020195][ T4004] syz.3.1049[4004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.020267][ T4004] syz.3.1049[4004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.032691][ T30] audit: type=1400 audit(1732143339.113:156): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 162.091249][ T30] audit: type=1400 audit(1732143339.113:157): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 162.123779][ T3980] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.130787][ T3980] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.138163][ T3980] device bridge_slave_0 entered promiscuous mode [ 162.144828][ T4005] device pim6reg1 entered promiscuous mode [ 162.151606][ T3980] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.166805][ T30] audit: type=1400 audit(1732143339.113:158): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 162.179474][ T3980] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.197409][ T3980] device bridge_slave_1 entered promiscuous mode [ 162.322243][ T3980] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.329152][ T3980] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.336220][ T3980] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.343026][ T3980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.393608][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.401868][ T449] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.417061][ T449] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.435102][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.443258][ T449] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.450131][ T449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.458101][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.467274][ T449] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.474153][ T449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.490832][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.507636][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 162.516097][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.527711][ T3980] device veth0_vlan entered promiscuous mode [ 162.534146][ T4012] device sit0 left promiscuous mode [ 162.544179][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 162.552695][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 162.559995][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 162.587096][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 162.597166][ T3980] device veth1_macvtap entered promiscuous mode [ 162.607990][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 162.620823][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 162.654010][ T30] audit: type=1400 audit(1732143339.723:159): avc: denied { mounton } for pid=3980 comm="syz-executor" path="/root/syzkaller.RBxrzq/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 162.707266][ T30] audit: type=1400 audit(1732143339.723:160): avc: denied { mount } for pid=3980 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 162.730047][ T30] audit: type=1400 audit(1732143339.753:161): avc: denied { mounton } for pid=3980 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 163.001936][ T4015] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.037346][ T4015] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.044487][ T4015] device bridge_slave_0 entered promiscuous mode [ 163.167320][ T4015] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.174182][ T4015] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.189824][ T4015] device bridge_slave_1 entered promiscuous mode [ 163.563881][ T4061] bond_slave_1: mtu less than device minimum [ 163.652161][ T4015] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.659042][ T4015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.666151][ T4015] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.672937][ T4015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.697873][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.717475][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.772364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.779836][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.793842][ T449] device bridge_slave_1 left promiscuous mode [ 163.800276][ T449] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.808394][ T449] device bridge_slave_0 left promiscuous mode [ 163.815539][ T449] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.828946][ T449] device veth1_macvtap left promiscuous mode [ 163.851424][ T449] device veth0_vlan left promiscuous mode [ 164.022802][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.032052][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.040680][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.047583][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.055167][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.063752][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.072215][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.079081][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.116175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.128067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.139197][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.147730][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.164414][ T4015] device veth0_vlan entered promiscuous mode [ 164.173937][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.189252][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.200072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 164.208113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.226683][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.244153][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.269829][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.288676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.333378][ T4015] device veth1_macvtap entered promiscuous mode [ 164.372458][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.380292][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.401898][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 164.497855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 164.507088][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.414873][ T4160] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.421800][ T4160] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.430492][ T4160] device bridge_slave_0 entered promiscuous mode [ 165.437601][ T4160] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.444586][ T4160] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.453280][ T4160] device bridge_slave_1 entered promiscuous mode [ 166.052194][ T8] device bridge_slave_1 left promiscuous mode [ 166.058358][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.067095][ T8] device bridge_slave_0 left promiscuous mode [ 166.073172][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.081672][ T8] device veth1_macvtap left promiscuous mode [ 166.087673][ T8] device veth0_vlan left promiscuous mode [ 166.207814][ T4193] device syzkaller0 entered promiscuous mode [ 166.254772][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.262390][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.271479][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.280233][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.288929][ T449] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.295807][ T449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.460038][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.467673][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.475949][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.484355][ T449] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.491237][ T449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.499009][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.508774][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.516672][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.524633][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.778169][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.806871][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.818310][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.826256][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.851809][ T4211] device syzkaller0 entered promiscuous mode [ 167.117672][ T4160] device veth0_vlan entered promiscuous mode [ 167.127596][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.137180][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.312034][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.337437][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.411011][ T4160] device veth1_macvtap entered promiscuous mode [ 167.448932][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.460593][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.482165][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.511190][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 167.596888][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.663624][ T4236] device syzkaller0 entered promiscuous mode [ 168.758533][ T4230] ref_ctr_offset mismatch. inode: 0x4aa offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 168.952573][ T4238] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.962337][ T4238] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.969619][ T4238] device bridge_slave_0 entered promiscuous mode [ 168.981802][ T4258] device syzkaller0 entered promiscuous mode [ 169.029052][ T4238] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.036025][ T4238] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.052254][ T4238] device bridge_slave_1 entered promiscuous mode [ 169.079034][ T4261] device syzkaller0 entered promiscuous mode [ 169.249671][ T4270] device pim6reg1 entered promiscuous mode [ 169.299814][ T4272] device veth0_vlan left promiscuous mode [ 169.335869][ T4272] device veth0_vlan entered promiscuous mode [ 169.383600][ T4274] ref_ctr_offset mismatch. inode: 0x472 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 169.408350][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.416870][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.424349][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.810411][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.857879][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.990120][ T8] device bridge_slave_1 left promiscuous mode [ 169.996083][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.239287][ T8] device bridge_slave_0 left promiscuous mode [ 170.304835][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.379902][ T8] device veth1_macvtap left promiscuous mode [ 170.385752][ T8] device veth0_vlan left promiscuous mode [ 170.760404][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.768920][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.777259][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.784116][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.792042][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.801725][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.810014][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.816882][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.824329][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.832522][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.854855][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.890520][ T4238] device veth0_vlan entered promiscuous mode [ 170.942229][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.983161][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 171.064795][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 171.117118][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.127839][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.135154][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.152968][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.165947][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.208031][ T4238] device veth1_macvtap entered promiscuous mode [ 171.318317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.340282][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.415451][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.465940][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.487155][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 171.616415][ T4329] device syzkaller0 entered promiscuous mode [ 172.336455][ T4344] device pim6reg1 entered promiscuous mode [ 172.499039][ T45] device bridge_slave_1 left promiscuous mode [ 172.505060][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.512759][ T45] device bridge_slave_0 left promiscuous mode [ 172.518853][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.527931][ T45] device veth1_macvtap left promiscuous mode [ 172.697148][ T45] device veth0_vlan left promiscuous mode [ 172.887773][ T4347] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.894612][ T4347] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.917498][ T4347] device bridge_slave_0 entered promiscuous mode [ 172.924300][ T4347] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.953521][ T4347] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.960918][ T4347] device bridge_slave_1 entered promiscuous mode [ 173.094752][ T4372] ref_ctr_offset mismatch. inode: 0x49a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 173.101549][ T4374] device syzkaller0 entered promiscuous mode [ 173.143400][ T4376] ref_ctr_offset mismatch. inode: 0x4da offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 174.130104][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.152838][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.174032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.191213][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.208799][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.215670][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.225435][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.239236][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.247567][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.254415][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.271090][ T4415] device syzkaller0 entered promiscuous mode [ 174.283070][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.291485][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.299965][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.308273][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.316491][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.460111][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.471980][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.522194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 174.533296][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.545279][ T4347] device veth0_vlan entered promiscuous mode [ 174.552524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.560183][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.577214][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 174.587728][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 174.596912][ T4347] device veth1_macvtap entered promiscuous mode [ 174.629768][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 174.640855][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 174.649020][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 174.658294][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 174.666377][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.510058][ T4459] device syzkaller0 entered promiscuous mode [ 175.865175][ T30] audit: type=1400 audit(1732143352.933:162): avc: denied { create } for pid=4483 comm="syz.3.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 177.121901][ T4485] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.128785][ T4485] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.136100][ T4485] device bridge_slave_0 entered promiscuous mode [ 177.157099][ T4485] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.164012][ T4485] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.171586][ T4485] device bridge_slave_1 entered promiscuous mode [ 178.073135][ T45] device bridge_slave_1 left promiscuous mode [ 178.079434][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.086939][ T45] device bridge_slave_0 left promiscuous mode [ 178.095550][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.103614][ T45] device veth1_macvtap left promiscuous mode [ 178.178547][ T45] device veth0_vlan left promiscuous mode [ 178.760599][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.768286][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.783830][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.793253][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.801487][ T449] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.808361][ T449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.818933][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.852983][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.861625][ T449] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.868489][ T449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.892314][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.900725][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.909961][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.918093][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.955072][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.082252][ T4485] device veth0_vlan entered promiscuous mode [ 179.209756][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.287427][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.447081][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.534023][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.623422][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.697081][ T4545] device veth0_vlan left promiscuous mode [ 179.729403][ T4545] device veth0_vlan entered promiscuous mode [ 179.763918][ T4485] device veth1_macvtap entered promiscuous mode [ 179.787227][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.806101][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.845727][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.967124][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.564961][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 180.597166][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.723398][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.740322][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.035756][ T4563] device syzkaller0 entered promiscuous mode [ 182.666726][ T4588] ref_ctr_offset mismatch. inode: 0x563 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 182.987538][ T4585] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.032470][ T4585] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.088500][ T4585] device bridge_slave_0 entered promiscuous mode [ 183.285813][ T4585] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.325613][ T4585] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.340208][ T4585] device bridge_slave_1 entered promiscuous mode [ 183.370449][ T4602] device pim6reg1 entered promiscuous mode [ 183.562890][ T45] device bridge_slave_1 left promiscuous mode [ 183.570559][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.056967][ T45] device bridge_slave_0 left promiscuous mode [ 185.073105][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.093472][ T45] device veth1_macvtap left promiscuous mode [ 185.099472][ T45] device veth0_vlan left promiscuous mode [ 185.333788][ T4632] device syzkaller0 entered promiscuous mode [ 185.909025][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.936996][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.047131][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.117392][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.272756][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.279644][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.486750][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.505718][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.522624][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.529956][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.622050][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.638795][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.769986][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.821490][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.829540][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.840084][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 186.851182][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.869278][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 186.901408][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.924378][ T4585] device veth0_vlan entered promiscuous mode [ 186.934673][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.947409][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.033108][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 187.065319][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.199987][ T4585] device veth1_macvtap entered promiscuous mode [ 187.269967][ T4685] ref_ctr_offset mismatch. inode: 0x501 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 187.440353][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 187.471301][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 187.481322][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.513405][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 187.543807][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.607533][ T4703] device syzkaller0 entered promiscuous mode [ 188.486421][ T4715] device syzkaller0 entered promiscuous mode [ 188.873289][ T4710] device syzkaller0 entered promiscuous mode [ 189.348108][ T4725] device sit0 left promiscuous mode [ 189.584791][ T4725] device sit0 entered promiscuous mode [ 190.062955][ T4741] ref_ctr_offset mismatch. inode: 0x53d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 190.103826][ T4719] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.120820][ T4719] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.157232][ T4719] device bridge_slave_0 entered promiscuous mode [ 190.189625][ T4752] device syzkaller0 entered promiscuous mode [ 190.208273][ T4719] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.215133][ T4719] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.230676][ T4719] device bridge_slave_1 entered promiscuous mode [ 190.310052][ T45] device bridge_slave_1 left promiscuous mode [ 190.316012][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.375030][ T45] device bridge_slave_0 left promiscuous mode [ 190.385364][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.394035][ T45] device veth1_macvtap left promiscuous mode [ 190.406021][ T45] device veth0_vlan left promiscuous mode [ 190.607805][ T4766] ref_ctr_offset mismatch. inode: 0x527 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 190.839531][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.847446][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.865852][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.884632][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.892942][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.899822][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.907491][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.928885][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.937818][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.944676][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.953159][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.961131][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.970672][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.017150][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.079356][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.094232][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.104212][ T4808] ref_ctr_offset mismatch. inode: 0x599 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 191.106984][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.127919][ T4719] device veth0_vlan entered promiscuous mode [ 191.165149][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.180918][ T4719] device veth1_macvtap entered promiscuous mode [ 191.191416][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.200057][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.220490][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.228755][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 191.262807][ T4818] ref_ctr_offset mismatch. inode: 0x55e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 192.347237][ T45] device bridge_slave_1 left promiscuous mode [ 192.353156][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.360460][ T45] device bridge_slave_0 left promiscuous mode [ 192.366359][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.374023][ T45] device veth1_macvtap left promiscuous mode [ 192.379838][ T45] device veth0_vlan left promiscuous mode [ 192.717418][ T4841] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.751004][ T4841] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.758445][ T4841] device bridge_slave_0 entered promiscuous mode [ 192.774156][ T4841] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.867029][ T4841] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.901586][ T4841] device bridge_slave_1 entered promiscuous mode [ 192.912654][ T4856] ref_ctr_offset mismatch. inode: 0x53d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 192.972648][ T4862] ref_ctr_offset mismatch. inode: 0x5b5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 193.251197][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.263299][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.307191][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.337412][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.345909][ T449] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.352796][ T449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.360732][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.369227][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.382159][ T449] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.389045][ T449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.398833][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.465618][ T4841] device veth0_vlan entered promiscuous mode [ 193.493443][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.509044][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.517402][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.524756][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.532413][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.546025][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.555775][ T4890] device pim6reg1 entered promiscuous mode [ 193.689890][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.700676][ T4841] device veth1_macvtap entered promiscuous mode [ 193.821143][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.913640][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.924756][ T449] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.323534][ T4918] ref_ctr_offset mismatch. inode: 0x57f offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 195.256509][ T4924] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 195.262651][ T4924] syzkaller0: linktype set to 804 [ 195.277554][ T45] device bridge_slave_1 left promiscuous mode [ 195.283575][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.291390][ T45] device bridge_slave_0 left promiscuous mode [ 195.307092][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.356587][ T45] device veth1_macvtap left promiscuous mode [ 195.366775][ T45] device veth0_vlan left promiscuous mode [ 196.195266][ T4940] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.297747][ T4940] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.317968][ T4940] device bridge_slave_0 entered promiscuous mode [ 196.335568][ T4940] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.414014][ T4940] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.475299][ T4969] ref_ctr_offset mismatch. inode: 0x559 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 196.488690][ T4940] device bridge_slave_1 entered promiscuous mode [ 196.562648][ T4980] device syzkaller0 entered promiscuous mode [ 196.569275][ T4978] device pim6reg1 entered promiscuous mode [ 196.762527][ T4991] device syzkaller0 entered promiscuous mode [ 196.823469][ T4940] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.830344][ T4940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.837457][ T4940] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.844225][ T4940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.901800][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.909136][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.917275][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.929698][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.957092][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.967634][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.975694][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.982567][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.042308][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.098801][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.140456][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.147351][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.192773][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.210951][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.282428][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.419598][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.457422][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.502302][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.548642][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 197.589080][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.670257][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 197.678860][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.701891][ T4940] device veth0_vlan entered promiscuous mode [ 197.836290][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 197.866886][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.012921][ T4940] device veth1_macvtap entered promiscuous mode [ 198.134017][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 198.262964][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.287077][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.314644][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.397046][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.747904][ T45] device bridge_slave_1 left promiscuous mode [ 199.753820][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.761160][ T45] device bridge_slave_0 left promiscuous mode [ 199.767156][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.774612][ T45] device veth1_macvtap left promiscuous mode [ 199.780448][ T45] device veth0_vlan left promiscuous mode [ 200.281050][ T30] audit: type=1400 audit(1732143377.353:163): avc: denied { create } for pid=5085 comm="syz.3.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 200.505031][ T5087] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.512240][ T5087] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.519829][ T5087] device bridge_slave_0 entered promiscuous mode [ 200.541844][ T5087] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.549770][ T5087] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.557353][ T5087] device bridge_slave_1 entered promiscuous mode [ 201.017935][ T5087] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.024802][ T5087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.031955][ T5087] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.038981][ T5087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.333891][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.376477][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.623518][ T5138] ref_ctr_offset mismatch. inode: 0x62d offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 201.655517][ T5136] ref_ctr_offset mismatch. inode: 0x5d1 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 201.902495][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.931856][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.939722][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.948347][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.971396][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.978300][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.042070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.050382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.058755][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.065631][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.277468][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.308805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.393436][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.401572][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.411176][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.423537][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.497382][ T5087] device veth0_vlan entered promiscuous mode [ 202.556566][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.577551][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.736649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.784148][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.795257][ T5087] device veth1_macvtap entered promiscuous mode [ 202.845191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 202.853609][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 202.861861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.003635][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.011996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.057416][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.100949][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.047421][ T45] device bridge_slave_1 left promiscuous mode [ 206.053381][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.061232][ T45] device bridge_slave_0 left promiscuous mode [ 206.067548][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.075664][ T45] device veth1_macvtap left promiscuous mode [ 206.081859][ T45] device veth0_vlan left promiscuous mode [ 206.673789][ T30] audit: type=1400 audit(1732143383.743:164): avc: denied { attach_queue } for pid=5230 comm="syz.3.1382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 206.747737][ T5234] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.754888][ T5234] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.762719][ T5234] device bridge_slave_0 entered promiscuous mode [ 206.769627][ T5234] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.776465][ T5234] bridge0: port 2(bridge_slave_1) entered disabled state [ 206.783787][ T5234] device bridge_slave_1 entered promiscuous mode [ 207.621030][ T5269] device syzkaller0 entered promiscuous mode [ 207.988638][ T5270] device veth1_macvtap entered promiscuous mode [ 208.006650][ T5270] device macsec0 entered promiscuous mode [ 208.159066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.166988][ T5280] device veth1_macvtap left promiscuous mode [ 208.172794][ T5280] device macsec0 left promiscuous mode [ 208.191050][ T5289] device pim6reg1 entered promiscuous mode [ 208.224926][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 208.232907][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.269080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 208.283101][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.322483][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.329373][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.337025][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 208.345306][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.353677][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.360643][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.369669][ T5291] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.376692][ T5291] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.400140][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 208.419237][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 208.429055][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.447364][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 208.455340][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 208.504533][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 208.516127][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 208.542559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 208.554579][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.570148][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.579251][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 208.599174][ T5329] device syzkaller0 entered promiscuous mode [ 208.615191][ T5234] device veth0_vlan entered promiscuous mode [ 208.637226][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 208.645504][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 208.663808][ T5234] device veth1_macvtap entered promiscuous mode [ 208.697612][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.705380][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.713884][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.722415][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.731107][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 209.427393][ T312] device bridge_slave_1 left promiscuous mode [ 209.433314][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.440627][ T312] device bridge_slave_0 left promiscuous mode [ 209.446532][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.454302][ T312] device veth1_macvtap left promiscuous mode [ 209.460125][ T312] device veth0_vlan left promiscuous mode [ 210.579792][ T5358] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.603782][ T5358] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.611371][ T5358] device bridge_slave_0 entered promiscuous mode [ 210.625743][ T5358] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.661488][ T5358] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.720326][ T5358] device bridge_slave_1 entered promiscuous mode [ 211.423926][ T30] audit: type=1400 audit(1732143388.493:165): avc: denied { create } for pid=5390 comm="syz.0.1427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 212.309751][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.317777][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.332527][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.340886][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.349345][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.356223][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.398406][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.407817][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.416034][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.425434][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.432316][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.687692][ T5410] device sit0 left promiscuous mode [ 212.785232][ T5411] device sit0 entered promiscuous mode [ 213.182648][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.213187][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.221435][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.322191][ T5358] device veth0_vlan entered promiscuous mode [ 213.440089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 213.482253][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.532315][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 213.548927][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.635499][ T5358] device veth1_macvtap entered promiscuous mode [ 213.714114][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.721488][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.729025][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 213.737097][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.745113][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 213.820446][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 213.837935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.898720][ T5427] device veth0_vlan left promiscuous mode [ 214.055253][ T5427] device veth0_vlan entered promiscuous mode [ 214.538689][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.588044][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.659960][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.777244][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.834829][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿÿÿ: link becomes ready [ 216.260619][ T8] device bridge_slave_1 left promiscuous mode [ 216.277288][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.357155][ T8] device bridge_slave_0 left promiscuous mode [ 216.363125][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.387626][ T8] device veth1_macvtap left promiscuous mode [ 216.393470][ T8] device veth0_vlan left promiscuous mode [ 216.999459][ T5458] device pim6reg1 entered promiscuous mode [ 217.006173][ T5465] syz.4.1447[5465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.006245][ T5465] syz.4.1447[5465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.258411][ T5467] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.457012][ T5467] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.523569][ T5467] device bridge_slave_0 entered promiscuous mode [ 217.666535][ T5467] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.686649][ T5467] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.748670][ T5467] device bridge_slave_1 entered promiscuous mode [ 218.135047][ T5489] ref_ctr_offset mismatch. inode: 0x638 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 218.350259][ T5506] syz.0.1459[5506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.350327][ T5506] syz.0.1459[5506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.596169][ T5488] device syzkaller0 entered promiscuous mode [ 218.827258][ T5510] ref_ctr_offset mismatch. inode: 0x617 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 218.999885][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.107035][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.175462][ T5527] device syzkaller0 entered promiscuous mode [ 219.329181][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.350380][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.385542][ T5066] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.392446][ T5066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.443167][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.475821][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.496763][ T5066] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.503620][ T5066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.511023][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.520037][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.528011][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.536179][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.701565][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.731899][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.761854][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.778851][ T5467] device veth0_vlan entered promiscuous mode [ 219.793610][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.808142][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.841716][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.857133][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.881213][ T30] audit: type=1400 audit(1732143396.953:166): avc: denied { create } for pid=5557 comm="syz.0.1473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 219.901217][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.927710][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.941959][ T5548] ref_ctr_offset mismatch. inode: 0x6c8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 220.067344][ T5467] device veth1_macvtap entered promiscuous mode [ 220.076886][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.277626][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.320724][ T5550] ref_ctr_offset mismatch. inode: 0x622 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 220.365792][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.444378][ T5575] ref_ctr_offset mismatch. inode: 0x6d3 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 220.446991][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.504081][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.014148][ T5592] bond_slave_1: mtu less than device minimum [ 221.547115][ T45] device bridge_slave_1 left promiscuous mode [ 221.553035][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.560280][ T45] device bridge_slave_0 left promiscuous mode [ 221.566178][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.573754][ T45] device veth1_macvtap left promiscuous mode [ 221.579581][ T45] device veth0_vlan left promiscuous mode [ 222.804872][ T5616] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.847778][ T5616] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.855106][ T5616] device bridge_slave_0 entered promiscuous mode [ 222.862517][ T5616] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.869822][ T5616] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.903678][ T5616] device bridge_slave_1 entered promiscuous mode [ 223.063630][ T5643] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.070658][ T5643] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.044843][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.052522][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.073457][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.082904][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.092895][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.099756][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.194129][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.201813][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.210240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.218972][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.225823][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.235613][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.243875][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.328657][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.337107][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.348662][ T5616] device veth0_vlan entered promiscuous mode [ 224.360585][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.368375][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.479005][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.486954][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.583386][ T5694] ref_ctr_offset mismatch. inode: 0x6a3 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 224.613681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.622038][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.634718][ T5616] device veth1_macvtap entered promiscuous mode [ 224.937999][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.986017][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.130793][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.295800][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 225.486975][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.651691][ T312] device bridge_slave_1 left promiscuous mode [ 226.657657][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.807995][ T312] device bridge_slave_0 left promiscuous mode [ 226.813948][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.948344][ T312] device veth1_macvtap left promiscuous mode [ 226.954194][ T312] device veth0_vlan left promiscuous mode [ 227.397316][ T5718] device pim6reg1 entered promiscuous mode [ 227.519153][ T5732] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.533143][ T5732] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.540810][ T5732] device bridge_slave_0 entered promiscuous mode [ 227.547862][ T5732] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.554857][ T5732] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.562290][ T5732] device bridge_slave_1 entered promiscuous mode [ 227.640735][ T5732] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.647624][ T5732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.654726][ T5732] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.661514][ T5732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.691708][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.701905][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.713767][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.768422][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.777618][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.784482][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.847666][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.933552][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.940445][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.006678][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.014670][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.442652][ T5749] device syzkaller0 entered promiscuous mode [ 229.579550][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.599678][ T5732] device veth0_vlan entered promiscuous mode [ 229.608633][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.616995][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.641633][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.665959][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.686422][ T5732] device veth1_macvtap entered promiscuous mode [ 229.750102][ T5780] tun0: tun_chr_ioctl cmd 1074025675 [ 229.755230][ T5780] tun0: persist enabled [ 229.776918][ T5775] tun0: tun_chr_ioctl cmd 1074025675 [ 229.782144][ T5775] tun0: persist enabled [ 229.786218][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.798971][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.920697][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.002077][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.032504][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.046411][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.060792][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.080649][ T5786] device sit0 left promiscuous mode [ 230.117443][ T5788] device sit0 entered promiscuous mode [ 230.867283][ T8] device bridge_slave_1 left promiscuous mode [ 230.873205][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.880509][ T8] device bridge_slave_0 left promiscuous mode [ 230.886416][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.894157][ T8] device veth1_macvtap left promiscuous mode [ 230.899981][ T8] device veth0_vlan left promiscuous mode [ 232.306085][ T5822] device syzkaller0 entered promiscuous mode [ 232.451676][ T5830] ref_ctr_offset mismatch. inode: 0x690 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 232.766150][ T5814] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.871428][ T5814] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.981084][ T5814] device bridge_slave_0 entered promiscuous mode [ 233.078263][ T5814] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.085132][ T5814] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.092424][ T5814] device bridge_slave_1 entered promiscuous mode [ 233.315293][ T5843] tun0: tun_chr_ioctl cmd 1074025675 [ 233.325048][ T5843] tun0: persist enabled [ 233.355376][ T5844] tun0: tun_chr_ioctl cmd 1074025675 [ 233.361272][ T5844] tun0: persist enabled [ 233.640063][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.647591][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.868178][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.893457][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.922252][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.929141][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.976765][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.995260][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.005249][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.012118][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.389503][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.517354][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.531634][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.539790][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.559128][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.763167][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 234.781282][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 234.803443][ T5814] device veth0_vlan entered promiscuous mode [ 234.838590][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 234.937169][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.037140][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.116446][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.130110][ T5814] device veth1_macvtap entered promiscuous mode [ 235.180790][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.259495][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.326987][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.541863][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.617823][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.692443][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.924417][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 236.920514][ T8] device bridge_slave_1 left promiscuous mode [ 236.926472][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.948184][ T8] device bridge_slave_0 left promiscuous mode [ 236.956753][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.977993][ T8] device veth1_macvtap left promiscuous mode [ 236.983833][ T8] device veth0_vlan left promiscuous mode [ 238.464376][ T5896] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.472225][ T5896] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.557486][ T5896] device bridge_slave_0 entered promiscuous mode [ 238.611376][ T5896] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.640322][ T5896] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.649298][ T5896] device bridge_slave_1 entered promiscuous mode [ 239.189622][ T5917] device syzkaller0 entered promiscuous mode [ 239.400202][ T5927] device sit0 entered promiscuous mode [ 239.762479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 239.781293][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.877054][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 239.914464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 239.931930][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.938834][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.965706][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.980384][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.998322][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.005199][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.013174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.057829][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.108337][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.201440][ T5896] device veth0_vlan entered promiscuous mode [ 240.213246][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.224868][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.240908][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.255872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.271648][ T5896] device veth1_macvtap entered promiscuous mode [ 240.285325][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.303035][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.313393][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.346091][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.987028][ T5066] device bridge_slave_1 left promiscuous mode [ 240.992942][ T5066] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.000255][ T5066] device bridge_slave_0 left promiscuous mode [ 241.006153][ T5066] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.013740][ T5066] device veth1_macvtap left promiscuous mode [ 241.019571][ T5066] device veth0_vlan left promiscuous mode [ 242.818573][ T5995] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.825432][ T5995] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.857105][ T5995] device bridge_slave_0 entered promiscuous mode [ 242.867812][ T5995] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.874747][ T5995] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.891590][ T5995] device bridge_slave_1 entered promiscuous mode [ 242.911759][ T6018] device wg2 left promiscuous mode [ 242.958808][ T6024] device wg2 entered promiscuous mode [ 242.990358][ T6020] device veth0_vlan left promiscuous mode [ 243.023620][ T6020] device veth0_vlan entered promiscuous mode [ 243.087382][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.095586][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 243.103195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.283737][ T6034] device syzkaller0 entered promiscuous mode [ 243.304687][ T6042] device sit0 entered promiscuous mode [ 243.377605][ T5995] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.384490][ T5995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.391614][ T5995] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.398460][ T5995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.558405][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.589705][ T5066] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.658200][ T5066] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.795885][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.868461][ T5066] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.875334][ T5066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.002699][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.067933][ T5066] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.074815][ T5066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.162029][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.170036][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.185312][ T6076] device pim6reg1 entered promiscuous mode [ 244.203990][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 244.221746][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.283520][ T5995] device veth0_vlan entered promiscuous mode [ 244.319553][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 244.350427][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.398296][ T5995] device veth1_macvtap entered promiscuous mode [ 244.471449][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.495042][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.603122][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.662782][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.671121][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.693714][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.707432][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.715735][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.724342][ T5066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.557115][ T5066] device bridge_slave_1 left promiscuous mode [ 245.563066][ T5066] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.570321][ T5066] device bridge_slave_0 left promiscuous mode [ 245.576222][ T5066] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.583838][ T5066] device veth1_macvtap left promiscuous mode [ 245.589706][ T5066] device veth0_vlan left promiscuous mode [ 247.919249][ T6119] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.930615][ T6135] FAULT_INJECTION: forcing a failure. [ 247.930615][ T6135] name failslab, interval 1, probability 0, space 0, times 0 [ 247.946897][ T6119] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.962479][ T6119] device bridge_slave_0 entered promiscuous mode [ 247.983385][ T6135] CPU: 1 PID: 6135 Comm: syz.0.1640 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 247.993110][ T6135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 248.003004][ T6135] Call Trace: [ 248.006137][ T6135] [ 248.009098][ T6135] dump_stack_lvl+0x151/0x1c0 [ 248.013598][ T6135] ? io_uring_drop_tctx_refs+0x190/0x190 [ 248.019070][ T6135] ? avc_denied+0x1b0/0x1b0 [ 248.023400][ T6135] dump_stack+0x15/0x20 [ 248.027393][ T6135] should_fail+0x3c6/0x510 [ 248.031647][ T6135] __should_failslab+0xa4/0xe0 [ 248.036248][ T6135] ? __alloc_skb+0xbe/0x550 [ 248.040587][ T6135] should_failslab+0x9/0x20 [ 248.044926][ T6135] slab_pre_alloc_hook+0x37/0xd0 [ 248.049698][ T6135] ? __alloc_skb+0xbe/0x550 [ 248.054035][ T6135] kmem_cache_alloc+0x44/0x200 [ 248.058638][ T6135] __alloc_skb+0xbe/0x550 [ 248.062805][ T6135] alloc_skb_with_frags+0xa6/0x680 [ 248.067751][ T6135] ? 0xffffffffa0018000 [ 248.071740][ T6135] ? is_bpf_text_address+0x172/0x190 [ 248.076865][ T6135] sock_alloc_send_pskb+0x915/0xa50 [ 248.081902][ T6135] ? sock_kzfree_s+0x60/0x60 [ 248.086320][ T6135] ? stack_trace_save+0x113/0x1c0 [ 248.091186][ T6135] ? stack_trace_snprint+0xf0/0xf0 [ 248.096136][ T6135] tun_get_user+0xf1b/0x3aa0 [ 248.100556][ T6135] ? __x64_sys_openat+0x210/0x290 [ 248.105415][ T6135] ? x64_sys_call+0x6bf/0x9a0 [ 248.109929][ T6135] ? _kstrtoull+0x3a0/0x4a0 [ 248.114273][ T6135] ? tun_do_read+0x2010/0x2010 [ 248.118867][ T6135] ? kstrtouint_from_user+0x20a/0x2a0 [ 248.124078][ T6135] ? kstrtol_from_user+0x310/0x310 [ 248.129034][ T6135] ? bpf_probe_read_kernel_str+0x67/0x70 [ 248.134495][ T6135] ? avc_policy_seqno+0x1b/0x70 [ 248.139277][ T6135] ? selinux_file_permission+0x2c4/0x570 [ 248.144748][ T6135] tun_chr_write_iter+0x1e1/0x2e0 [ 248.149608][ T6135] vfs_write+0xd5d/0x1110 [ 248.153776][ T6135] ? file_end_write+0x1c0/0x1c0 [ 248.158463][ T6135] ? __fdget_pos+0x209/0x3a0 [ 248.162884][ T6135] ? ksys_write+0x77/0x2c0 [ 248.167230][ T6135] ksys_write+0x199/0x2c0 [ 248.171392][ T6135] ? __ia32_sys_read+0x90/0x90 [ 248.175989][ T6135] ? debug_smp_processor_id+0x17/0x20 [ 248.181195][ T6135] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 248.187098][ T6135] __x64_sys_write+0x7b/0x90 [ 248.191529][ T6135] x64_sys_call+0x2f/0x9a0 [ 248.195776][ T6135] do_syscall_64+0x3b/0xb0 [ 248.200031][ T6135] ? clear_bhb_loop+0x35/0x90 [ 248.204545][ T6135] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 248.210272][ T6135] RIP: 0033:0x7f25aac9d819 [ 248.214528][ T6135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.233965][ T6135] RSP: 002b:00007f25a9316038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 248.242210][ T6135] RAX: ffffffffffffffda RBX: 00007f25aae54fa0 RCX: 00007f25aac9d819 [ 248.250025][ T6135] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 248.257843][ T6135] RBP: 00007f25a9316090 R08: 0000000000000000 R09: 0000000000000000 [ 248.265642][ T6135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.273456][ T6135] R13: 0000000000000000 R14: 00007f25aae54fa0 R15: 00007ffe29e63b38 [ 248.281275][ T6135] [ 248.297266][ T6119] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.304116][ T6119] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.312147][ T6119] device bridge_slave_1 entered promiscuous mode [ 248.501796][ T6119] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.508679][ T6119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.515782][ T6119] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.522561][ T6119] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.772993][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.785602][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.800067][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 248.807852][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 248.823898][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.833731][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.850071][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.856972][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.867005][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.882222][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.899953][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.906852][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.933364][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.950769][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.965764][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.977119][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.993037][ T6119] device veth0_vlan entered promiscuous mode [ 249.008780][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.023613][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.035657][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 249.045388][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.055471][ T6187] FAULT_INJECTION: forcing a failure. [ 249.055471][ T6187] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 249.075484][ T6119] device veth1_macvtap entered promiscuous mode [ 249.085891][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.099086][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.106262][ T6187] CPU: 0 PID: 6187 Comm: syz.4.1655 Not tainted 5.15.167-syzkaller-00348-g2e66050fb753 #0 [ 249.115967][ T6187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 249.125863][ T6187] Call Trace: [ 249.128982][ T6187] [ 249.131762][ T6187] dump_stack_lvl+0x151/0x1c0 [ 249.136274][ T6187] ? io_uring_drop_tctx_refs+0x190/0x190 [ 249.141753][ T6187] ? stack_trace_save+0x113/0x1c0 [ 249.146603][ T6187] dump_stack+0x15/0x20 [ 249.150592][ T6187] should_fail+0x3c6/0x510 [ 249.154852][ T6187] should_fail_alloc_page+0x5a/0x80 [ 249.159884][ T6187] prepare_alloc_pages+0x15c/0x700 [ 249.164831][ T6187] ? __alloc_pages_bulk+0xe40/0xe40 [ 249.169862][ T6187] ? x64_sys_call+0x2f/0x9a0 [ 249.174287][ T6187] ? do_syscall_64+0x3b/0xb0 [ 249.178712][ T6187] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 249.184619][ T6187] __alloc_pages+0x18c/0x8f0 [ 249.189046][ T6187] ? prep_new_page+0x110/0x110 [ 249.193649][ T6187] kmalloc_order+0x4a/0x160 [ 249.197983][ T6187] kmalloc_order_trace+0x1a/0xb0 [ 249.202756][ T6187] ? alloc_skb_with_frags+0xa6/0x680 [ 249.207877][ T6187] __kmalloc_track_caller+0x19b/0x260 [ 249.213084][ T6187] ? kmem_cache_alloc+0xf5/0x200 [ 249.217860][ T6187] ? alloc_skb_with_frags+0xa6/0x680 [ 249.222979][ T6187] __alloc_skb+0x10c/0x550 [ 249.227227][ T6187] alloc_skb_with_frags+0xa6/0x680 [ 249.232174][ T6187] ? 0xffffffffa0018000 [ 249.236166][ T6187] ? is_bpf_text_address+0x172/0x190 [ 249.237064][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 249.241290][ T6187] sock_alloc_send_pskb+0x915/0xa50 [ 249.241317][ T6187] ? sock_kzfree_s+0x60/0x60 [ 249.250079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 249.254045][ T6187] ? stack_trace_save+0x113/0x1c0 [ 249.254072][ T6187] ? stack_trace_snprint+0xf0/0xf0 [ 249.259010][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 249.266206][ T6187] tun_get_user+0xf1b/0x3aa0 [ 249.266234][ T6187] ? __x64_sys_openat+0x210/0x290 [ 249.292496][ T6187] ? x64_sys_call+0x6bf/0x9a0 [ 249.297011][ T6187] ? _kstrtoull+0x3a0/0x4a0 [ 249.301347][ T6187] ? tun_do_read+0x2010/0x2010 [ 249.305947][ T6187] ? kstrtouint_from_user+0x20a/0x2a0 [ 249.311157][ T6187] ? kstrtol_from_user+0x310/0x310 [ 249.316108][ T6187] ? bpf_probe_read_kernel_str+0x67/0x70 [ 249.321572][ T6187] ? avc_policy_seqno+0x1b/0x70 [ 249.326258][ T6187] ? selinux_file_permission+0x2c4/0x570 [ 249.331728][ T6187] tun_chr_write_iter+0x1e1/0x2e0 [ 249.336588][ T6187] vfs_write+0xd5d/0x1110 [ 249.340751][ T6187] ? file_end_write+0x1c0/0x1c0 [ 249.345440][ T6187] ? __fdget_pos+0x209/0x3a0 [ 249.349866][ T6187] ? ksys_write+0x77/0x2c0 [ 249.354119][ T6187] ksys_write+0x199/0x2c0 [ 249.358284][ T6187] ? __ia32_sys_read+0x90/0x90 [ 249.362881][ T6187] ? debug_smp_processor_id+0x17/0x20 [ 249.368090][ T6187] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 249.373991][ T6187] __x64_sys_write+0x7b/0x90 [ 249.378420][ T6187] x64_sys_call+0x2f/0x9a0 [ 249.382670][ T6187] do_syscall_64+0x3b/0xb0 [ 249.386923][ T6187] ? clear_bhb_loop+0x35/0x90 [ 249.391437][ T6187] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 249.397162][ T6187] RIP: 0033:0x7f2947ca1819 [ 249.401417][ T6187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.420859][ T6187] RSP: 002b:00007f294631a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 249.429103][ T6187] RAX: ffffffffffffffda RBX: 00007f2947e58fa0 RCX: 00007f2947ca1819 [ 249.436912][ T6187] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 249.444732][ T6187] RBP: 00007f294631a090 R08: 0000000000000000 R09: 0000000000000000 [ 249.452538][ T6187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 249.460346][ T6187] R13: 0000000000000000 R14: 00007f2947e58fa0 R15: 00007ffce6ffa528 [ 249.468167][ T6187] [ 249.476861][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 249.496745][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 249.505583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 249.516323][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=1039 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 250.635038][ T10] device bridge_slave_1 left promiscuous mode [ 250.641006][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.648290][ T10] device bridge_slave_0 left promiscuous mode [ 250.654195][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.662240][ T10] device veth1_macvtap left promiscuous mode [ 250.668079][ T10] device veth0_vlan left promiscuous mode [ 252.420335][ T10] device bridge_slave_1 left promiscuous mode [ 252.426288][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.546874][ T10] device bridge_slave_0 left promiscuous mode [ 252.552862][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.688218][ T10] device veth0_vlan left promiscuous mode [ 253.146749][ T289] syz-executor (289) used greatest stack depth: 19232 bytes left [ 254.307513][ T10] device bridge_slave_1 left promiscuous mode [ 254.313442][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.320664][ T10] device bridge_slave_0 left promiscuous mode [ 254.326686][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.335426][ T10] device veth1_macvtap left promiscuous mode [ 254.341261][ T10] device veth0_vlan left promiscuous mode