last executing test programs: 25.084298233s ago: executing program 2 (id=5408): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180200008010000000000000040000008500000027000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 21.168413993s ago: executing program 2 (id=5408): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180200008010000000000000040000008500000027000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 14.870710135s ago: executing program 2 (id=5408): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180200008010000000000000040000008500000027000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 8.291245338s ago: executing program 2 (id=5408): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180200008010000000000000040000008500000027000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 4.925571065s ago: executing program 4 (id=5941): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0000000004000000080000000000000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r0, 0x400454d1, &(0x7f00000000c0)={0x0, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000ac0), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x588d, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000018000000080000004000000042000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000081000000000000000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r1}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 4.579281347s ago: executing program 4 (id=5946): r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f0, &(0x7f0000000080)) (fail_nth: 5) 4.512206987s ago: executing program 2 (id=5408): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180200008010000000000000040000008500000027000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) 2.241929079s ago: executing program 0 (id=5947): bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={0x1, &(0x7f0000000080)="91a71f2a17890a70e732d227bf6e6e6994b2656e6d1ca096c1c791fea6e4c70c0bb029a1230321bc9a8f4087b1be833ee70ecc56c02ccac307a6bceee48f3915ae435a45f76b5b23d5d4758a84823103d2f2bfa7934406b9aec39d82a1dea17277aff50ec95ff5f86b65cc8340fd749e663de9", &(0x7f0000000000)=""/43}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x101, 0x7fdf, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000ec0)={r0, &(0x7f0000000d00), 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x19, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.239986989s ago: executing program 4 (id=5951): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000e6ff3482213c01db34c4", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='cpu&0\x00\x00&usage_adl\x00') 2.078428339s ago: executing program 0 (id=5952): r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)) 2.078157829s ago: executing program 1 (id=5953): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3b}}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = syz_clone(0x20000, &(0x7f0000000200)="4f222772d1c6ac5432b7d33201", 0xd, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="1248e03e588895574888e64070d5c064a3c24030d3b857be2b70a5957ee9ad5e27c8cdcc88b4260f94fdb025eed96f6e767adb378b66f02a9f11a1bb9840a52bb27eb8c39ddd85cd57f2ba7343ec4306d8a52e6c6e31c4a118b31c86d1c44cfc5250616d1e6142e5fca472f0cdb3c63b0f1fbcd45bb8383cc09099dae9dc59a781eadbfba8655ea13226d49a2cdc9eb615d3fc1391190a7cf044666acece28dd7197c7bb091abdf1a4ed2695a1d6b575837a1f970bed678c84b0cdb0112162a1f281bbbe4085f9839d7a32f997f602f8a8fcbe0796853709e68546f6ca144a96ebef67909772059c993c84961d4ba052348bb9cf6218") syz_open_procfs$namespace(r2, &(0x7f00000003c0)='ns/mnt\x00') (async) unlink(&(0x7f00000001c0)='./file0\x00') r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) socketpair(0x8, 0x4, 0xfffffffa, &(0x7f0000000180)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000200000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r7, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r7, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) (async) close(r6) (async) socketpair(0x10, 0x2, 0x4, &(0x7f0000000480)) close(0xffffffffffffffff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='host1x_channel_submit_complete\x00', r3, 0x0, 0x4}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.076990489s ago: executing program 4 (id=5955): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='mm_page_alloc\x00', r2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000180)={0x2, &(0x7f0000000040)=[{0x87}, {0x6}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800083}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc53dff3528d05bd62c526e7320f603ff65ec5deb89"], 0xfdef) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x40047451, 0x2000000c) 1.98854131s ago: executing program 0 (id=5956): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x18) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r5, &(0x7f0000000440)=ANY=[], 0xfdef) syz_clone(0x40003180, 0x0, 0x0, 0x0, 0x0, 0x0) 1.98826216s ago: executing program 1 (id=5957): perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x4, 0xf1, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3, 0x101, 0xff, 0x74f44, 0xffffffffffffffff, 0x9, '\x00', 0x0, r4, 0x2, 0x5, 0x3, 0xa, @void, @value, @value=r4}, 0x50) sendmsg$unix(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x200408c0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r7, &(0x7f0000000180), 0x40010) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.738249911s ago: executing program 4 (id=5959): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x1b}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x60}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x0, 0x2000000}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x2000000}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.676508972s ago: executing program 4 (id=5960): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000380), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000380)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=r5, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYBLOB="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", @ANYRES64=r1], 0x0, 0x1, 0x0, 0x0, 0x0, 0x66, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0x0, &(0x7f0000001540)='ns/net\x00') write$cgroup_pid(r6, &(0x7f0000000340), 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) openat$tun(0xffffff9c, 0x0, 0x602400, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0xf, 0x0, 0x2, &(0x7f00000001c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) 1.551911002s ago: executing program 0 (id=5962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0xc2a42, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.502929972s ago: executing program 1 (id=5963): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=@framed={{}, [@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffe}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000001c0)={'macvlan1\x00'}) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2b210, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000}, 0x3108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000004004bd8bea97023632d9cf05700000058d9f4303b249fc19b568f5b3fba8904f56db25761d86f878cb8d7ddb994cc2cfdb687c62856", @ANYRES32, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.502453492s ago: executing program 3 (id=5964): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000000000000200000000100000", @ANYRES32, @ANYBLOB="eeff00000009000000000000000000000e000000", @ANYRES32=0x0, @ANYBLOB='\x00'/10], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001000), 0x200400, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000001080)={0x6, &(0x7f0000001040)=[{0x9, 0x8, 0x5, 0xea7e}, {0x9, 0x5, 0xde, 0xfff}, {0x3, 0x1, 0x4, 0x1000}, {0x80, 0x2f, 0x6}, {0x7, 0xe5, 0x4, 0x804c}, {0x7fff, 0xfe, 0x9, 0x9}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000010080)=ANY=[@ANYBLOB], 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300002311f335850000000400000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r3 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) 1.492642713s ago: executing program 3 (id=5965): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x1c1282, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) write$cgroup_pid(r2, &(0x7f0000000300), 0x20000312) 1.286758374s ago: executing program 3 (id=5966): r0 = openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)) 1.262419753s ago: executing program 0 (id=5967): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004400000ff0f00000502000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{r0}, &(0x7f0000000040), &(0x7f0000000080)='%-010d \x00'}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') (async) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x1c, &(0x7f0000000940)={0x3, 0x3, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, @void, @value}, 0x94) r5 = openat$cgroup_procs(r2, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) getpid() r6 = syz_open_procfs$namespace(0x0, 0x0) ioctl$TUNSETIFF(r6, 0xb701, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) write$cgroup_int(r3, &(0x7f0000000040), 0x1) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000000)={'geneve1\x00', 0x400}) close(r7) 1.104973874s ago: executing program 1 (id=5968): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00121700000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000004c0)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x2, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r1, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x47, &(0x7f0000000780)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x4e, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x2a, &(0x7f0000000100)=r7, 0x4) r8 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000100)='!=u&\t0|\t\t') r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xc, &(0x7f0000000d00)=ANY=[@ANYRESOCT=r2, @ANYRESOCT=r1, @ANYRES8=r1], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f00000007c0)=""/208, 0xee, 0xd0, 0x1, 0xc, 0x10000, @value=r10}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000900), 0x4c42, 0x0) write$cgroup_devices(r10, &(0x7f0000000100)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000000)="f4a14204be42c0ed39b1ad2375c90dd3bf7d9eac8fa7fa9abfff18", 0x1b}, {&(0x7f0000000280)="6fb5d201104776e6ec8da8d28fac287e2ce8059040879f51d36abf8bca4a5242ab1c05c5337c258e3111824393e2c624650176ff81df71ad7ea5600b29632b73a95b7ac68ea028263a09cbce8d78ef799d6caa968d7be796f6622916d87dcd9130c63e5ee80ca92b3d7e9e71221620359b6ab1f6c44cbad43b7fa0f830f7b6caa503e3ec99d0de4f946ebb7d68191f4bc6f6360fe127e41ecd873ec42db14494229af7083197d274aaae003a610cb53f1e25fab6d5f0e24245e911c24b6eb437e0ad4c7810cbb2241dff6191e9b6a6d9e87c4e7a5329259d15ef76fa6892", 0xde}, {&(0x7f0000000380)="a274c36b1096937f13eb259d83d3e06483a2f8a263b8381ee738c5d4c15877d943a6ac410df8b1ef6c7a7501b6a5aaf7e2a652a7fbdbccfd67d4182f851198a40488ced9f7805c7f8c09234cc9af9953ded6556b8b5560293549c52436dd3874823028fc98a53c5315277d784b0d0f8e315cfa7ad94fc742d606da5a843e3dd4ba006f0d981cfe1bd2ceefbb9a56aa85d921e762b46e5fe8a938ecbc231bdc36e6d0e10eb5f041ee5a3a15fd0ad178917c4bcaf3d0dc73287351b5d604aec1f24df1440a9e1a2d75bfc4fd24", 0xcc}, {&(0x7f0000000480)="1f5b595d1f8ed40ad3785ebdf049c1e32dffc035ac2e3cba23ef5ce1ef4e178a03e886cb38a967678e7416dea594f5b589abf9013762f3e3370b6db6e85e1ae3e25799eb8659f22d6af36bcf8dc0c7955560065602ef03fe5d862a8b952d8dffbf38654c7b301e022c95ab18bd534076b238b24d38be09e78993cf86514e393bc6d730fc1bf160a60ab392644c53b772b44780195929ce164e62e6f6e99900ea0c3400ced48b409fd7121540a043297dc461336c42f0c03c54eba9958682026a26da4b41f6ace9f069da5e98390ddc01c68a9e55638743a0716aedcbcf", 0xdd}, {&(0x7f0000000580)="deace652c07f626ee74f666479287e7bd40b42d96b1bf7167cf341de2dc57e4b2d9de47ec0f135118f9fd69c7af1467ca35eb94169c9b9128871e980d4117f5c4edff685816703773ac4e78dd9a519bd8de6d51f9b16f8fcd649f27ff8c5e0bbacc0badb291c80c06b76d09a672df23d7dd95fca8258ce9cdb6b2dcddc42ffe5", 0x80}, {&(0x7f0000000040)="db46e43149e86e4976f949646dac0bb075182d553b018e", 0x17}], 0x6, 0x0, 0x0, 0x44084}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0x6, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xd1, &(0x7f0000000180)=""/209, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 991.140015ms ago: executing program 3 (id=5969): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff83) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r2, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @func={0x2}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000005000000000000009cf7b6528756d7"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe73, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x1e, 0x5f, 0x0, 0x61]}}, &(0x7f00000004c0)=""/141, 0x1e, 0x8d, 0x1, 0xfffffff8, 0x0, @void, @value}, 0x28) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) 567.574847ms ago: executing program 0 (id=5970): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1e, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x4, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001bc0)={r3, 0x0, 0x138, 0x4c, &(0x7f0000001cc0)="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", &(0x7f0000001c40)=""/76, 0x4000, 0x0, 0x47, 0x50, &(0x7f0000001ac0)="9c01bd6f9a6028c80d7364240fd78867d9d62eca43c565f2c5ac65dd4a0fadceb6c65dcb07f2421e69087e0f17b4eb709e4805f2722709c46bef17c4cb9aed9fb1c342179ea349", &(0x7f0000001a40)="408fd0050dc7945b483103067eca9bd26ffbe35abf0f88a103f6893dc2b1d1cdc2195d4ae89abc04ff5fe5d2466892c81015df835a7d47be4f852161bc4015e7564b08584290fe1762f943a653008ac5", 0x1, 0x0, 0x13}, 0x22) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$inet(r6, &(0x7f00000001c0)={0x0, 0xfffffffffffffd61, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) 369.706158ms ago: executing program 1 (id=5971): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="180100001c0000000021000000000000850000006c00000095de90552146125e250837437793547f0ff861182b0c6d46e425ab8c8414c153ca34f87aed54512e17306c43f5a90d81d86dd70de37b19c00ca662481b52dbfcdef801b720467caef7a153f8074bc431e3b346afd37e3b6f1a90a542db5695d8ab5f9f34f738f0ef533c37cb917c4844103323469f69c1aba0498dbe152185b3a1f77fe71e32fe9d4ffea5b44f84c90dc46847fb7011afc061c6100bcc2f3833cee1e876a98f0766a6caaed7dc398f970650f1360972b57ee15801f43aafa0d02af898ceb6ecd50b2c71c56b5b68311532476e467f79afb39bc30d6ec6f39c325657915af82df767041da2bf5247fc11e77df2168f6e397e501df345d56760e83a7636718d9784ab41965a0a739377e289d21b3fb0fabe9779b5041f893ceb114f0700"/326], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000007c0)='page_pool_state_release\x00', r0}, 0x18) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000850000000f00000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='signal_generate\x00', r2}, 0x10) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x8000004, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000049ba567384ce70c79eacf2a742cbbfe462ab6d5ce82876de94326ba286a8c359b5dc7d64c7b111650a2efe8fd9022b74979272a746bf34385859f2ca17ec4568e41946e5e2957893f36c0f99f1f1d7e0bac6bdc1fabebd6d85eb8ea9f504a2b1f8db310968b6cf0e06b70f72b3cec183538fe0c1c3b353da91e3482f3dabdbac8b0eedcd4857b76c0441496dc0"], 0x48) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000071103f200000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 64) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/52}, 0x55) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000f316", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x7, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000001040000000000000a53e67544d9190239b40000000000c1eda39a000000009500ff7f000000000000000022"], &(0x7f00000003c0)='syzkaller\x00', 0x4000002, 0x92, &(0x7f0000000240)=""/146, 0x0, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 254.497839ms ago: executing program 1 (id=5972): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r4, 0x10, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x15, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000012c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 153.890439ms ago: executing program 3 (id=5973): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7030000070000008500000021000000b70000000000000095"], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="a6", 0x1}], 0x1}, 0x4040091) recvmsg$unix(r2, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002cc0)=""/244, 0xf4}], 0x1}, 0x7ca40fb877adf601) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 433.87µs ago: executing program 3 (id=5974): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r4) 0s ago: executing program 2 (id=5408): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x8a, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180200008010000000000000040000008500000027000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r4, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) kernel console output (not intermixed with test programs): ][T16255] name failslab, interval 1, probability 0, space 0, times 0 [ 572.366376][T16255] CPU: 1 PID: 16255 Comm: syz.2.4758 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 572.376183][T16255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 572.386077][T16255] Call Trace: [ 572.389207][T16255] [ 572.391982][T16255] dump_stack_lvl+0x151/0x1c0 [ 572.396490][T16255] ? io_uring_drop_tctx_refs+0x190/0x190 [ 572.401961][T16255] ? kmem_cache_free+0x116/0x2e0 [ 572.406736][T16255] ? ____kasan_slab_free+0x131/0x160 [ 572.411858][T16255] dump_stack+0x15/0x20 [ 572.415850][T16255] should_fail+0x3c6/0x510 [ 572.420099][T16255] __should_failslab+0xa4/0xe0 [ 572.424699][T16255] should_failslab+0x9/0x20 [ 572.429043][T16255] slab_pre_alloc_hook+0x37/0xd0 [ 572.433813][T16255] kmem_cache_alloc_trace+0x48/0x210 [ 572.438940][T16255] ? kobject_uevent_env+0x269/0x700 [ 572.443973][T16255] kobject_uevent_env+0x269/0x700 [ 572.448834][T16255] kobject_uevent+0x1f/0x30 [ 572.453167][T16255] __kobject_del+0xee/0x300 [ 572.457505][T16255] kobject_put+0x1cc/0x260 [ 572.461760][T16255] netdev_queue_update_kobjects+0x390/0x400 [ 572.467615][T16255] ? net_rx_queue_update_kobjects+0x46f/0x490 [ 572.473553][T16255] netdev_unregister_kobject+0x117/0x260 [ 572.479005][T16255] unregister_netdevice_many+0x1295/0x17c0 [ 572.484632][T16255] ? alloc_netdev_mqs+0xc90/0xc90 [ 572.489490][T16255] ? locks_remove_file+0x41a/0x1180 [ 572.494706][T16255] ? __kasan_check_read+0x11/0x20 [ 572.499554][T16255] unregister_netdevice_queue+0x2e6/0x350 [ 572.505165][T16255] ? linkwatch_urgent_event+0x335/0x4d0 [ 572.510489][T16255] ? list_netdevice+0x4c0/0x4c0 [ 572.515277][T16255] __tun_detach+0xd14/0x1510 [ 572.519696][T16255] ? wait_for_completion_killable_timeout+0x10/0x10 [ 572.526119][T16255] ? tun_chr_open+0x530/0x530 [ 572.530626][T16255] tun_chr_close+0x92/0x140 [ 572.534974][T16255] __fput+0x228/0x8c0 [ 572.538786][T16255] ____fput+0x15/0x20 [ 572.542603][T16255] task_work_run+0x129/0x190 [ 572.547030][T16255] exit_to_user_mode_loop+0xc4/0xe0 [ 572.552063][T16255] exit_to_user_mode_prepare+0x5a/0xa0 [ 572.557357][T16255] syscall_exit_to_user_mode+0x26/0x160 [ 572.562737][T16255] do_syscall_64+0x47/0xb0 [ 572.566991][T16255] ? clear_bhb_loop+0x35/0x90 [ 572.571505][T16255] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 572.577234][T16255] RIP: 0033:0x7f52bef93819 [ 572.581485][T16255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 572.600925][T16255] RSP: 002b:00007f52bd5eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 572.609174][T16255] RAX: 0000000000000000 RBX: 00007f52bf14b080 RCX: 00007f52bef93819 [ 572.616988][T16255] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 572.624881][T16255] RBP: 00007f52bd5eb090 R08: 0000000000000000 R09: 0000000000000000 [ 572.632692][T16255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 572.640500][T16255] R13: 0000000000000000 R14: 00007f52bf14b080 R15: 00007ffdf428d548 [ 572.648323][T16255] [ 572.886398][T16272] device syzkaller0 entered promiscuous mode [ 573.083392][T16297] device pim6reg1 entered promiscuous mode [ 573.108164][T16297] FAULT_INJECTION: forcing a failure. [ 573.108164][T16297] name failslab, interval 1, probability 0, space 0, times 0 [ 573.125333][T16297] CPU: 1 PID: 16297 Comm: syz.1.4773 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 573.135162][T16297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 573.145050][T16297] Call Trace: [ 573.148173][T16297] [ 573.150950][T16297] dump_stack_lvl+0x151/0x1c0 [ 573.155466][T16297] ? io_uring_drop_tctx_refs+0x190/0x190 [ 573.160940][T16297] dump_stack+0x15/0x20 [ 573.165012][T16297] should_fail+0x3c6/0x510 [ 573.169265][T16297] __should_failslab+0xa4/0xe0 [ 573.173958][T16297] ? __alloc_skb+0xbe/0x550 [ 573.178291][T16297] should_failslab+0x9/0x20 [ 573.182626][T16297] slab_pre_alloc_hook+0x37/0xd0 [ 573.187402][T16297] ? __alloc_skb+0xbe/0x550 [ 573.191739][T16297] kmem_cache_alloc+0x44/0x200 [ 573.196343][T16297] __alloc_skb+0xbe/0x550 [ 573.200507][T16297] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 573.205631][T16297] unregister_netdevice_many+0xea2/0x17c0 [ 573.211189][T16297] ? synchronize_rcu+0x120/0x120 [ 573.216042][T16297] ? alloc_netdev_mqs+0xc90/0xc90 [ 573.220903][T16297] ? locks_remove_file+0x41a/0x1180 [ 573.225942][T16297] ? __kasan_check_read+0x11/0x20 [ 573.230797][T16297] unregister_netdevice_queue+0x2e6/0x350 [ 573.236362][T16297] ? linkwatch_urgent_event+0x335/0x4d0 [ 573.241732][T16297] ? list_netdevice+0x4c0/0x4c0 [ 573.246426][T16297] __tun_detach+0xd14/0x1510 [ 573.250844][T16297] ? wait_for_completion_killable_timeout+0x10/0x10 [ 573.257269][T16297] ? tun_chr_open+0x530/0x530 [ 573.261792][T16297] tun_chr_close+0x92/0x140 [ 573.266133][T16297] __fput+0x228/0x8c0 [ 573.270119][T16297] ____fput+0x15/0x20 [ 573.273934][T16297] task_work_run+0x129/0x190 [ 573.278367][T16297] exit_to_user_mode_loop+0xc4/0xe0 [ 573.283393][T16297] exit_to_user_mode_prepare+0x5a/0xa0 [ 573.288687][T16297] syscall_exit_to_user_mode+0x26/0x160 [ 573.294068][T16297] do_syscall_64+0x47/0xb0 [ 573.298318][T16297] ? clear_bhb_loop+0x35/0x90 [ 573.302850][T16297] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 573.308568][T16297] RIP: 0033:0x7f31f497c819 [ 573.312817][T16297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.332258][T16297] RSP: 002b:00007f31f2ff5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 573.340500][T16297] RAX: 0000000000000000 RBX: 00007f31f4b33fa0 RCX: 00007f31f497c819 [ 573.348312][T16297] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 573.356127][T16297] RBP: 00007f31f2ff5090 R08: 0000000000000000 R09: 0000000000000000 [ 573.363938][T16297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 573.371867][T16297] R13: 0000000000000000 R14: 00007f31f4b33fa0 R15: 00007fff4b2c7b28 [ 573.379696][T16297] [ 573.495331][T16299] device pim6reg1 entered promiscuous mode [ 573.977147][T16339] device syzkaller0 entered promiscuous mode [ 574.172972][T16345] device veth0_vlan left promiscuous mode [ 574.208572][T16345] device veth0_vlan entered promiscuous mode [ 574.341171][T16349] device pim6reg1 entered promiscuous mode [ 574.439661][T16347] FAULT_INJECTION: forcing a failure. [ 574.439661][T16347] name failslab, interval 1, probability 0, space 0, times 0 [ 574.501157][T16347] CPU: 1 PID: 16347 Comm: syz.0.4789 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 574.511285][T16347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 574.521307][T16347] Call Trace: [ 574.524428][T16347] [ 574.527207][T16347] dump_stack_lvl+0x151/0x1c0 [ 574.531721][T16347] ? io_uring_drop_tctx_refs+0x190/0x190 [ 574.537189][T16347] dump_stack+0x15/0x20 [ 574.541181][T16347] should_fail+0x3c6/0x510 [ 574.545433][T16347] __should_failslab+0xa4/0xe0 [ 574.550032][T16347] ? __alloc_skb+0xbe/0x550 [ 574.554378][T16347] should_failslab+0x9/0x20 [ 574.558708][T16347] slab_pre_alloc_hook+0x37/0xd0 [ 574.563490][T16347] ? __alloc_skb+0xbe/0x550 [ 574.567828][T16347] kmem_cache_alloc+0x44/0x200 [ 574.572426][T16347] __alloc_skb+0xbe/0x550 [ 574.576591][T16347] alloc_uevent_skb+0x80/0x230 [ 574.581194][T16347] kobject_uevent_net_broadcast+0x188/0x590 [ 574.586940][T16347] kobject_uevent_env+0x525/0x700 [ 574.591778][T16347] kobject_uevent+0x1f/0x30 [ 574.596117][T16347] __kobject_del+0xee/0x300 [ 574.600457][T16347] kobject_put+0x1cc/0x260 [ 574.604710][T16347] netdev_queue_update_kobjects+0x390/0x400 [ 574.610440][T16347] ? net_rx_queue_update_kobjects+0x46f/0x490 [ 574.616344][T16347] netdev_unregister_kobject+0x117/0x260 [ 574.621807][T16347] unregister_netdevice_many+0x1295/0x17c0 [ 574.627456][T16347] ? alloc_netdev_mqs+0xc90/0xc90 [ 574.632307][T16347] ? add_timer+0x68/0x80 [ 574.636396][T16347] ? __queue_delayed_work+0x16d/0x1f0 [ 574.641596][T16347] ? __kasan_check_read+0x11/0x20 [ 574.646457][T16347] unregister_netdevice_queue+0x2e6/0x350 [ 574.652011][T16347] ? linkwatch_urgent_event+0x335/0x4d0 [ 574.657392][T16347] ? list_netdevice+0x4c0/0x4c0 [ 574.662086][T16347] __tun_detach+0xd14/0x1510 [ 574.666502][T16347] ? wait_for_completion_killable_timeout+0x10/0x10 [ 574.672928][T16347] ? tun_chr_open+0x530/0x530 [ 574.677443][T16347] tun_chr_close+0x92/0x140 [ 574.681781][T16347] __fput+0x228/0x8c0 [ 574.685602][T16347] ____fput+0x15/0x20 [ 574.689419][T16347] task_work_run+0x129/0x190 [ 574.693847][T16347] exit_to_user_mode_loop+0xc4/0xe0 [ 574.698885][T16347] exit_to_user_mode_prepare+0x5a/0xa0 [ 574.704260][T16347] syscall_exit_to_user_mode+0x26/0x160 [ 574.709641][T16347] do_syscall_64+0x47/0xb0 [ 574.713896][T16347] ? clear_bhb_loop+0x35/0x90 [ 574.718403][T16347] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 574.724138][T16347] RIP: 0033:0x7f67da50a819 [ 574.728388][T16347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 574.747836][T16347] RSP: 002b:00007f67d8b83038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 574.756073][T16347] RAX: 0000000000000000 RBX: 00007f67da6c1fa0 RCX: 00007f67da50a819 [ 574.763886][T16347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 574.771694][T16347] RBP: 00007f67d8b83090 R08: 0000000000000000 R09: 0000000000000000 [ 574.779505][T16347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 574.787313][T16347] R13: 0000000000000000 R14: 00007f67da6c1fa0 R15: 00007fff234f7d78 [ 574.795147][T16347] [ 574.904209][T16351] device pim6reg1 entered promiscuous mode [ 575.117509][T16363] device veth0_vlan left promiscuous mode [ 575.164649][T16363] device veth0_vlan entered promiscuous mode [ 575.232392][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 575.241513][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 575.265866][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 575.464419][T16380] device syzkaller0 entered promiscuous mode [ 576.020344][T16406] device pim6reg1 entered promiscuous mode [ 576.186663][T16407] FAULT_INJECTION: forcing a failure. [ 576.186663][T16407] name failslab, interval 1, probability 0, space 0, times 0 [ 576.212939][T16407] CPU: 1 PID: 16407 Comm: syz.3.4805 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 576.222851][T16407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 576.232762][T16407] Call Trace: [ 576.235864][T16407] [ 576.238643][T16407] dump_stack_lvl+0x151/0x1c0 [ 576.243156][T16407] ? io_uring_drop_tctx_refs+0x190/0x190 [ 576.248623][T16407] ? ____kasan_slab_free+0x131/0x160 [ 576.253745][T16407] dump_stack+0x15/0x20 [ 576.257747][T16407] should_fail+0x3c6/0x510 [ 576.261998][T16407] __should_failslab+0xa4/0xe0 [ 576.266600][T16407] should_failslab+0x9/0x20 [ 576.270927][T16407] slab_pre_alloc_hook+0x37/0xd0 [ 576.275705][T16407] kmem_cache_alloc_trace+0x48/0x210 [ 576.280819][T16407] ? kobject_uevent_env+0x269/0x700 [ 576.285854][T16407] kobject_uevent_env+0x269/0x700 [ 576.290715][T16407] kobject_uevent+0x1f/0x30 [ 576.295053][T16407] __kobject_del+0xee/0x300 [ 576.299392][T16407] kobject_put+0x1cc/0x260 [ 576.303646][T16407] net_rx_queue_update_kobjects+0x418/0x490 [ 576.309378][T16407] netdev_unregister_kobject+0x10a/0x260 [ 576.314846][T16407] unregister_netdevice_many+0x1295/0x17c0 [ 576.320486][T16407] ? alloc_netdev_mqs+0xc90/0xc90 [ 576.325350][T16407] ? locks_remove_file+0x41a/0x1180 [ 576.330384][T16407] ? __kasan_check_read+0x11/0x20 [ 576.335242][T16407] unregister_netdevice_queue+0x2e6/0x350 [ 576.340794][T16407] ? linkwatch_urgent_event+0x335/0x4d0 [ 576.346177][T16407] ? list_netdevice+0x4c0/0x4c0 [ 576.350862][T16407] __tun_detach+0xd14/0x1510 [ 576.355285][T16407] ? wait_for_completion_killable_timeout+0x10/0x10 [ 576.361709][T16407] ? tun_chr_open+0x530/0x530 [ 576.366221][T16407] tun_chr_close+0x92/0x140 [ 576.370561][T16407] __fput+0x228/0x8c0 [ 576.374398][T16407] ____fput+0x15/0x20 [ 576.378203][T16407] task_work_run+0x129/0x190 [ 576.382628][T16407] exit_to_user_mode_loop+0xc4/0xe0 [ 576.387660][T16407] exit_to_user_mode_prepare+0x5a/0xa0 [ 576.392956][T16407] syscall_exit_to_user_mode+0x26/0x160 [ 576.398334][T16407] do_syscall_64+0x47/0xb0 [ 576.402586][T16407] ? clear_bhb_loop+0x35/0x90 [ 576.407100][T16407] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 576.412828][T16407] RIP: 0033:0x7f37d53dc819 [ 576.417084][T16407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.436523][T16407] RSP: 002b:00007f37d3a34038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 576.444770][T16407] RAX: 0000000000000000 RBX: 00007f37d5594080 RCX: 00007f37d53dc819 [ 576.452579][T16407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 576.460396][T16407] RBP: 00007f37d3a34090 R08: 0000000000000000 R09: 0000000000000000 [ 576.468205][T16407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 576.476012][T16407] R13: 0000000000000001 R14: 00007f37d5594080 R15: 00007fff048132a8 [ 576.483832][T16407] [ 576.532394][T16424] device syzkaller0 entered promiscuous mode [ 576.682768][T16441] syz.4.4817[16441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 576.682852][T16441] syz.4.4817[16441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.289982][ T30] audit: type=1400 audit(1732348895.628:183): avc: denied { create } for pid=16456 comm="syz.2.4822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 577.497626][ T30] audit: type=1400 audit(1732348895.728:184): avc: denied { create } for pid=16456 comm="syz.2.4822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 577.751638][T16458] device syzkaller0 entered promiscuous mode [ 577.853321][T16475] device syzkaller0 entered promiscuous mode [ 577.935239][T16481] device pim6reg1 entered promiscuous mode [ 578.017096][T16477] FAULT_INJECTION: forcing a failure. [ 578.017096][T16477] name failslab, interval 1, probability 0, space 0, times 0 [ 578.141007][T16477] CPU: 1 PID: 16477 Comm: syz.0.4828 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 578.150829][T16477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 578.160729][T16477] Call Trace: [ 578.163847][T16477] [ 578.166619][T16477] dump_stack_lvl+0x151/0x1c0 [ 578.171135][T16477] ? io_uring_drop_tctx_refs+0x190/0x190 [ 578.176605][T16477] ? __kasan_slab_free+0x11/0x20 [ 578.181379][T16477] dump_stack+0x15/0x20 [ 578.185368][T16477] should_fail+0x3c6/0x510 [ 578.189623][T16477] __should_failslab+0xa4/0xe0 [ 578.194223][T16477] should_failslab+0x9/0x20 [ 578.198559][T16477] slab_pre_alloc_hook+0x37/0xd0 [ 578.203330][T16477] ? dev_uevent_filter+0xb0/0xb0 [ 578.208110][T16477] kmem_cache_alloc_trace+0x48/0x210 [ 578.213229][T16477] ? kobject_uevent_env+0x269/0x700 [ 578.218262][T16477] ? dev_uevent_filter+0xb0/0xb0 [ 578.223036][T16477] kobject_uevent_env+0x269/0x700 [ 578.227897][T16477] ? dev_fwnode+0x50/0x80 [ 578.232063][T16477] kobject_uevent+0x1f/0x30 [ 578.236490][T16477] device_del+0xcbd/0xe90 [ 578.240656][T16477] ? kill_device+0xd0/0xd0 [ 578.244918][T16477] ? dynamic_kobj_release+0x20/0x20 [ 578.249946][T16477] ? pm_runtime_set_memalloc_noio+0x21f/0x270 [ 578.255841][T16477] netdev_unregister_kobject+0x18b/0x260 [ 578.261311][T16477] unregister_netdevice_many+0x1295/0x17c0 [ 578.266957][T16477] ? alloc_netdev_mqs+0xc90/0xc90 [ 578.271812][T16477] ? add_timer+0x68/0x80 [ 578.275890][T16477] ? __queue_delayed_work+0x16d/0x1f0 [ 578.281101][T16477] ? __kasan_check_read+0x11/0x20 [ 578.285958][T16477] unregister_netdevice_queue+0x2e6/0x350 [ 578.291519][T16477] ? linkwatch_urgent_event+0x335/0x4d0 [ 578.296895][T16477] ? list_netdevice+0x4c0/0x4c0 [ 578.301584][T16477] __tun_detach+0xd14/0x1510 [ 578.306018][T16477] ? wait_for_completion_killable_timeout+0x10/0x10 [ 578.312433][T16477] ? tun_chr_open+0x530/0x530 [ 578.316943][T16477] tun_chr_close+0x92/0x140 [ 578.321283][T16477] __fput+0x228/0x8c0 [ 578.325103][T16477] ____fput+0x15/0x20 [ 578.328918][T16477] task_work_run+0x129/0x190 [ 578.333349][T16477] exit_to_user_mode_loop+0xc4/0xe0 [ 578.338388][T16477] exit_to_user_mode_prepare+0x5a/0xa0 [ 578.343678][T16477] syscall_exit_to_user_mode+0x26/0x160 [ 578.349057][T16477] do_syscall_64+0x47/0xb0 [ 578.353308][T16477] ? clear_bhb_loop+0x35/0x90 [ 578.357834][T16477] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 578.363551][T16477] RIP: 0033:0x7f67da50a819 [ 578.367805][T16477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.387247][T16477] RSP: 002b:00007f67d8b83038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 578.395492][T16477] RAX: 0000000000000000 RBX: 00007f67da6c1fa0 RCX: 00007f67da50a819 [ 578.403300][T16477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 578.411113][T16477] RBP: 00007f67d8b83090 R08: 0000000000000000 R09: 0000000000000000 [ 578.418922][T16477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 578.426849][T16477] R13: 0000000000000000 R14: 00007f67da6c1fa0 R15: 00007fff234f7d78 [ 578.434642][T16477] [ 579.385061][T16531] device pim6reg1 entered promiscuous mode [ 579.497974][T16535] device syzkaller0 entered promiscuous mode [ 579.639341][T16523] device pim6reg1 entered promiscuous mode [ 580.820483][T16585] device syzkaller0 entered promiscuous mode [ 580.937471][T16587] device pim6reg1 entered promiscuous mode [ 581.296625][T16640] device syzkaller0 entered promiscuous mode [ 582.035829][T16660] device syzkaller0 entered promiscuous mode [ 582.505966][T16669] : renamed from ipvlan1 [ 583.688185][T16688] device syzkaller0 entered promiscuous mode [ 585.630831][T16748] device syzkaller0 entered promiscuous mode [ 586.041851][T16770] device syzkaller0 entered promiscuous mode [ 586.193488][T16786] device syzkaller0 entered promiscuous mode [ 586.301150][T16801] device syzkaller0 entered promiscuous mode [ 586.902910][T16821] device pim6reg1 entered promiscuous mode [ 587.340776][T16828] device syzkaller0 entered promiscuous mode [ 587.681481][T16848] device syzkaller0 entered promiscuous mode [ 588.894778][T16899] device syzkaller0 entered promiscuous mode [ 589.234820][T16922] device veth0_vlan left promiscuous mode [ 589.318873][T16922] device veth0_vlan entered promiscuous mode [ 589.443684][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.470111][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.552014][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 590.445931][T16949] device syzkaller0 entered promiscuous mode [ 590.955426][T16960] device syzkaller0 entered promiscuous mode [ 591.218351][T16974] device syzkaller0 entered promiscuous mode [ 592.098280][T17005] device pim6reg1 entered promiscuous mode [ 592.233811][T17012] device syzkaller0 entered promiscuous mode [ 593.210244][T17032] device veth0_vlan left promiscuous mode [ 593.224465][T17032] device veth0_vlan entered promiscuous mode [ 594.013658][T17052] device syzkaller0 entered promiscuous mode [ 596.470263][T17100] device syzkaller0 entered promiscuous mode [ 596.879845][T17126] syz.0.5029[17126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.879924][T17126] syz.0.5029[17126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 597.220853][T17131] device pim6reg1 entered promiscuous mode [ 597.502210][T17147] device syzkaller0 entered promiscuous mode [ 597.694592][T17161] device syzkaller0 entered promiscuous mode [ 597.788574][T17166] syz.4.5044[17166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 597.788646][T17166] syz.4.5044[17166] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 599.145691][T17185] device pim6reg1 entered promiscuous mode [ 599.834302][T17210] device syzkaller0 entered promiscuous mode [ 600.334668][T17227] device syzkaller0 entered promiscuous mode [ 600.916419][T17247] device pim6reg1 entered promiscuous mode [ 601.286648][T17260] device pim6reg1 entered promiscuous mode [ 602.166430][T17280] device syzkaller0 entered promiscuous mode [ 602.534932][T17288] device veth0_vlan left promiscuous mode [ 602.545327][T17288] device veth0_vlan entered promiscuous mode [ 602.565268][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 602.579140][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 602.598917][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 602.843129][T17298] device pim6reg1 entered promiscuous mode [ 603.772809][T17318] device syzkaller0 entered promiscuous mode [ 604.909662][T17343] device veth0_vlan left promiscuous mode [ 604.924920][T17343] device veth0_vlan entered promiscuous mode [ 605.597575][T17363] device syzkaller0 entered promiscuous mode [ 605.776988][T17367] device pim6reg1 entered promiscuous mode [ 606.065114][T17372] device syzkaller0 entered promiscuous mode [ 607.207843][T17391] device pim6reg1 entered promiscuous mode [ 610.215170][T17417] device syzkaller0 entered promiscuous mode [ 610.447848][T17425] FAULT_INJECTION: forcing a failure. [ 610.447848][T17425] name failslab, interval 1, probability 0, space 0, times 0 [ 610.460381][T17425] CPU: 1 PID: 17425 Comm: syz.1.5128 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 610.470184][T17425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 610.480078][T17425] Call Trace: [ 610.483200][T17425] [ 610.485977][T17425] dump_stack_lvl+0x151/0x1c0 [ 610.490499][T17425] ? io_uring_drop_tctx_refs+0x190/0x190 [ 610.495963][T17425] dump_stack+0x15/0x20 [ 610.499947][T17425] should_fail+0x3c6/0x510 [ 610.504204][T17425] __should_failslab+0xa4/0xe0 [ 610.508798][T17425] ? __alloc_skb+0xbe/0x550 [ 610.513136][T17425] should_failslab+0x9/0x20 [ 610.517479][T17425] slab_pre_alloc_hook+0x37/0xd0 [ 610.522253][T17425] ? __alloc_skb+0xbe/0x550 [ 610.526591][T17425] kmem_cache_alloc+0x44/0x200 [ 610.531191][T17425] ? avc_policy_seqno+0x1b/0x70 [ 610.535887][T17425] __alloc_skb+0xbe/0x550 [ 610.540048][T17425] ppp_write+0xb7/0x3a0 [ 610.544045][T17425] ? security_file_permission+0x86/0xb0 [ 610.549416][T17425] ? ppp_read+0x740/0x740 [ 610.553585][T17425] vfs_write+0x406/0x1110 [ 610.557752][T17425] ? file_end_write+0x1c0/0x1c0 [ 610.562437][T17425] ? __fget_files+0x31e/0x380 [ 610.566973][T17425] ? __fdget_pos+0x209/0x3a0 [ 610.571374][T17425] ? ksys_write+0x77/0x2c0 [ 610.575628][T17425] ksys_write+0x199/0x2c0 [ 610.579794][T17425] ? __ia32_sys_read+0x90/0x90 [ 610.584395][T17425] ? debug_smp_processor_id+0x17/0x20 [ 610.589603][T17425] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 610.595503][T17425] __x64_sys_write+0x7b/0x90 [ 610.599930][T17425] x64_sys_call+0x2f/0x9a0 [ 610.604182][T17425] do_syscall_64+0x3b/0xb0 [ 610.608446][T17425] ? clear_bhb_loop+0x35/0x90 [ 610.612954][T17425] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 610.618763][T17425] RIP: 0033:0x7f31f497c819 [ 610.623015][T17425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 610.642458][T17425] RSP: 002b:00007f31f2ff5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 610.650699][T17425] RAX: ffffffffffffffda RBX: 00007f31f4b33fa0 RCX: 00007f31f497c819 [ 610.658510][T17425] RDX: 0000000020000312 RSI: 0000000020000300 RDI: 0000000000000003 [ 610.666321][T17425] RBP: 00007f31f2ff5090 R08: 0000000000000000 R09: 0000000000000000 [ 610.674133][T17425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 610.681947][T17425] R13: 0000000000000000 R14: 00007f31f4b33fa0 R15: 00007fff4b2c7b28 [ 610.689765][T17425] [ 611.384278][T17463] device syzkaller0 entered promiscuous mode [ 611.584513][T17469] FAULT_INJECTION: forcing a failure. [ 611.584513][T17469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 611.643967][T17469] CPU: 1 PID: 17469 Comm: syz.4.5143 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 611.653792][T17469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 611.663690][T17469] Call Trace: [ 611.666806][T17469] [ 611.669689][T17469] dump_stack_lvl+0x151/0x1c0 [ 611.674184][T17469] ? io_uring_drop_tctx_refs+0x190/0x190 [ 611.679652][T17469] ? debug_smp_processor_id+0x17/0x20 [ 611.684865][T17469] dump_stack+0x15/0x20 [ 611.688852][T17469] should_fail+0x3c6/0x510 [ 611.693108][T17469] should_fail_usercopy+0x1a/0x20 [ 611.697965][T17469] _copy_to_user+0x20/0x90 [ 611.702221][T17469] simple_read_from_buffer+0xc7/0x150 [ 611.707433][T17469] proc_fail_nth_read+0x1a3/0x210 [ 611.712286][T17469] ? proc_fault_inject_write+0x390/0x390 [ 611.717754][T17469] ? fsnotify_perm+0x269/0x5b0 [ 611.722358][T17469] ? security_file_permission+0x86/0xb0 [ 611.727736][T17469] ? proc_fault_inject_write+0x390/0x390 [ 611.733205][T17469] vfs_read+0x27d/0xd40 [ 611.737200][T17469] ? kernel_read+0x1f0/0x1f0 [ 611.741620][T17469] ? __kasan_check_write+0x14/0x20 [ 611.746567][T17469] ? mutex_lock+0xb6/0x1e0 [ 611.750821][T17469] ? wait_for_completion_killable_timeout+0x10/0x10 [ 611.757252][T17469] ? __fdget_pos+0x2e7/0x3a0 [ 611.761668][T17469] ? ksys_read+0x77/0x2c0 [ 611.765833][T17469] ksys_read+0x199/0x2c0 [ 611.769915][T17469] ? vfs_write+0x1110/0x1110 [ 611.774342][T17469] ? debug_smp_processor_id+0x17/0x20 [ 611.779547][T17469] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 611.785447][T17469] __x64_sys_read+0x7b/0x90 [ 611.789791][T17469] x64_sys_call+0x28/0x9a0 [ 611.794039][T17469] do_syscall_64+0x3b/0xb0 [ 611.798294][T17469] ? clear_bhb_loop+0x35/0x90 [ 611.802807][T17469] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 611.808533][T17469] RIP: 0033:0x7f32fc0b625c [ 611.812798][T17469] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 611.832315][T17469] RSP: 002b:00007f32fa730030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 611.840558][T17469] RAX: ffffffffffffffda RBX: 00007f32fc26efa0 RCX: 00007f32fc0b625c [ 611.848371][T17469] RDX: 000000000000000f RSI: 00007f32fa7300a0 RDI: 0000000000000006 [ 611.856181][T17469] RBP: 00007f32fa730090 R08: 0000000000000000 R09: 0000000000000000 [ 611.863993][T17469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 611.871802][T17469] R13: 0000000000000000 R14: 00007f32fc26efa0 R15: 00007ffd5b8a4558 [ 611.879623][T17469] [ 612.260726][T17486] device syzkaller0 entered promiscuous mode [ 612.947557][T17499] device syzkaller0 entered promiscuous mode [ 613.646478][T17538] device syzkaller0 entered promiscuous mode [ 613.697643][T17549] device sit0 left promiscuous mode [ 613.768756][T17550] device sit0 entered promiscuous mode [ 614.069147][T17555] device syzkaller0 entered promiscuous mode [ 614.181147][T17559] device pim6reg1 entered promiscuous mode [ 614.967483][T17580] device pim6reg1 entered promiscuous mode [ 615.119762][T17598] device syzkaller0 entered promiscuous mode [ 615.182931][T17606] device pim6reg1 entered promiscuous mode [ 616.255013][T17638] device sit0 left promiscuous mode [ 616.269686][T17636] device pim6reg1 entered promiscuous mode [ 616.293898][T17638] device sit0 entered promiscuous mode [ 616.510273][T17646] device syzkaller0 entered promiscuous mode [ 619.080748][T17682] device pim6reg1 entered promiscuous mode [ 619.599790][T17690] device syzkaller0 entered promiscuous mode [ 621.084140][T17718] device pim6reg1 entered promiscuous mode [ 621.159971][T17722] device syzkaller0 entered promiscuous mode [ 623.881252][T17767] device pim6reg1 entered promiscuous mode [ 624.098165][T17771] device sit0 left promiscuous mode [ 624.482130][T17789] syz.1.5237[17789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 624.482207][T17789] syz.1.5237[17789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.164552][T17822] device pim6reg1 entered promiscuous mode [ 625.501492][T17828] device sit0 left promiscuous mode [ 625.715573][T17825] device pim6reg1 entered promiscuous mode [ 625.934410][T17838] syz.3.5251[17838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 625.934491][T17838] syz.3.5251[17838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 627.267520][T17854] device syzkaller0 entered promiscuous mode [ 628.075329][T17869] device pim6reg1 entered promiscuous mode [ 628.338842][T17873] syz.4.5263[17873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.338919][T17873] syz.4.5263[17873] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.068327][T17893] device syzkaller0 entered promiscuous mode [ 629.444192][T17907] device pim6reg1 entered promiscuous mode [ 629.472604][T17918] syz.2.5276[17918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.472683][T17918] syz.2.5276[17918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.501880][T17920] device pim6reg1 entered promiscuous mode [ 629.799210][T17936] device syzkaller0 entered promiscuous mode [ 629.954283][T17942] device veth0_vlan left promiscuous mode [ 631.100282][T17942] device veth0_vlan entered promiscuous mode [ 632.182792][T17956] syz.3.5289[17956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 632.182868][T17956] syz.3.5289[17956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 632.216107][T17951] device syzkaller0 entered promiscuous mode [ 632.429769][T17968] device pim6reg1 entered promiscuous mode [ 632.533595][T17987] device syzkaller0 entered promiscuous mode [ 632.756089][T17997] device syzkaller0 entered promiscuous mode [ 634.514403][T18009] syz.1.5302[18009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.514532][T18009] syz.1.5302[18009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.743061][T18028] GPL: port 1(erspan0) entered blocking state [ 634.819949][T18028] GPL: port 1(erspan0) entered disabled state [ 634.826826][T18028] device erspan0 entered promiscuous mode [ 635.011974][T18021] GPL: port 1(erspan0) entered blocking state [ 635.018284][T18021] GPL: port 1(erspan0) entered forwarding state [ 635.118206][T18037] device pim6reg1 entered promiscuous mode [ 635.196794][T18039] device pim6reg1 entered promiscuous mode [ 635.484958][T18050] syz.2.5316[18050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.485045][T18050] syz.2.5316[18050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.693410][T18058] device syzkaller0 entered promiscuous mode [ 636.308357][T18067] device syzkaller0 entered promiscuous mode [ 636.669450][T18079] device syzkaller0 entered promiscuous mode [ 636.821070][T18089] device pim6reg1 entered promiscuous mode [ 636.939966][T18092] device pim6reg1 entered promiscuous mode [ 637.025972][T18095] syz.1.5329[18095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.026056][T18095] syz.1.5329[18095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.142194][T18103] syz.1.5332[18103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.164266][T18099] device syzkaller0 entered promiscuous mode [ 637.190545][T18103] syz.1.5332[18103] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.266381][T18107] device syzkaller0 entered promiscuous mode [ 638.207406][T18118] device syzkaller0 entered promiscuous mode [ 638.717641][T18126] device pim6reg1 entered promiscuous mode [ 638.869232][T18129] device pim6reg1 entered promiscuous mode [ 638.974453][T18142] syz.4.5343[18142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.974535][T18142] syz.4.5343[18142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.120844][T18144] device syzkaller0 entered promiscuous mode [ 639.271602][T18148] device pim6reg1 entered promiscuous mode [ 639.577028][T18166] device syzkaller0 entered promiscuous mode [ 639.943834][T18187] device pim6reg1 entered promiscuous mode [ 640.066308][T18191] device syzkaller0 entered promiscuous mode [ 641.211820][T18208] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.218771][T18208] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.232008][T18208] device bridge_slave_0 entered promiscuous mode [ 641.308198][T18208] bridge0: port 2(bridge_slave_1) entered blocking state [ 641.320173][T18208] bridge0: port 2(bridge_slave_1) entered disabled state [ 641.337855][T18208] device bridge_slave_1 entered promiscuous mode [ 641.360622][T18228] device pim6reg1 entered promiscuous mode [ 641.605343][T18230] device syzkaller0 entered promiscuous mode [ 641.816621][T18208] bridge0: port 2(bridge_slave_1) entered blocking state [ 641.823937][T18208] bridge0: port 2(bridge_slave_1) entered forwarding state [ 641.831045][T18208] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.837882][T18208] bridge0: port 1(bridge_slave_0) entered forwarding state [ 641.896804][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 641.904757][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 641.912496][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 641.920388][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 641.956935][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 641.973462][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 641.980703][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 642.062732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 642.070981][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 642.078063][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 642.091692][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 642.099619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 642.162856][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 642.171662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 642.197787][T18208] device veth0_vlan entered promiscuous mode [ 642.204714][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 642.234658][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 642.293902][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 642.330481][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 642.349752][T18208] device veth1_macvtap entered promiscuous mode [ 642.389847][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 642.406639][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 642.448053][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 642.489959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 642.501689][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 642.540443][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 642.560547][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 642.580353][T18257] syz.4.5381[18257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.580496][T18257] syz.4.5381[18257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 642.602441][ T312] device veth1_macvtap left promiscuous mode [ 642.659292][ T312] device veth0_vlan left promiscuous mode [ 642.768938][T18262] device pim6reg1 entered promiscuous mode [ 642.870741][T18269] device syzkaller0 entered promiscuous mode [ 643.736686][T18312] device sit0 entered promiscuous mode [ 643.996526][T18321] device syzkaller0 entered promiscuous mode [ 644.893111][T18350] device pim6reg1 entered promiscuous mode [ 645.495503][T18369] device syzkaller0 entered promiscuous mode [ 645.586510][ T8] device veth1_macvtap left promiscuous mode [ 645.737969][T18355] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.744943][T18355] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.759165][T18355] device bridge_slave_0 entered promiscuous mode [ 645.766283][T18355] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.773921][T18355] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.782091][T18355] device bridge_slave_1 entered promiscuous mode [ 645.942102][T18388] device pim6reg1 entered promiscuous mode [ 646.018611][T18355] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.025675][T18355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.032873][T18355] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.039958][T18355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.113233][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.122604][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.130548][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 646.140402][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 646.164120][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 646.173451][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.180310][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.189544][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 646.199610][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.207047][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.247527][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 646.256888][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 646.265994][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 646.406640][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 646.435837][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 646.625307][T18406] device syzkaller0 entered promiscuous mode [ 646.745375][T18355] device veth0_vlan entered promiscuous mode [ 646.771483][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 646.782556][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 646.824383][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 646.841456][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 647.073009][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 647.081566][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 647.107962][T18355] device veth1_macvtap entered promiscuous mode [ 647.120887][T18428] FAULT_INJECTION: forcing a failure. [ 647.120887][T18428] name failslab, interval 1, probability 0, space 0, times 0 [ 647.134551][T18428] CPU: 0 PID: 18428 Comm: syz.1.5434 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 647.144566][T18428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 647.154426][T18428] Call Trace: [ 647.157560][T18428] [ 647.160356][T18428] dump_stack_lvl+0x151/0x1c0 [ 647.164850][T18428] ? io_uring_drop_tctx_refs+0x190/0x190 [ 647.170498][T18428] dump_stack+0x15/0x20 [ 647.174551][T18428] should_fail+0x3c6/0x510 [ 647.178748][T18428] __should_failslab+0xa4/0xe0 [ 647.183439][T18428] ? __alloc_skb+0xbe/0x550 [ 647.187942][T18428] should_failslab+0x9/0x20 [ 647.192407][T18428] slab_pre_alloc_hook+0x37/0xd0 [ 647.197177][T18428] ? __alloc_skb+0xbe/0x550 [ 647.201520][T18428] kmem_cache_alloc+0x44/0x200 [ 647.206129][T18428] ? __kasan_slab_free+0x11/0x20 [ 647.210894][T18428] __alloc_skb+0xbe/0x550 [ 647.215067][T18428] inet_netconf_notify_devconf+0x173/0x220 [ 647.220712][T18428] inetdev_event+0x79d/0x10a0 [ 647.225737][T18428] ? ipv4_doint_and_flush+0x150/0x150 [ 647.230936][T18428] ? up_read+0x5d/0x220 [ 647.234935][T18428] raw_notifier_call_chain+0x8c/0xf0 [ 647.240052][T18428] unregister_netdevice_many+0xe0a/0x17c0 [ 647.245610][T18428] ? synchronize_rcu+0x120/0x120 [ 647.250382][T18428] ? alloc_netdev_mqs+0xc90/0xc90 [ 647.255241][T18428] ? locks_remove_file+0x41a/0x1180 [ 647.260287][T18428] ? __kasan_check_read+0x11/0x20 [ 647.265140][T18428] unregister_netdevice_queue+0x2e6/0x350 [ 647.270686][T18428] ? linkwatch_urgent_event+0x65/0x4d0 [ 647.275981][T18428] ? list_netdevice+0x4c0/0x4c0 [ 647.280672][T18428] __tun_detach+0xd14/0x1510 [ 647.285093][T18428] ? wait_for_completion_killable_timeout+0x10/0x10 [ 647.291529][T18428] ? tun_chr_open+0x530/0x530 [ 647.296027][T18428] tun_chr_close+0x92/0x140 [ 647.300369][T18428] __fput+0x228/0x8c0 [ 647.304193][T18428] ____fput+0x15/0x20 [ 647.308013][T18428] task_work_run+0x129/0x190 [ 647.312431][T18428] exit_to_user_mode_loop+0xc4/0xe0 [ 647.317466][T18428] exit_to_user_mode_prepare+0x5a/0xa0 [ 647.322763][T18428] syscall_exit_to_user_mode+0x26/0x160 [ 647.328138][T18428] do_syscall_64+0x47/0xb0 [ 647.332393][T18428] ? clear_bhb_loop+0x35/0x90 [ 647.336908][T18428] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 647.342654][T18428] RIP: 0033:0x7f31f497c819 [ 647.346893][T18428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 647.366336][T18428] RSP: 002b:00007f31f2ff5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 647.374579][T18428] RAX: 0000000000000000 RBX: 00007f31f4b33fa0 RCX: 00007f31f497c819 [ 647.382387][T18428] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 647.390355][T18428] RBP: 00007f31f2ff5090 R08: 0000000000000000 R09: 0000000000000000 [ 647.398160][T18428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 647.405972][T18428] R13: 0000000000000000 R14: 00007f31f4b33fa0 R15: 00007fff4b2c7b28 [ 647.414049][T18428] [ 647.431779][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 647.449845][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 647.464942][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 647.473753][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 647.487465][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 647.574307][T18447] device syzkaller0 entered promiscuous mode [ 647.754027][T18466] device pim6reg1 entered promiscuous mode [ 647.824363][T18468] bridge0: port 1(bridge_slave_0) entered blocking state [ 647.831247][T18468] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.838443][T18468] device bridge_slave_0 entered promiscuous mode [ 647.845445][T18468] bridge0: port 2(bridge_slave_1) entered blocking state [ 647.852604][T18468] bridge0: port 2(bridge_slave_1) entered disabled state [ 647.859971][T18468] device bridge_slave_1 entered promiscuous mode [ 648.049294][T18488] FAULT_INJECTION: forcing a failure. [ 648.049294][T18488] name failslab, interval 1, probability 0, space 0, times 0 [ 648.072527][T18488] CPU: 1 PID: 18488 Comm: syz.4.5451 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 648.082448][T18488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 648.092334][T18488] Call Trace: [ 648.095459][T18488] [ 648.098240][T18488] dump_stack_lvl+0x151/0x1c0 [ 648.102835][T18488] ? io_uring_drop_tctx_refs+0x190/0x190 [ 648.108306][T18488] dump_stack+0x15/0x20 [ 648.112291][T18488] should_fail+0x3c6/0x510 [ 648.116557][T18488] __should_failslab+0xa4/0xe0 [ 648.121501][T18488] should_failslab+0x9/0x20 [ 648.125834][T18488] slab_pre_alloc_hook+0x37/0xd0 [ 648.130605][T18488] ? inet_netconf_notify_devconf+0x173/0x220 [ 648.136509][T18488] __kmalloc_track_caller+0x6c/0x260 [ 648.141646][T18488] ? inet_netconf_notify_devconf+0x173/0x220 [ 648.147538][T18488] ? inet_netconf_notify_devconf+0x173/0x220 [ 648.153495][T18488] __alloc_skb+0x10c/0x550 [ 648.157804][T18488] inet_netconf_notify_devconf+0x173/0x220 [ 648.163455][T18488] inetdev_event+0x79d/0x10a0 [ 648.167957][T18488] ? ipv4_doint_and_flush+0x150/0x150 [ 648.173177][T18488] ? up_read+0x5d/0x220 [ 648.177160][T18488] raw_notifier_call_chain+0x8c/0xf0 [ 648.182367][T18488] unregister_netdevice_many+0xe0a/0x17c0 [ 648.188004][T18488] ? synchronize_rcu+0x120/0x120 [ 648.192779][T18488] ? alloc_netdev_mqs+0xc90/0xc90 [ 648.197676][T18488] ? locks_remove_file+0x41a/0x1180 [ 648.202767][T18488] ? __kasan_check_read+0x11/0x20 [ 648.207751][T18488] unregister_netdevice_queue+0x2e6/0x350 [ 648.213381][T18488] ? linkwatch_urgent_event+0x65/0x4d0 [ 648.218644][T18488] ? list_netdevice+0x4c0/0x4c0 [ 648.223341][T18488] __tun_detach+0xd14/0x1510 [ 648.228142][T18488] ? wait_for_completion_killable_timeout+0x10/0x10 [ 648.234633][T18488] ? tun_chr_open+0x530/0x530 [ 648.239135][T18488] tun_chr_close+0x92/0x140 [ 648.243585][T18488] __fput+0x228/0x8c0 [ 648.247500][T18488] ____fput+0x15/0x20 [ 648.251392][T18488] task_work_run+0x129/0x190 [ 648.256029][T18488] exit_to_user_mode_loop+0xc4/0xe0 [ 648.261069][T18488] exit_to_user_mode_prepare+0x5a/0xa0 [ 648.266349][T18488] syscall_exit_to_user_mode+0x26/0x160 [ 648.271735][T18488] do_syscall_64+0x47/0xb0 [ 648.275975][T18488] ? clear_bhb_loop+0x35/0x90 [ 648.280580][T18488] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 648.286308][T18488] RIP: 0033:0x7f32fc0b7819 [ 648.290568][T18488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 648.310005][T18488] RSP: 002b:00007f32fa730038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 648.318348][T18488] RAX: 0000000000000000 RBX: 00007f32fc26efa0 RCX: 00007f32fc0b7819 [ 648.326238][T18488] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 648.334162][T18488] RBP: 00007f32fa730090 R08: 0000000000000000 R09: 0000000000000000 [ 648.341968][T18488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 648.349780][T18488] R13: 0000000000000000 R14: 00007f32fc26efa0 R15: 00007ffd5b8a4558 [ 648.357600][T18488] [ 648.460652][T18498] syz.3.5455[18498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.460733][T18498] syz.3.5455[18498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 648.820271][T18511] device pim6reg1 entered promiscuous mode [ 648.913181][T18515] device pim6reg1 entered promiscuous mode [ 648.958203][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 648.970191][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 649.054539][ T8] device bridge_slave_1 left promiscuous mode [ 649.069134][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.088581][ T8] device bridge_slave_0 left promiscuous mode [ 649.101320][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.117723][ T8] device veth1_macvtap left promiscuous mode [ 649.131282][ T8] device veth0_vlan left promiscuous mode [ 649.270312][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 649.278938][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 649.287304][ T30] audit: type=1400 audit(1732348967.628:185): avc: denied { create } for pid=18539 comm="syz.0.5470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 649.310304][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 649.317430][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 649.325693][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 649.334094][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 649.342353][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 649.349322][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 649.357141][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 649.365807][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 649.374395][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 649.382741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 649.390762][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 649.400834][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 649.415600][T18468] device veth0_vlan entered promiscuous mode [ 649.433081][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 649.441161][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 649.449115][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 649.457730][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 649.466183][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 649.488418][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 649.497162][T18468] device veth1_macvtap entered promiscuous mode [ 649.562260][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 649.637891][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 649.647223][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 649.667397][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 649.962916][T18558] device pim6reg1 entered promiscuous mode [ 650.048277][T18560] ip6_vti0: mtu greater than device maximum [ 650.384869][T18568] bridge0: port 1(bridge_slave_0) entered blocking state [ 650.399369][T18568] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.407907][T18568] device bridge_slave_0 entered promiscuous mode [ 650.423918][T18568] bridge0: port 2(bridge_slave_1) entered blocking state [ 650.431281][T18568] bridge0: port 2(bridge_slave_1) entered disabled state [ 650.438653][T18568] device bridge_slave_1 entered promiscuous mode [ 650.685048][T18607] syzkaller0: refused to change device tx_queue_len [ 650.691772][T18608] device pim6reg1 entered promiscuous mode [ 651.393149][ T8] device bridge_slave_1 left promiscuous mode [ 651.399115][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 651.414694][ T8] device bridge_slave_0 left promiscuous mode [ 651.426109][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 651.437722][ T8] device veth1_macvtap left promiscuous mode [ 651.443735][ T8] device veth0_vlan left promiscuous mode [ 651.587098][T18655] device pim6reg1 entered promiscuous mode [ 651.617089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 651.625179][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 651.648256][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 651.677323][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 651.691671][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 651.698569][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 651.708779][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 651.717306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 651.736282][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 651.743358][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 651.750870][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 651.779133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 651.787730][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 651.796135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 651.805131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 651.833500][T18568] device veth0_vlan entered promiscuous mode [ 651.847576][T18568] device veth1_macvtap entered promiscuous mode [ 651.857823][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 651.867306][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 651.919040][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 651.927058][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 651.935657][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 651.944170][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 651.952740][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 652.027837][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 652.038528][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.053143][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 652.063580][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 652.073736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 652.082681][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 652.750577][T18705] device pim6reg1 entered promiscuous mode [ 654.190663][ T8] device bridge_slave_1 left promiscuous mode [ 654.197527][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.206302][ T8] device bridge_slave_0 left promiscuous mode [ 654.214161][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.222752][ T8] device veth1_macvtap left promiscuous mode [ 654.229365][ T8] device veth0_vlan left promiscuous mode [ 654.379774][T18735] bond_slave_1: mtu less than device minimum [ 654.409339][T18722] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.421020][T18722] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.428601][T18722] device bridge_slave_0 entered promiscuous mode [ 654.436314][T18722] bridge0: port 2(bridge_slave_1) entered blocking state [ 654.443393][T18722] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.451087][T18722] device bridge_slave_1 entered promiscuous mode [ 654.671818][T18722] bridge0: port 2(bridge_slave_1) entered blocking state [ 654.678693][T18722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 654.685955][T18722] bridge0: port 1(bridge_slave_0) entered blocking state [ 654.693347][T18722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 654.928048][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 654.938291][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.986892][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 655.046825][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 655.104004][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 655.111265][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 655.180135][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 655.191436][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 655.198369][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 655.210167][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 655.218944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 655.266140][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 655.275012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 655.351420][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 655.361036][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 655.378629][T18722] device veth0_vlan entered promiscuous mode [ 655.424349][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 655.432952][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.441692][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.451483][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.470403][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 655.479250][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 655.515919][T18722] device veth1_macvtap entered promiscuous mode [ 655.579816][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 655.587665][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 655.596718][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 655.613792][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 655.622719][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 656.491278][ T10] device bridge_slave_1 left promiscuous mode [ 656.497723][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.506367][ T10] device bridge_slave_0 left promiscuous mode [ 656.512556][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.523149][ T10] device veth1_macvtap left promiscuous mode [ 656.529073][ T10] device veth0_vlan left promiscuous mode [ 656.713750][T18826] bridge0: port 1(bridge_slave_0) entered blocking state [ 656.720801][T18826] bridge0: port 1(bridge_slave_0) entered disabled state [ 656.728459][T18826] device bridge_slave_0 entered promiscuous mode [ 656.735777][T18826] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.742889][T18826] bridge0: port 2(bridge_slave_1) entered disabled state [ 656.750248][T18826] device bridge_slave_1 entered promiscuous mode [ 656.772278][T18841] device syzkaller0 entered promiscuous mode [ 656.980068][T18826] bridge0: port 2(bridge_slave_1) entered blocking state [ 656.987129][T18826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 656.994372][T18826] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.001223][T18826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.107959][T18861] device pim6reg1 entered promiscuous mode [ 657.338869][T18867] device sit0 entered promiscuous mode [ 657.493919][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.502861][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.521191][T18873] device pim6reg1 entered promiscuous mode [ 657.555748][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 657.564204][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 657.573396][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 657.598699][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 657.613023][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.619921][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 657.641449][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 657.669465][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 657.684378][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.691369][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 657.714451][T18872] device pim6reg1 entered promiscuous mode [ 657.734313][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 657.797625][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 657.805895][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 657.817189][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 657.839840][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 657.848665][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 657.866939][T18826] device veth0_vlan entered promiscuous mode [ 657.875990][T18895] tun0: tun_chr_ioctl cmd 2148553947 [ 657.881877][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 657.890506][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 657.906692][T18826] device veth1_macvtap entered promiscuous mode [ 657.921007][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 657.949337][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 657.972940][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 658.039279][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 658.062167][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 658.146372][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 658.155826][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 658.164383][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 658.175722][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 658.275875][T18917] device wg2 entered promiscuous mode [ 658.841796][ T10] device bridge_slave_1 left promiscuous mode [ 658.847838][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.855379][ T10] device bridge_slave_0 left promiscuous mode [ 658.861494][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.869386][ T10] device veth1_macvtap left promiscuous mode [ 658.875427][ T10] device veth0_vlan left promiscuous mode [ 659.337233][T18938] bridge0: port 1(bridge_slave_0) entered blocking state [ 659.347188][T18938] bridge0: port 1(bridge_slave_0) entered disabled state [ 659.354865][T18938] device bridge_slave_0 entered promiscuous mode [ 659.375283][T18938] bridge0: port 2(bridge_slave_1) entered blocking state [ 659.402667][T18938] bridge0: port 2(bridge_slave_1) entered disabled state [ 659.478334][T18938] device bridge_slave_1 entered promiscuous mode [ 660.001556][T18973] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.010577][T18973] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.133691][T18974] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.140886][T18974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 660.148262][T18974] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.155259][T18974] bridge0: port 1(bridge_slave_0) entered forwarding state [ 660.166664][T18974] device bridge0 entered promiscuous mode [ 660.177561][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 660.185464][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 660.230566][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 660.238969][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 660.247437][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 660.254503][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 660.262103][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 660.270435][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 660.279095][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 660.287700][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 660.294755][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 660.534228][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 660.613006][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 660.632718][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 660.662190][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 660.674168][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 660.694262][T18938] device veth0_vlan entered promiscuous mode [ 660.701643][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 660.710024][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 660.734588][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 660.749805][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 660.765237][T18938] device veth1_macvtap entered promiscuous mode [ 660.784527][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 660.812830][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 660.859012][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 660.912773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 660.947388][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 660.959041][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 660.968369][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 661.121929][T19006] device pim6reg1 entered promiscuous mode [ 661.822074][ T8] device bridge_slave_1 left promiscuous mode [ 661.828061][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 661.860225][ T8] device bridge_slave_0 left promiscuous mode [ 661.870208][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 661.898917][ T8] device veth1_macvtap left promiscuous mode [ 661.904958][ T8] device veth0_vlan left promiscuous mode [ 662.753430][T19027] bridge0: port 1(bridge_slave_0) entered blocking state [ 662.760681][T19027] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.768717][T19027] device bridge_slave_0 entered promiscuous mode [ 662.776008][T19027] bridge0: port 2(bridge_slave_1) entered blocking state [ 662.782947][T19027] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.791953][T19027] device bridge_slave_1 entered promiscuous mode [ 663.022673][T19050] device pim6reg1 entered promiscuous mode [ 663.089778][T19027] bridge0: port 2(bridge_slave_1) entered blocking state [ 663.096843][T19027] bridge0: port 2(bridge_slave_1) entered forwarding state [ 663.103982][T19027] bridge0: port 1(bridge_slave_0) entered blocking state [ 663.111141][T19027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 663.522804][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 663.551465][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 663.560434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 663.620356][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 663.638432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 663.676581][T19070] device pim6reg1 entered promiscuous mode [ 663.769585][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 663.780444][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 663.955381][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 664.001540][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 664.135496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 664.150439][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 664.182909][T19027] device veth0_vlan entered promiscuous mode [ 664.316103][T19027] device veth1_macvtap entered promiscuous mode [ 664.437442][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 664.446432][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 664.455570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 664.537162][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 664.546029][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 664.562200][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 664.570596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 664.836957][T19110] device pim6reg1 entered promiscuous mode [ 665.461762][ T8] device bridge_slave_1 left promiscuous mode [ 665.467817][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.475530][ T8] device bridge_slave_0 left promiscuous mode [ 665.481620][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.489587][ T8] device veth1_macvtap left promiscuous mode [ 665.495520][ T8] device veth0_vlan left promiscuous mode [ 665.660265][T19115] device pim6reg1 entered promiscuous mode [ 666.545224][T19121] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.552734][T19121] bridge0: port 1(bridge_slave_0) entered disabled state [ 666.560500][T19121] device bridge_slave_0 entered promiscuous mode [ 666.567973][T19121] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.575493][T19121] bridge0: port 2(bridge_slave_1) entered disabled state [ 666.583340][T19121] device bridge_slave_1 entered promiscuous mode [ 666.753814][T19156] device pim6reg1 entered promiscuous mode [ 666.850907][T19121] bridge0: port 2(bridge_slave_1) entered blocking state [ 666.857905][T19121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 666.865124][T19121] bridge0: port 1(bridge_slave_0) entered blocking state [ 666.871994][T19121] bridge0: port 1(bridge_slave_0) entered forwarding state [ 667.257653][T19171] device syzkaller0 entered promiscuous mode [ 667.740777][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 667.748974][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 667.757587][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 667.767032][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 667.775406][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 667.783529][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 667.897559][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 667.905803][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 667.983119][T19187] device pim6reg1 entered promiscuous mode [ 667.994348][T19121] device veth0_vlan entered promiscuous mode [ 668.011731][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 668.019785][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.056667][T19121] device veth1_macvtap entered promiscuous mode [ 668.069799][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 668.080538][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 668.100172][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 668.134491][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 668.147504][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 668.174280][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 668.184968][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 668.991930][ T8] device bridge_slave_1 left promiscuous mode [ 668.997991][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 669.005669][ T8] device bridge_slave_0 left promiscuous mode [ 669.012815][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.022195][ T8] device veth1_macvtap left promiscuous mode [ 669.029679][ T8] device veth0_vlan left promiscuous mode [ 669.369985][T19206] device pim6reg1 entered promiscuous mode [ 669.723480][T19219] bond_slave_1: mtu less than device minimum [ 669.871929][T19213] bridge0: port 1(bridge_slave_0) entered blocking state [ 669.914853][T19213] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.941581][T19213] device bridge_slave_0 entered promiscuous mode [ 670.050834][T19213] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.061313][T19213] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.143413][T19213] device bridge_slave_1 entered promiscuous mode [ 670.160498][T19233] device pim6reg1 entered promiscuous mode [ 670.477617][T19213] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.484794][T19213] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.492354][T19213] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.500083][T19213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 670.664679][T19250] device pim6reg1 entered promiscuous mode [ 670.695460][ T611] bridge0: port 1(bridge_slave_0) entered disabled state [ 670.704603][ T611] bridge0: port 2(bridge_slave_1) entered disabled state [ 670.713595][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 670.721742][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 670.762018][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 670.837363][ T611] bridge0: port 1(bridge_slave_0) entered blocking state [ 670.844283][ T611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 670.851863][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 670.860054][ T611] bridge0: port 2(bridge_slave_1) entered blocking state [ 670.867165][ T611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 670.917579][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 670.926467][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 670.935347][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 670.943926][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 671.152404][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 671.167144][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 671.373737][T19285] device veth0_vlan left promiscuous mode [ 671.382224][T19285] device veth0_vlan entered promiscuous mode [ 671.394521][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 671.417056][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 671.474659][T19213] device veth0_vlan entered promiscuous mode [ 671.481497][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 671.493878][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 671.552514][T19213] device veth1_macvtap entered promiscuous mode [ 671.583242][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 671.600412][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 671.613566][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 671.622774][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 671.631972][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 671.640704][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 671.650090][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 671.726501][T19298] device syzkaller0 entered promiscuous mode [ 671.943228][T19300] device pim6reg1 entered promiscuous mode [ 672.175314][T19306] device pim6reg1 entered promiscuous mode [ 672.752172][ T45] device bridge_slave_1 left promiscuous mode [ 672.758157][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.765835][ T45] device bridge_slave_0 left promiscuous mode [ 672.772598][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.780677][ T45] device veth1_macvtap left promiscuous mode [ 672.786549][ T45] device veth0_vlan left promiscuous mode [ 673.317472][T19318] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.353392][T19318] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.367518][T19318] device bridge_slave_0 entered promiscuous mode [ 673.384727][T19318] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.392455][T19318] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.401556][T19318] device bridge_slave_1 entered promiscuous mode [ 673.526178][T19318] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.533384][T19318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.540445][T19318] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.547724][T19318] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.576341][T19340] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.586228][T19340] device bridge0 left promiscuous mode [ 673.655239][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 673.663867][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 673.673231][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 673.681760][T19340] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.689020][T19340] bridge0: port 2(bridge_slave_1) entered listening state [ 673.700622][T19340] device bridge0 entered promiscuous mode [ 673.733256][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 673.741554][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 673.748449][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 673.761359][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 673.770023][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 673.776926][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 673.823246][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 673.878906][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 673.997973][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 674.073234][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 674.121323][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 674.128840][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 674.144408][T19318] device veth0_vlan entered promiscuous mode [ 674.303756][T19318] device veth1_macvtap entered promiscuous mode [ 674.343225][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 674.351878][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 674.360058][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 674.452451][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 674.465446][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 674.542925][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 674.555269][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 676.315007][T19376] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.323476][T19376] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.331837][T19376] device bridge_slave_0 entered promiscuous mode [ 676.412592][T19376] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.419722][T19376] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.427496][T19376] device bridge_slave_1 entered promiscuous mode [ 676.563200][ T312] device bridge_slave_1 left promiscuous mode [ 676.580432][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.594151][ T312] device bridge_slave_0 left promiscuous mode [ 676.605771][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 676.632047][ T312] device veth1_macvtap left promiscuous mode [ 676.638239][ T312] device veth0_vlan left promiscuous mode [ 676.922926][T19376] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.929841][T19376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 676.937042][T19376] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.943992][T19376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 676.986306][T19405] device syzkaller0 entered promiscuous mode [ 677.162768][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 677.171751][T19125] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.179202][T19125] bridge0: port 2(bridge_slave_1) entered disabled state [ 677.195853][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 677.204344][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.213763][T19125] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.220775][T19125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.241625][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 677.250773][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 677.259716][T19125] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.266599][T19125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 677.380551][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 677.403533][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 677.621031][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 677.647188][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 677.804525][T19376] device veth0_vlan entered promiscuous mode [ 677.846258][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 677.856327][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 677.864759][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 677.872701][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 677.880682][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 677.888835][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 677.907321][T19376] device veth1_macvtap entered promiscuous mode [ 678.000687][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 678.010367][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 678.019220][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 678.245348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 678.272174][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 678.467303][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 678.477840][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 678.748150][T19436] device veth0_vlan left promiscuous mode [ 678.766201][T19436] device veth0_vlan entered promiscuous mode [ 678.914608][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.924416][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 678.932908][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.946905][T19446] device pim6reg1 entered promiscuous mode [ 680.023462][ T312] device bridge_slave_1 left promiscuous mode [ 680.029838][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.101272][ T312] device bridge_slave_0 left promiscuous mode [ 680.107479][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.233995][ T312] device veth1_macvtap left promiscuous mode [ 680.246575][ T312] device veth0_vlan left promiscuous mode [ 680.429096][T19458] device syzkaller0 entered promiscuous mode [ 680.738161][T19456] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.794842][T19456] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.854476][T19456] device bridge_slave_0 entered promiscuous mode [ 680.983058][T19482] device pim6reg1 entered promiscuous mode [ 681.006510][T19456] bridge0: port 2(bridge_slave_1) entered blocking state [ 681.016426][T19456] bridge0: port 2(bridge_slave_1) entered disabled state [ 681.025274][T19456] device bridge_slave_1 entered promiscuous mode [ 681.646218][T19503] device syzkaller0 entered promiscuous mode [ 682.000389][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 682.032175][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 682.081726][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 682.120567][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 682.169859][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.177147][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 682.193621][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 682.205536][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 682.214725][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 682.221635][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 682.229222][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 682.242247][T19523] device pim6reg1 entered promiscuous mode [ 682.317068][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 682.325828][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 682.448062][T19456] device veth0_vlan entered promiscuous mode [ 682.455020][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 682.463392][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 682.472567][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 682.481855][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 682.490715][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 682.499804][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 682.508260][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 682.516531][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 682.650625][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 682.711919][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 682.768723][T19456] device veth1_macvtap entered promiscuous mode [ 682.791844][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 682.799467][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 682.820321][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 682.861013][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 682.869948][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 683.101934][T19563] device syzkaller0 entered promiscuous mode [ 683.148972][T19592] device pim6reg1 entered promiscuous mode [ 683.384132][T19599] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.391266][T19599] bridge0: port 1(bridge_slave_0) entered disabled state [ 683.399461][T19599] device bridge_slave_0 entered promiscuous mode [ 683.413402][T19599] bridge0: port 2(bridge_slave_1) entered blocking state [ 683.423663][T19599] bridge0: port 2(bridge_slave_1) entered disabled state [ 683.434437][T19599] device bridge_slave_1 entered promiscuous mode [ 683.628721][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 683.638515][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 683.662818][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 683.671679][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 683.688358][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 683.695336][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 683.704306][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 683.713235][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 683.722196][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 683.729141][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 683.751030][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 683.758762][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 683.767548][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 683.800457][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 683.811416][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 683.832048][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 683.856760][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 683.866089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 683.874052][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 683.882510][T19599] device veth0_vlan entered promiscuous mode [ 683.898582][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 683.909521][T19599] device veth1_macvtap entered promiscuous mode [ 683.920347][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 683.929959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 683.941933][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 683.950199][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 684.221880][ T312] device bridge_slave_1 left promiscuous mode [ 684.227975][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.236075][ T312] device bridge_slave_0 left promiscuous mode [ 684.242246][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.250402][ T312] device veth1_macvtap left promiscuous mode [ 684.256488][ T312] device veth0_vlan left promiscuous mode [ 684.262728][ T312] device veth1_macvtap left promiscuous mode [ 684.268566][ T312] device veth0_vlan left promiscuous mode [ 684.642978][T19617] device bridge_slave_0 entered promiscuous mode [ 684.655553][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 684.940256][T19624] device veth1_macvtap left promiscuous mode [ 685.191284][T19630] device veth1_macvtap entered promiscuous mode [ 685.246542][T19630] device macsec0 entered promiscuous mode [ 685.391903][T19618] bridge0: port 1(bridge_slave_0) entered blocking state [ 685.538585][T19618] bridge0: port 1(bridge_slave_0) entered disabled state [ 685.580646][T19618] device bridge_slave_0 entered promiscuous mode [ 685.639738][T19618] bridge0: port 2(bridge_slave_1) entered blocking state [ 685.722414][T19618] bridge0: port 2(bridge_slave_1) entered disabled state [ 685.852043][T19618] device bridge_slave_1 entered promiscuous mode [ 686.772939][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 686.792359][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 686.895497][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 686.909619][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 686.919826][ T611] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.926723][ T611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 686.934598][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 686.980649][T19668] device pim6reg1 entered promiscuous mode [ 687.011875][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 687.026241][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 687.034642][ T611] bridge0: port 2(bridge_slave_1) entered blocking state [ 687.041613][ T611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 687.127205][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 687.136157][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 687.145311][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 687.154465][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 687.394463][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 687.425805][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 687.613169][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 687.623327][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 687.632596][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 687.640528][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 687.649608][T19618] device veth0_vlan entered promiscuous mode [ 687.877054][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 687.912085][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 688.003053][T19618] device veth1_macvtap entered promiscuous mode [ 688.061141][T19678] device syzkaller0 entered promiscuous mode [ 688.111820][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 688.143108][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 688.258904][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 688.294925][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 689.291040][ C1] bridge0: port 2(bridge_slave_1) entered learning state [ 689.732038][ T611] device bridge_slave_1 left promiscuous mode [ 689.737993][ T611] bridge0: port 2(bridge_slave_1) entered disabled state [ 689.745581][ T611] device bridge_slave_0 left promiscuous mode [ 689.751741][ T611] bridge0: port 1(bridge_slave_0) entered disabled state [ 689.759700][ T611] device veth1_macvtap left promiscuous mode [ 689.765672][ T611] device veth0_vlan left promiscuous mode [ 690.056477][T19699] device syzkaller0 entered promiscuous mode [ 690.313873][T19697] device syzkaller0 entered promiscuous mode [ 690.410537][T19715] device sit0 entered promiscuous mode [ 690.579991][T19709] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.587193][T19709] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.594793][T19709] device bridge_slave_0 entered promiscuous mode [ 690.613521][T19718] device veth1_macvtap left promiscuous mode [ 690.691070][T19724] device veth1_macvtap entered promiscuous mode [ 690.697891][T19724] device macsec0 entered promiscuous mode [ 690.704709][T19709] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.714561][T19709] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.728388][T19709] device bridge_slave_1 entered promiscuous mode [ 691.306240][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 691.313881][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 691.387623][T19752] device syzkaller0 entered promiscuous mode [ 691.425869][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 691.434487][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 691.442745][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.450381][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.457849][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 691.466127][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 691.474609][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.481575][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 691.612342][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 691.856154][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 691.893574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 692.151640][T19709] device veth0_vlan entered promiscuous mode [ 692.166603][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 692.175094][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 692.184132][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 692.192756][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 692.270998][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 692.286981][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 692.298683][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 692.313257][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 692.382531][T19709] device veth1_macvtap entered promiscuous mode [ 692.420811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 692.430027][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 692.439329][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 692.535725][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 692.551480][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 693.282590][ T312] device bridge_slave_1 left promiscuous mode [ 693.288740][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 693.351189][ T312] device bridge_slave_0 left promiscuous mode [ 693.387698][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.427256][ T312] device veth1_macvtap left promiscuous mode [ 693.433234][ T312] device veth0_vlan left promiscuous mode [ 694.253625][T19776] device pim6reg1 entered promiscuous mode [ 694.323172][T19777] device veth1_macvtap entered promiscuous mode [ 694.330606][T19777] device macsec0 entered promiscuous mode [ 694.363949][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 694.422946][T19779] device pim6reg1 entered promiscuous mode [ 694.602224][T19787] device sit0 entered promiscuous mode [ 695.093813][T19797] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 695.103053][T19797] device syzkaller0 entered promiscuous mode [ 695.143572][T19781] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.150414][T19781] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.157824][T19781] device bridge_slave_0 entered promiscuous mode [ 695.180842][T19781] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.197204][T19781] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.205047][T19781] device bridge_slave_1 entered promiscuous mode [ 695.285841][T19813] device syzkaller0 entered promiscuous mode [ 695.396289][T19781] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.403300][T19781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 695.410404][T19781] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.417303][T19781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.566737][T19817] device syzkaller0 entered promiscuous mode [ 695.865766][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.880884][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.932339][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 695.985044][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.097890][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 696.106215][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.113118][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.120702][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 696.129196][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.136098][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.353570][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 696.361727][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 696.370039][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 696.378198][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 696.431880][T19842] device pim6reg1 entered promiscuous mode [ 696.489334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 696.497667][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 696.509768][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 696.518779][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 696.528429][T19781] device veth0_vlan entered promiscuous mode [ 696.581015][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 696.588496][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 696.610716][T19846] device syzkaller0 entered promiscuous mode [ 696.655058][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 696.663311][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 696.719601][T19781] device veth1_macvtap entered promiscuous mode [ 696.733585][T19852] device sit0 entered promiscuous mode [ 696.883161][T19854] device sit0 left promiscuous mode [ 696.959605][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 696.967725][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 696.976226][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 696.991080][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 696.999493][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 698.021720][T19125] device bridge_slave_1 left promiscuous mode [ 698.027664][T19125] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.035163][T19125] device bridge_slave_0 left promiscuous mode [ 698.041264][T19125] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.049443][T19125] device veth1_macvtap left promiscuous mode [ 698.055347][T19125] device veth0_vlan left promiscuous mode [ 698.845990][T19886] device syzkaller0 entered promiscuous mode [ 699.016363][T19901] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.023323][T19901] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.030719][T19901] device bridge_slave_0 entered promiscuous mode [ 699.037865][T19901] bridge0: port 2(bridge_slave_1) entered blocking state [ 699.045141][T19901] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.052675][T19901] device bridge_slave_1 entered promiscuous mode [ 699.159339][T19901] bridge0: port 2(bridge_slave_1) entered blocking state [ 699.166259][T19901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 699.173481][T19901] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.180326][T19901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 699.261486][ T611] bridge0: port 1(bridge_slave_0) entered disabled state [ 699.281289][ T611] bridge0: port 2(bridge_slave_1) entered disabled state [ 699.368495][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 699.461619][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 699.523702][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 699.556116][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 699.588806][ T611] bridge0: port 1(bridge_slave_0) entered blocking state [ 699.595924][ T611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 700.415025][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 700.427182][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 700.442534][ T611] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.449411][ T611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 700.462782][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 700.472250][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 700.484076][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 700.493080][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 700.538917][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 700.551538][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 700.639064][T19901] device veth0_vlan entered promiscuous mode [ 700.666485][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 700.674837][T19950] syz.3.5876[19950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.674919][T19950] syz.3.5876[19950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 700.691593][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 700.759565][T19901] device veth1_macvtap entered promiscuous mode [ 700.774184][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 700.784302][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 700.806634][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 700.817212][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 700.827227][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 700.851481][T19954] device pim6reg1 entered promiscuous mode [ 700.868236][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 700.879383][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 700.890633][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 700.899479][ T611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 701.358230][T19959] device syzkaller0 entered promiscuous mode [ 701.972283][T19125] device bridge_slave_1 left promiscuous mode [ 701.978221][T19125] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.985620][T19125] device bridge_slave_0 left promiscuous mode [ 701.991630][T19125] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.999430][T19125] device veth1_macvtap left promiscuous mode [ 702.005399][T19125] device veth0_vlan left promiscuous mode [ 703.383082][T19973] bridge0: port 1(bridge_slave_0) entered blocking state [ 703.400064][T19973] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.409675][T19973] device bridge_slave_0 entered promiscuous mode [ 703.498212][T19973] bridge0: port 2(bridge_slave_1) entered blocking state [ 703.516438][T19973] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.524584][T19973] device bridge_slave_1 entered promiscuous mode [ 704.651832][ C1] bridge0: port 2(bridge_slave_1) entered forwarding state [ 704.659055][ C1] bridge0: topology change detected, propagating [ 704.666689][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 704.913953][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 704.961466][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 705.080286][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 705.236609][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 705.328110][T19125] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.335006][T19125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 705.478857][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 705.519806][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 705.529422][T19125] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.536310][T19125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 705.674296][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 705.701679][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 705.721411][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 705.782310][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 705.843243][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 705.952531][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 706.003238][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 706.148072][T19973] device veth0_vlan entered promiscuous mode [ 706.154713][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 706.162910][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.171458][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.178882][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 706.312483][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 706.341725][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 706.413547][T19973] device veth1_macvtap entered promiscuous mode [ 706.432045][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 706.481706][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 706.711298][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 706.837652][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 706.901868][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 708.081578][T19125] device bridge_slave_1 left promiscuous mode [ 708.087590][T19125] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.095168][T19125] device bridge_slave_0 left promiscuous mode [ 708.101240][T19125] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.108981][T19125] device veth1_macvtap left promiscuous mode [ 708.114848][T19125] device veth0_vlan left promiscuous mode [ 709.444392][T20021] device pim6reg1 entered promiscuous mode [ 712.014958][T20023] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.052909][T20023] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.095873][T20023] device bridge_slave_0 entered promiscuous mode [ 712.120021][T20023] bridge0: port 2(bridge_slave_1) entered blocking state [ 712.127068][T20023] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.134560][T20023] device bridge_slave_1 entered promiscuous mode [ 712.844274][T20064] device pim6reg1 entered promiscuous mode [ 712.876236][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 712.884710][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 712.906288][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 712.914656][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 712.923968][T19256] bridge0: port 1(bridge_slave_0) entered blocking state [ 712.930855][T19256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 712.970271][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 712.979400][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 712.988266][T19256] bridge0: port 2(bridge_slave_1) entered blocking state [ 712.995162][T19256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 713.027395][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 713.035768][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 713.044093][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 713.052616][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 713.060726][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 713.108273][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 713.128937][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 713.210806][T20023] device veth0_vlan entered promiscuous mode [ 713.237447][ T30] audit: type=1400 audit(1732349031.578:186): avc: denied { setattr } for pid=20079 comm="syz.4.5914" path="/dev/net/tun" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 713.285329][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 713.301420][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 713.374767][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 713.392408][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 713.433659][T20023] device veth1_macvtap entered promiscuous mode [ 713.479628][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 713.490079][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 713.498817][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 713.642545][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 713.654894][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 713.703850][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 713.712409][T19256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 714.831331][T19125] device bridge_slave_1 left promiscuous mode [ 714.837308][T19125] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.851072][T19125] device bridge_slave_0 left promiscuous mode [ 714.857105][T19125] bridge0: port 1(bridge_slave_0) entered disabled state [ 714.865546][T19125] device veth1_macvtap left promiscuous mode [ 714.871461][T19125] device veth0_vlan left promiscuous mode [ 715.923887][T20098] device pim6reg1 entered promiscuous mode [ 716.121394][T20106] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.128379][T20106] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.136188][T20106] device bridge_slave_0 entered promiscuous mode [ 716.145545][T20117] device pim6reg1 entered promiscuous mode [ 716.152782][T20106] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.159652][T20106] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.168930][T20106] device bridge_slave_1 entered promiscuous mode [ 716.328420][T20134] FAULT_INJECTION: forcing a failure. [ 716.328420][T20134] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 716.342134][T20134] CPU: 1 PID: 20134 Comm: syz.3.5928 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 716.351949][T20134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 716.361848][T20134] Call Trace: [ 716.364967][T20134] [ 716.367928][T20134] dump_stack_lvl+0x151/0x1c0 [ 716.372512][T20134] ? io_uring_drop_tctx_refs+0x190/0x190 [ 716.377978][T20134] ? __schedule+0xcd4/0x1590 [ 716.382492][T20134] dump_stack+0x15/0x20 [ 716.386481][T20134] should_fail+0x3c6/0x510 [ 716.390741][T20134] should_fail_usercopy+0x1a/0x20 [ 716.395593][T20134] _copy_to_user+0x20/0x90 [ 716.399852][T20134] vti6_siocdevprivate+0x5a5/0x17e0 [ 716.404894][T20134] ? vti6_tnl_xmit+0x1860/0x1860 [ 716.409664][T20134] ? __kasan_check_write+0x14/0x20 [ 716.414602][T20134] ? full_name_hash+0xbd/0xf0 [ 716.419118][T20134] dev_ifsioc+0xc75/0x10c0 [ 716.423371][T20134] ? dev_ioctl+0xe70/0xe70 [ 716.427620][T20134] ? mutex_lock+0x135/0x1e0 [ 716.431969][T20134] ? wait_for_completion_killable_timeout+0x10/0x10 [ 716.438414][T20134] dev_ioctl+0x5f3/0xe70 [ 716.442466][T20134] sock_ioctl+0x665/0x740 [ 716.446634][T20134] ? sock_poll+0x400/0x400 [ 716.450883][T20134] ? security_file_ioctl+0x84/0xb0 [ 716.455826][T20134] ? sock_poll+0x400/0x400 [ 716.460091][T20134] __se_sys_ioctl+0x114/0x190 [ 716.464591][T20134] __x64_sys_ioctl+0x7b/0x90 [ 716.469021][T20134] x64_sys_call+0x98/0x9a0 [ 716.473288][T20134] do_syscall_64+0x3b/0xb0 [ 716.477525][T20134] ? clear_bhb_loop+0x35/0x90 [ 716.482036][T20134] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 716.487763][T20134] RIP: 0033:0x7f318ce35819 [ 716.492021][T20134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 716.511463][T20134] RSP: 002b:00007f318b4ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 716.519838][T20134] RAX: ffffffffffffffda RBX: 00007f318cfecfa0 RCX: 00007f318ce35819 [ 716.527648][T20134] RDX: 0000000020000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 716.535458][T20134] RBP: 00007f318b4ae090 R08: 0000000000000000 R09: 0000000000000000 [ 716.543270][T20134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.551079][T20134] R13: 0000000000000000 R14: 00007f318cfecfa0 R15: 00007ffcb2a86118 [ 716.558904][T20134] [ 716.577522][T20106] bridge0: port 2(bridge_slave_1) entered blocking state [ 716.584426][T20106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 716.591552][T20106] bridge0: port 1(bridge_slave_0) entered blocking state [ 716.599064][T20106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 716.692546][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 716.700368][T19125] bridge0: port 1(bridge_slave_0) entered disabled state [ 716.708063][T19125] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.716541][T20145] FAULT_INJECTION: forcing a failure. [ 716.716541][T20145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 716.731887][T20145] CPU: 1 PID: 20145 Comm: syz.3.5942 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 716.741705][T20145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 716.751606][T20145] Call Trace: [ 716.754716][T20145] [ 716.757493][T20145] dump_stack_lvl+0x151/0x1c0 [ 716.762007][T20145] ? io_uring_drop_tctx_refs+0x190/0x190 [ 716.767477][T20145] ? dev_ioctl+0xe70/0xe70 [ 716.771726][T20145] ? mutex_lock+0x135/0x1e0 [ 716.776066][T20145] dump_stack+0x15/0x20 [ 716.780057][T20145] should_fail+0x3c6/0x510 [ 716.784315][T20145] should_fail_usercopy+0x1a/0x20 [ 716.789170][T20145] _copy_to_user+0x20/0x90 [ 716.793442][T20145] put_user_ifreq+0xe7/0x130 [ 716.797851][T20145] sock_ioctl+0x6b6/0x740 [ 716.802017][T20145] ? sock_poll+0x400/0x400 [ 716.806374][T20145] ? security_file_ioctl+0x84/0xb0 [ 716.811319][T20145] ? sock_poll+0x400/0x400 [ 716.815568][T20145] __se_sys_ioctl+0x114/0x190 [ 716.820083][T20145] __x64_sys_ioctl+0x7b/0x90 [ 716.824511][T20145] x64_sys_call+0x98/0x9a0 [ 716.828759][T20145] do_syscall_64+0x3b/0xb0 [ 716.833013][T20145] ? clear_bhb_loop+0x35/0x90 [ 716.837526][T20145] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 716.843256][T20145] RIP: 0033:0x7f318ce35819 [ 716.847511][T20145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 716.866950][T20145] RSP: 002b:00007f318b4ae038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 716.875191][T20145] RAX: ffffffffffffffda RBX: 00007f318cfecfa0 RCX: 00007f318ce35819 [ 716.883011][T20145] RDX: 0000000020000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 716.890817][T20145] RBP: 00007f318b4ae090 R08: 0000000000000000 R09: 0000000000000000 [ 716.898627][T20145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 716.906438][T20145] R13: 0000000000000000 R14: 00007f318cfecfa0 R15: 00007ffcb2a86118 [ 716.914262][T20145] [ 717.000454][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 717.009090][T19125] bridge0: port 1(bridge_slave_0) entered blocking state [ 717.015977][T19125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 717.023332][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 717.032857][T19125] bridge0: port 2(bridge_slave_1) entered blocking state [ 717.039735][T19125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 717.048329][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 717.056287][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 717.070872][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 717.079353][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 717.102626][T20106] device veth0_vlan entered promiscuous mode [ 717.136400][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 717.146068][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 717.170691][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 717.178337][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 717.193252][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 717.201809][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 717.212004][T20106] device veth1_macvtap entered promiscuous mode [ 717.249990][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 717.264501][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 717.345480][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 717.441606][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 717.542960][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 717.732454][T20192] FAULT_INJECTION: forcing a failure. [ 717.732454][T20192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 717.881062][T20192] CPU: 1 PID: 20192 Comm: syz.4.5946 Not tainted 5.15.168-syzkaller-00719-g101e665d55a8 #0 [ 717.890882][T20192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 717.900878][T20192] Call Trace: [ 717.903995][T20192] [ 717.906764][T20192] dump_stack_lvl+0x151/0x1c0 [ 717.911283][T20192] ? io_uring_drop_tctx_refs+0x190/0x190 [ 717.916750][T20192] ? do_vfs_ioctl+0xbc1/0x2a80 [ 717.921382][T20192] dump_stack+0x15/0x20 [ 717.925348][T20192] should_fail+0x3c6/0x510 [ 717.929597][T20192] should_fail_usercopy+0x1a/0x20 [ 717.934453][T20192] _copy_to_user+0x20/0x90 [ 717.938703][T20192] simple_read_from_buffer+0xc7/0x150 [ 717.943999][T20192] proc_fail_nth_read+0x1a3/0x210 [ 717.948860][T20192] ? proc_fault_inject_write+0x390/0x390 [ 717.954326][T20192] ? fsnotify_perm+0x269/0x5b0 [ 717.958931][T20192] ? security_file_permission+0x86/0xb0 [ 717.964305][T20192] ? proc_fault_inject_write+0x390/0x390 [ 717.969778][T20192] vfs_read+0x27d/0xd40 [ 717.973777][T20192] ? kernel_read+0x1f0/0x1f0 [ 717.978192][T20192] ? __kasan_check_write+0x14/0x20 [ 717.983144][T20192] ? mutex_lock+0xb6/0x1e0 [ 717.987394][T20192] ? wait_for_completion_killable_timeout+0x10/0x10 [ 717.993826][T20192] ? __fdget_pos+0x2e7/0x3a0 [ 717.998243][T20192] ? ksys_read+0x77/0x2c0 [ 718.002412][T20192] ksys_read+0x199/0x2c0 [ 718.006494][T20192] ? vfs_write+0x1110/0x1110 [ 718.010919][T20192] ? debug_smp_processor_id+0x17/0x20 [ 718.016124][T20192] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 718.022028][T20192] __x64_sys_read+0x7b/0x90 [ 718.026368][T20192] x64_sys_call+0x28/0x9a0 [ 718.030618][T20192] do_syscall_64+0x3b/0xb0 [ 718.034870][T20192] ? clear_bhb_loop+0x35/0x90 [ 718.039394][T20192] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 718.045110][T20192] RIP: 0033:0x7fa645c9f25c [ 718.049366][T20192] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 718.068806][T20192] RSP: 002b:00007fa644319030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 718.077136][T20192] RAX: ffffffffffffffda RBX: 00007fa645e57fa0 RCX: 00007fa645c9f25c [ 718.084949][T20192] RDX: 000000000000000f RSI: 00007fa6443190a0 RDI: 0000000000000005 [ 718.092759][T20192] RBP: 00007fa644319090 R08: 0000000000000000 R09: 0000000000000000 [ 718.100568][T20192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 718.108472][T20192] R13: 0000000000000000 R14: 00007fa645e57fa0 R15: 00007ffc05a934b8 [ 718.116322][T20192] [ 719.081770][ T312] device bridge_slave_1 left promiscuous mode [ 719.087724][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.095289][ T312] device bridge_slave_0 left promiscuous mode [ 719.101331][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 719.109394][ T312] device veth1_macvtap left promiscuous mode [ 719.115315][ T312] device veth0_vlan left promiscuous mode [ 720.088918][T20204] device pim6reg1 entered promiscuous mode [ 720.176531][T20207] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.183725][T20207] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.191527][T20207] device bridge_slave_0 entered promiscuous mode [ 720.221644][T20207] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.228511][T20207] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.239618][T20207] device bridge_slave_1 entered promiscuous mode [ 720.660507][T20207] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.667413][T20207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 720.674621][T20207] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.681566][T20207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 720.773950][T20255] device pim6reg1 entered promiscuous mode [ 720.843727][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 720.860415][T19125] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.877818][T19125] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.971998][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.013507][T19125] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.020411][T19125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.041076][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.058261][T19125] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.065164][T19125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.265460][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 721.288734][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 721.369591][T20207] device veth0_vlan entered promiscuous mode [ 721.467918][T20270] device syzkaller0 entered promiscuous mode [ 721.591260][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 721.610748][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 721.652125][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 721.683345][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 721.691971][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 721.699508][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 721.842225][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 721.865101][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 721.925974][T20207] device veth1_macvtap entered promiscuous mode [ 721.994269][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 722.004065][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 722.023222][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 722.094193][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 722.106105][T19125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=5408 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 723.733977][ T312] GPL: port 1(erspan0) entered disabled state [ 723.743540][ T312] device erspan0 left promiscuous mode [ 723.748817][ T312] GPL: port 1(erspan0) entered disabled state [ 723.972785][ T312] device bridge_slave_1 left promiscuous mode [ 723.978720][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.986201][ T312] device bridge_slave_0 left promiscuous mode [ 723.992193][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.000168][ T312] device bridge_slave_1 left promiscuous mode [ 724.006155][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.013350][ T312] device bridge_slave_0 left promiscuous mode [ 724.019315][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.027121][ T312] device bridge_slave_1 left promiscuous mode [ 724.033213][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.040462][ T312] device bridge_slave_0 left promiscuous mode [ 724.046784][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.055303][ T312] device veth1_macvtap left promiscuous mode [ 724.061378][ T312] device veth1_macvtap left promiscuous mode [ 724.067199][ T312] device veth0_vlan left promiscuous mode [ 724.073136][ T312] device veth1_macvtap left promiscuous mode [ 724.079079][ T312] device veth1_macvtap left promiscuous mode [ 724.084946][ T312] device veth0_vlan left promiscuous mode [ 726.571757][ T312] device bridge_slave_1 left promiscuous mode [ 726.577779][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 726.585633][ T312] device bridge_slave_0 left promiscuous mode [ 726.591754][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 726.599975][ T312] device veth1_macvtap left promiscuous mode [ 726.606043][ T312] device veth0_vlan left promiscuous mode