last executing test programs: 22.930826846s ago: executing program 2 (id=1884): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xca, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001580)={0xffffffffffffffff, 0xe0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=[0x0], 0x0, 0x64, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x100051, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000009000000000000000000000000000000002f6cb84c6bf536ac56756b6f8fca5b487c77d951dc9e273a34e3dffce8fc5488401d22a5781958cce62289f31d87b8997ab7c81323657644f2dc73da6cd48b8b18879e75b78be66f98e397621c146c458ee5fc46f6f1f25009799417e1f9640e875b955bf7b4727bbc2c9765fd532416ca650c5f35b7e622db3b805246590a0800b3d497dd993677ec79d84d0f26d565569aa085b8557c876b4a7f9899b346cf9789ada5bbfbb28eeca34fd36d0213be11f5dffd82df3ca4c33a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000001d80)=""/4096, 0x49, 0x1000, 0x0, 0x5b17, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="008000f5ffffffffffffff000000000000000000d4bbadf707d5a982ca8dd44de448fbcc58621b23b53e5388d1c8ff86025d7f646a887bdac8e14b4257ffe7b365ef41b00dcf5df8363a0709f27d852fc50466f2e02f37f4fd7fa80dbefcf6ffdc2ff58e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22ceb0152c994005, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETCARRIER(r7, 0x400454cc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 19.659775702s ago: executing program 2 (id=1884): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xca, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001580)={0xffffffffffffffff, 0xe0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=[0x0], 0x0, 0x64, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x100051, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000009000000000000000000000000000000002f6cb84c6bf536ac56756b6f8fca5b487c77d951dc9e273a34e3dffce8fc5488401d22a5781958cce62289f31d87b8997ab7c81323657644f2dc73da6cd48b8b18879e75b78be66f98e397621c146c458ee5fc46f6f1f25009799417e1f9640e875b955bf7b4727bbc2c9765fd532416ca650c5f35b7e622db3b805246590a0800b3d497dd993677ec79d84d0f26d565569aa085b8557c876b4a7f9899b346cf9789ada5bbfbb28eeca34fd36d0213be11f5dffd82df3ca4c33a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001700)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c0000000500000000000000043a16c91800000000000000050000000b000000040000000e000000010000000800000002000000005d305f00d5818739488af1269b8ea78c041c50941c381b567dadbe9fcbcfea5a9439e9e70598f766c7d81f5855bd8b92d4c4dba3288cc62d15a7b36fabf30c04e70f9eb62e19363e066263b2c171b5b17bcc7415ea0e5c2ccdfaff1418f548fa923479bc21c57da403e70318200b3fcf1f18f72e619ebf1416d35f72d38cf40cb96ae777db4ec9c45503aa455ab3d8ebf1bef51573d5553c8f9d1b7058a98ca9eb8bcaf06556761605d394a239cf1ded22087b1f8a73915dd1a7418a5e0806"], &(0x7f0000001d80)=""/4096, 0x49, 0x1000, 0x0, 0x5b17, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="008000f5ffffffffffffff000000000000000000d4bbadf707d5a982ca8dd44de448fbcc58621b23b53e5388d1c8ff86025d7f646a887bdac8e14b4257ffe7b365ef41b00dcf5df8363a0709f27d852fc50466f2e02f37f4fd7fa80dbefcf6ffdc2ff58e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22ceb0152c994005, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETCARRIER(r7, 0x400454cc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 16.473641208s ago: executing program 2 (id=1884): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xca, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001580)={0xffffffffffffffff, 0xe0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=[0x0], 0x0, 0x64, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x100051, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000009000000000000000000000000000000002f6cb84c6bf536ac56756b6f8fca5b487c77d951dc9e273a34e3dffce8fc5488401d22a5781958cce62289f31d87b8997ab7c81323657644f2dc73da6cd48b8b18879e75b78be66f98e397621c146c458ee5fc46f6f1f25009799417e1f9640e875b955bf7b4727bbc2c9765fd532416ca650c5f35b7e622db3b805246590a0800b3d497dd993677ec79d84d0f26d565569aa085b8557c876b4a7f9899b346cf9789ada5bbfbb28eeca34fd36d0213be11f5dffd82df3ca4c33a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000001d80)=""/4096, 0x49, 0x1000, 0x0, 0x5b17, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="008000f5ffffffffffffff000000000000000000d4bbadf707d5a982ca8dd44de448fbcc58621b23b53e5388d1c8ff86025d7f646a887bdac8e14b4257ffe7b365ef41b00dcf5df8363a0709f27d852fc50466f2e02f37f4fd7fa80dbefcf6ffdc2ff58e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22ceb0152c994005, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETCARRIER(r7, 0x400454cc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 9.708831521s ago: executing program 2 (id=1884): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xca, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001580)={0xffffffffffffffff, 0xe0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=[0x0], 0x0, 0x64, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x100051, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000009000000000000000000000000000000002f6cb84c6bf536ac56756b6f8fca5b487c77d951dc9e273a34e3dffce8fc5488401d22a5781958cce62289f31d87b8997ab7c81323657644f2dc73da6cd48b8b18879e75b78be66f98e397621c146c458ee5fc46f6f1f25009799417e1f9640e875b955bf7b4727bbc2c9765fd532416ca650c5f35b7e622db3b805246590a0800b3d497dd993677ec79d84d0f26d565569aa085b8557c876b4a7f9899b346cf9789ada5bbfbb28eeca34fd36d0213be11f5dffd82df3ca4c33a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000001d80)=""/4096, 0x49, 0x1000, 0x0, 0x5b17, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="008000f5ffffffffffffff000000000000000000d4bbadf707d5a982ca8dd44de448fbcc58621b23b53e5388d1c8ff86025d7f646a887bdac8e14b4257ffe7b365ef41b00dcf5df8363a0709f27d852fc50466f2e02f37f4fd7fa80dbefcf6ffdc2ff58e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22ceb0152c994005, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETCARRIER(r7, 0x400454cc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 4.597191907s ago: executing program 2 (id=1884): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xca, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001580)={0xffffffffffffffff, 0xe0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=[0x0], 0x0, 0x64, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x100051, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000009000000000000000000000000000000002f6cb84c6bf536ac56756b6f8fca5b487c77d951dc9e273a34e3dffce8fc5488401d22a5781958cce62289f31d87b8997ab7c81323657644f2dc73da6cd48b8b18879e75b78be66f98e397621c146c458ee5fc46f6f1f25009799417e1f9640e875b955bf7b4727bbc2c9765fd532416ca650c5f35b7e622db3b805246590a0800b3d497dd993677ec79d84d0f26d565569aa085b8557c876b4a7f9899b346cf9789ada5bbfbb28eeca34fd36d0213be11f5dffd82df3ca4c33a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000001d80)=""/4096, 0x49, 0x1000, 0x0, 0x5b17, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="008000f5ffffffffffffff000000000000000000d4bbadf707d5a982ca8dd44de448fbcc58621b23b53e5388d1c8ff86025d7f646a887bdac8e14b4257ffe7b365ef41b00dcf5df8363a0709f27d852fc50466f2e02f37f4fd7fa80dbefcf6ffdc2ff58e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22ceb0152c994005, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETCARRIER(r7, 0x400454cc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 2.553052187s ago: executing program 1 (id=2378): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x40, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x40, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0x7, 0x0, &(0x7f0000000200)="63eced8e46dc3f", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800030400000000000000", @ANYRES16=r0, @ANYRES16, @ANYRESHEX=r2, @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800030400000000000000", @ANYRES16=r0, @ANYRES16, @ANYRESHEX=r2, @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1f, 0x1, 0x2, &(0x7f0000000680)) r3 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000010000000, 0x8}}) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10000010000000, 0x8}}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) (async) write$cgroup_type(r4, &(0x7f0000000180), 0x40001) 2.551842857s ago: executing program 4 (id=2380): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000f4ffffffffffffff00000000000000000000dba8c8140cf1d8e4e0a293e1b3d53acbeb47f5cb6d423d6c31907f67a3346e94de9b81e5b4c62a01aa684a0bdbe314e8"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(r1, &(0x7f00000006c0)={&(0x7f0000000180)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000200)=[{&(0x7f00000002c0)="ef58095795309a51a0b1fac1b456be0c2477a3ddb221e17f009ff9e8ac400e9ab1bcb417da3ff4464f97b5d7c8992123c6e15c4d379e6a9b811855f7b53cb7d08cfc54a45442c6686b48a7fedd6e3bd53238eb1d3b0484ba16887e136e197088e02dc9293f8b2e", 0x67}, {&(0x7f0000000340)="39ab9c30cadde260fbb20a1b2ff0c0cb08fe2004267e8af4d0c10f5650a120b75b454f4580eac520d073785e07aa69e3cb870499764c48b076824acce86fbafdb66a242e320f9be9c5b777d60140d3e55027214bae15376f2a33", 0x5a}, {&(0x7f00000004c0)="4a806e47acf1f8c5421ce6ef084a06f130f91ad4f4785448c6a4ba65d2903421e0c8976898bb726fb381fab78f6d1a6b39eb1b1d7d2db5b58fdf31d767f9cedea3cd08cfe7de12c1ab8f08f6ff2654b8cb818622b99a20189698c8fd2fa7b5d17869e01699917721f9eb28a123fb33dda6ce6f59a792f0d74ddba12b7fb95d005a75c5641e983c44168b8706504a62267907e9b3f34dcfbe9c45d47dbaf7350ed010757520114a3625cd937daa5c4571f15f47a430a9b469d25c92dd4ed6df629025fe84c852ee289832fc993ca74e847105b28d1695c8c23e4c489d34d9d83783772c44ad7e59b9", 0xe8}, {&(0x7f00000003c0)="338054fa7d4f3a646ba1d2eb53518effa18432f9fa1d95b27eb99fb6515c978add7cb905530abafa4e29cce01a2b91c1351aac2d87afe80dc926912384fd78ae56c4b1500f87bc8b853c7df9bee2ac79c6def18599a3b5e3d5f988efe991d6c97df50cb85aa70dd06c91f00681c10043e3dcd9", 0x73}], 0x4, &(0x7f0000000680)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffffff18}}], 0x18}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000240)={0x2, &(0x7f00000001c0)=[{0x30, 0x0, 0x0, 0xfffff004}, {0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='wbt_stat\x00', r0, 0x0, 0x8000}, 0x18) 2.370849908s ago: executing program 0 (id=2384): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000012c0)='workqueue_activate_work\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r4) 2.370311358s ago: executing program 1 (id=2385): openat$tun(0xffffffffffffff9c, 0x0, 0x701a00, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b70300000000000085000000720000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[0x0], 0x0, 0x0, 0x86, &(0x7f0000000500), 0x0, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe2, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r2, @ANYRES32=r2, @ANYRESHEX=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0xb, 0x5, 0x400, 0xa, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000880)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000020000000000000001000004000000000000000002000000000000000000000000000003000000000300000001000000000000000000e1432cbd4802d2366cf2c03d75a3c01b5ac168e5e9895bda4d508fca73e78ad4060c521aac39f82dab2e8b4f84b4b49b8aab693d1d0c9ac8014e81f5b7f20fae4b4cff715b58688354d506e80c6b39960cc967c2481f7a410eb98a585ec9dc286bbf5e21c6038cf841334e03c5f671f461130fd2ba8d56092f0990f2fe8271be70e275b6a0dc9dc1d6516893f2cdf5f83aec9041fdc0440595350b4fb90ff5"], 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0a00000004000000040000000c"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000100)='!=u&\t0|\t\t') socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001340)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x57, 0x57, 0x7, [@ptr={0x5, 0x0, 0x0, 0x2, 0x5}, @ptr={0x10, 0x0, 0x0, 0x2, 0x2}, @enum={0x10}, @restrict={0xf}, @datasec={0x1, 0x1, 0x0, 0xf, 0x3, [{0x2, 0x3, 0x1}], "896850"}, @fwd={0xb}]}, {0x0, [0x2e, 0x0, 0x30, 0x30, 0x0]}}, &(0x7f0000001480)=""/167, 0x77, 0xa7, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.257698528s ago: executing program 0 (id=2386): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x2d0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc250d40f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c9837d5ac03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce935b0f327cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a9b893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1525320e716660000000000b02b001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d3294000000000000000000000000000000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c5452f42e09b388a14b22bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1c77a211bfa02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0843b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730302b66cf8aeb1f98bd67bfd38ec2beac3ca99f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94d81150c68ab27987655e1dd676ceef54ad4d663f88b6f82a65f7c94a0e40cbb782ff536bd67ba81125f8e0af199094b407f630dc6eb3b79615a4e63f75ab30b1e475748cb5dce6581dc92f740a21fb8dec725b4f2a0b0972f852504245d5ce11cfdead09c9b6e094261084cd20c2294525061a4638c0bfd08dfa70d24bf85d9cfd940e1a4f1509bed8233f22506e5b000000000000862a01def6c9e879a87688ad151c14ae7ff8a090aebe7e4f936c26e565ae96d38ee5f794468caa17419e22ff13df60a95596490358a3b8121511e427d619ad87fe998702ea0b659eff3f5cd8f4094fdd6b1d45facfe6629846170d99de670a9e72e21ed7363876612bf58a17142abccbbe4762f531067f92af24f5354f432ed1df74f8168d05de528f63a98bca22820439c567973de0077c068d1b70b6"], &(0x7f0000000080)='GPL\x00', 0x5, 0x2d0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x74, 0x0, 0x0, 0x10, &(0x7f0000000580), &(0x7f0000000680), 0x8, 0x44, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000001e4f5eac00f8006cff74a3d3290000000000003051bbdae1eb5d7ceaffc36bd5b684bc3a958612a19ef545def453a2000006a2e235df906c7647aa369b6edfd28becfbe6c7ffe7619ec95f264c0dabec0076440d4ead44ec09c8805de70cdea86b1410002d3ff962c5e55ded1002f5b93417304d2c13a2495c34531b2f0000000000"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r3, 0x58, &(0x7f0000000180)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r3, 0x58, &(0x7f0000000180)}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.101531319s ago: executing program 0 (id=2387): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) sendmsg$inet(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfc, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001340)="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", 0xe82}], 0x1, 0x0, 0x0, 0x20008040}, 0x1) recvmsg(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) close(r0) sendmsg$inet(r1, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.094555849s ago: executing program 4 (id=2388): bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1c00000000000000000000000000000018110000", @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00001000bfa200000000000007020900f8ffffffb703000008000000b7040004f6ff0000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="090000000800002cbebcbe6e6532675d99f4d43c4a00010000000000", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="060600000500000000200b53ae4c0000000000006793adb1376ff0d30da7ee9ea79f8aeebe5d200c5258640f0fb54aa937da2f2768c82fb69c8229338272dbfe7baa176d9deb9ccd87b9756a0bc96d2dd149361ec4f76cac4416f20fa8b0f61200d4cff0bdf1ca300a80e0", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)=@generic={0x0, r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000fcff000000000080000000200000", @ANYRES32, @ANYBLOB="0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\a\x00'/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='blkio.bfq.io_queued_recursive\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000080"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x110094, 0x0, 0x4000, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @random="000000000100"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r8, &(0x7f0000000340)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000fcffffff000000000000210085000000360000009500070000000000b83f3584230b8f5ec8921327291cf4880dd3a91af830f8a476ba1b51d4eb67103b000000000000000000000000000000640f9922d207e93470686f20ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xffe, &(0x7f000062b000)=""/4094, 0x0, 0x1, '\x00', 0x0, @xdp, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r12, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0xc00d, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.87139569s ago: executing program 1 (id=2390): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000dfffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000004cc0)={0x1, 0x44, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0xbbd0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r3, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xa3, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x6, 0x1, 0x7ff, 0x480, r0, 0x7, '\x00', r6, r5, 0x1, 0x1, 0x0, 0x7, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0x58, &(0x7f0000001780)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x11, 0xa, 0x0, 0x0) 1.628761051s ago: executing program 1 (id=2391): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x8, 0x96, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0xae, &(0x7f00000004c0)=""/174, 0x40f00, 0x4a, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x1, 0x1, 0xffff}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000008c0)=[r0, r0, r0, r0, r0, r2], &(0x7f0000000900)=[{0x0, 0x4, 0x0, 0x4}, {0x1, 0x4, 0xc, 0x9}, {0x1, 0x5, 0x7, 0x1}, {0x5, 0x3, 0x7, 0x8}, {0x1, 0x1, 0x0, 0xc}, {0x5, 0x5, 0xa, 0x4}], 0x10, 0x9, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) write$cgroup_subtree(r3, 0x0, 0x44) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x154}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='fsi_master_gpio_in\x00', r4, 0x0, 0x8}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 1.549010422s ago: executing program 4 (id=2392): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000030000008000"/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) close(r7) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r8 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000440)={r8, 0x0, 0x11, 0x0, &(0x7f0000000600)="61df712bc884fef053a7a9a26e9b722780", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) close(0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000440)={r9, 0x0, 0x11, 0x0, &(0x7f0000000600)="61df712bc884fef053a7a9a26e9b722780", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r11}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907081175f37538e486dd"], 0xfdef) 1.404255013s ago: executing program 3 (id=2393): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="180200001000000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000087000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff2e, &(0x7f0000000040)=""/210, 0x0, 0xf00, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) 1.403856523s ago: executing program 3 (id=2394): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) 1.285247063s ago: executing program 3 (id=2395): openat$ppp(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="9feb010018000000000000007800000078000000070000000400000000000007000000000000000008000005ffff000005f6fffd008ea8000000020000000600000003000000ff000000090000000000000004000000100000000300000005000000010000000100000000000000070000000300000000000000010000009d00000040000000100000000000000010000000000000005f6100"], &(0x7f0000000540)=""/246, 0x97, 0xf6, 0x1, 0x0, 0x0, @void, @value}, 0x28) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c40)={r0, 0x58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x13, &(0x7f00000009c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb9cc}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a80)='syzkaller\x00', 0x1, 0xea, &(0x7f0000000ac0)=""/234, 0x40f00, 0x14, '\x00', r4, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c80)=[r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000cc0)=[{0x3, 0x1, 0xd, 0x5}, {0x4, 0x2, 0xf, 0x5}], 0x10, 0x8, @void, @value}, 0x94) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={r0, 0x58, &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000010c0)={r0}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001180)={{r0, 0xffffffffffffffff}, &(0x7f0000001100), &(0x7f0000001140)=r0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001240)=@bpf_ext={0x1c, 0x1d, &(0x7f0000001580)=ANY=[@ANYBLOB="186a0000b510df830400000000000000090000009581500001000000185000000d000000000029934122abaf4e96000000000000000000006bc2e90942bd4253937eafaade8f977ca7d4e186540fc5d9fe8019a069e67f6eb9e0fc59c768ec37cf", @ANYRES32=r7, @ANYBLOB="000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000820000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000"], &(0x7f0000000780)='GPL\x00', 0x4f, 0x75, &(0x7f0000000f40)=""/117, 0x41000, 0x27, '\x00', r6, 0x0, r2, 0x8, &(0x7f0000001040)={0x3, 0x7}, 0x8, 0x10, &(0x7f0000001080)={0x4, 0x4, 0x1007, 0x2}, 0x10, 0x1c2f, r5, 0x4, &(0x7f00000011c0)=[r0, r0, r7, r2, r0, r0, r0, r0], &(0x7f0000000e80)=[{0x0, 0x2, 0x5, 0x8}, {0x5, 0x2, 0x2, 0xb}, {0x4, 0x5, 0x9, 0x7}, {0x1, 0x1}], 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095757a576f2c2cf5866486a9deb4f42ec9512af3274be119a85d2ecf285ab8aa4055216a6dba38a482c30c7be4cf80a63651fa635eb4874f43f22335592cc3ad244d7eac5ea873b500a6c6c16cfdb219f7ae192e65506dfa397ee754b02d9b1ec8287b7b528f11a1e200f8f50d27f70614b48e89545974812a5693f5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r10 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, r10, 0x0, 0x4, &(0x7f0000000180)='*\xe4-\x00'}, 0x30) perf_event_open(&(0x7f0000001340)={0x2, 0x80, 0x6, 0x8, 0x40, 0x86, 0x0, 0x3, 0x20008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, @perf_bp={&(0x7f0000001300)}, 0x452, 0x9, 0x7, 0x5, 0x1ff, 0x5, 0x9, 0x0, 0x82be, 0x0, 0x80}, r11, 0xffffffffffffffff, r9, 0x1) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r0, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7, &(0x7f00000001c0)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x93, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0x37, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000940)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x5, '\x00', r12, r0, 0x3, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x3}) ioctl$TUNGETDEVNETNS(r13, 0x8982, 0x20000000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000740)={'vlan0\x00', 0x2}) 1.056035854s ago: executing program 0 (id=2396): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000210000000500020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xb, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0x18, 0x0, &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x0, 0x4, 0x0, 0x4}, {0x4, 0x3}], 0x10, 0x8, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB='-'], 0x44) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="ad1f906aae28", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xb, 0x42, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffff, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r7}, 0x38) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000240)={r7, &(0x7f0000000100), 0x0}, 0x20) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) 905.443455ms ago: executing program 1 (id=2397): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="b405000000000000791072000000000007000000000000009500000000100000cddcbc0997018ec30758a604d03e704a5dd9e89deda75de0901a053f95487cd70faf7566f9639a41a3f36a0551e6a6798d4cb60cd4ec3d40fceb32560000d4feea461812323473b8c7befefab155028041d8"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x6, 0x8}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r0, r1}, 0xc) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1b}, 0x1000, 0xc8, 0x0, 0x0, 0x0, 0x8, 0x100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') (async) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) (async) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) (async) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r7, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f00000008c0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00000000db5b686158bbcfe8875a0603000011230000ff000000000000000000ac1414aa3b200007", @ANYRES64], 0xfe15) (async) write$cgroup_subtree(r10, &(0x7f00000008c0)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00000000db5b686158bbcfe8875a0603000011230000ff000000000000000000ac1414aa3b200007", @ANYRES64], 0xfe15) bpf$PROG_LOAD(0x5, 0x0, 0x0) 892.163695ms ago: executing program 0 (id=2398): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x28bb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 822.991415ms ago: executing program 4 (id=2399): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x5, 0x5, 0xa6, 0xbd, 0x0, 0xfffffffffffffff7, 0xc88, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0xfff, 0x7fffffff}, 0x14000, 0x45, 0x7, 0x4, 0x7, 0x6, 0x6, 0x0, 0x6, 0x0, 0x8}, r3, 0x9, r1, 0xb) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='hrtimer_init\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x327abfb181a5388f) 766.008366ms ago: executing program 3 (id=2400): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYRESOCT=0x0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='btrfs_convert_extent_bit\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r1, 0x40047451, 0x2000000c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0600000004000000040100000c00000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000b970318b3eb0a71ebbdb0700778865968bea3bafd1ac5602921331bd1267a1fa943747bdffbf10fefe29eef2db03052b19fa9c919b4ea813b310b061bb82de4c75934a019d5a12e052a9d264563f1630b626f5dedd542a111d09026f23b80d94580d1fbdb8533221de37660b80e5ac0679cc93f806b73b529ca33f065f45cd958c20622fe6b0f51e4f43e9a35a0965899d8d3e7eb8db577156d94c9826f7f801856d55b9ab51e79a972c62887d8580a7bc437ec60409ec19df7b2daa29", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000c5e28a2b7c0c4b988ed9", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000ff800000000000000000000004000020bb7f1a006600efffff9000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb0, @void, @value}, 0x4c) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0x7, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="00da923e864799027501b85c5400000000000000b70200000000e50085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='ext4_discard_blocks\x00', r5}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0xffffffa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x8000000000000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0x2c, &(0x7f0000000b40)=ANY=[@ANYRES16=r2, @ANYRES32, @ANYBLOB="000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f0ffffff8500000006000000183b000001000000000000000000000018110000", @ANYRESDEC, @ANYBLOB="0000000000000000b70200000000000085000000860000001801000020786c2500000000002020207b0000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100000085000000060000009500"/160], &(0x7f0000000180)='GPL\x00', 0xfffffffc, 0xaa, &(0x7f00000007c0)=""/170, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4b16, r4, 0x0, &(0x7f0000000680), 0x0, 0x10, 0x7, @void, @value}, 0x94) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000001c0), 0xffffffffffffff20) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00$\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r6}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff", @ANYRES32=r6, @ANYBLOB], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[], 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) r11 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r11}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) 765.410256ms ago: executing program 1 (id=2401): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) sendmsg$inet(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfc, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001340)="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", 0xe82}], 0x1, 0x0, 0x0, 0x20008040}, 0x1) recvmsg(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) close(r0) sendmsg$inet(r1, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 735.699416ms ago: executing program 0 (id=2402): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) sendmsg$inet(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfc, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000180)='workqueue_activate_work\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r7, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001340)="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", 0xe82}], 0x1, 0x0, 0x0, 0x20008040}, 0x1) recvmsg(r8, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) close(r0) sendmsg$inet(r1, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 564.070217ms ago: executing program 3 (id=2403): bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0100000004000000090000000500000008820000", @ANYRES32, @ANYBLOB="0900000000000000e7ffffff000000feff0000752a6a445f0095f9daedb17d3f77d3f142041377083905971d21e286cdb89deeb1fae0287fbceec8bfb4b6e981dbc6997e2975cca6153a8989679766e2c39ac25c3f6ca7a4daa6b7dc1deb03174428d2c0e43ae867b5b7021aa6ce6e2bb4b43a660393ecfdb854ec86e1c38db82fd6d26cde790d9268bcae2bd43f88c4bf945df3f49b8a3629d3b7a69f02cd492c250c7a14", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1700000000000000006c00000188d40000000000049bb291b386ce414d3e597a8c", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b10000fb5ad86bc8d5175275b8e0952fe81a37b9ef0cc4bc5637e8bb77f158fdfee880096ced88b5986e177175c63a216ff4af61551a766b544f87a504de727c978e798b1e153502d4c608ce3080720c495fb5d8a1ca43a800a578962b26e0462e3a3430ee9cfbbc8b03ddb766cfda7dae0478d75626d05aba09331db8e4dc320ee84b58000000000000609a1a1f4c5db45af6e3c8631bc4a63f38fe", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r1, 0x0, 0x20000000}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) close(0xffffffffffffffff) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='kmem_cache_free\x00', r4}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0xa2041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r8, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0xa68}, 0x28) 487.112617ms ago: executing program 4 (id=2404): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000dfffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000004cc0)={0x1, 0x44, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0xbbd0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r3, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000640)=[{}], 0x8, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xa3, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x6, 0x1, 0x7ff, 0x480, r0, 0x7, '\x00', r6, r5, 0x1, 0x1, 0x0, 0x7, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)=@o_path={0x0, 0x0, 0x4000}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0x58, &(0x7f0000001780)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000000)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x8}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x11, 0xa, 0x0, 0x0) 289.048008ms ago: executing program 3 (id=2405): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x10100) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x3}, 0x0) 137.998169ms ago: executing program 4 (id=2406): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x20, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a40)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x9, 0xffff, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000140), 0x0}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x1, 0x42, 0x6, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r5}, &(0x7f0000000580), &(0x7f00000005c0)=r4}, 0x20) socketpair(0x15, 0x2, 0x5, &(0x7f0000000080)) socketpair(0x2, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={r6, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x429, 0x3, 0x10004, 0x2, r0, 0x800, '\x00', r7, r8, 0x5, 0x2, 0x0, 0x2, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000280)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x13, 0xffff, 0x80000000, 0x467a, 0x40054, r6, 0x8, '\x00', r7, r8, 0x4, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r10, 0x0, &(0x7f0000000bc0)=""/146}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r9}, &(0x7f0000000540), &(0x7f0000000580)=r11}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r9, &(0x7f00000001c0)="35614e5a3321ea3e3f62f4d64755eec3fad4e816e7708f060d289e9630ac05a4bf6f6d7af6de9dd85d473b9cc0a291535bd6cbc71482c4bf780097c5a291c947b9ea61bbfc84a9ad4c8069f06617b6e2ce38905621df21cd94205b04369cb9f5363251230557", &(0x7f0000000c80)=""/236, 0x4}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x10}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8000002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r9, &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000063010c0000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 0s ago: executing program 2 (id=1884): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x8100, 0xca, 0xffffffff, 0x0, 0x0, 0x341}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001580)={0xffffffffffffffff, 0xe0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001840)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=[0x0], 0x0, 0x64, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x100051, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000009000000000000000000000000000000002f6cb84c6bf536ac56756b6f8fca5b487c77d951dc9e273a34e3dffce8fc5488401d22a5781958cce62289f31d87b8997ab7c81323657644f2dc73da6cd48b8b18879e75b78be66f98e397621c146c458ee5fc46f6f1f25009799417e1f9640e875b955bf7b4727bbc2c9765fd532416ca650c5f35b7e622db3b805246590a0800b3d497dd993677ec79d84d0f26d565569aa085b8557c876b4a7f9899b346cf9789ada5bbfbb28eeca34fd36d0213be11f5dffd82df3ca4c33a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000001d80)=""/4096, 0x49, 0x1000, 0x0, 0x5b17, 0x10000, @value}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="008000f5ffffffffffffff000000000000000000d4bbadf707d5a982ca8dd44de448fbcc58621b23b53e5388d1c8ff86025d7f646a887bdac8e14b4257ffe7b365ef41b00dcf5df8363a0709f27d852fc50466f2e02f37f4fd7fa80dbefcf6ffdc2ff58e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22ceb0152c994005, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$TUNSETCARRIER(r7, 0x400454cc, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 70.279002][ T1207] CPU: 0 PID: 1207 Comm: syz.4.252 Not tainted 5.15.167-syzkaller-00002-g3bfe08931bff #0 [ 70.288646][ T1207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 70.298537][ T1207] Call Trace: [ 70.301668][ T1207] [ 70.304441][ T1207] dump_stack_lvl+0x151/0x1c0 [ 70.308952][ T1207] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 70.314598][ T1207] ? io_uring_drop_tctx_refs+0x190/0x190 [ 70.320066][ T1207] ? __wake_up_klogd+0xd5/0x110 [ 70.324754][ T1207] dump_stack+0x15/0x20 [ 70.328743][ T1207] should_fail+0x3c6/0x510 [ 70.333001][ T1207] should_fail_usercopy+0x1a/0x20 [ 70.337868][ T1207] _copy_from_user+0x20/0xd0 [ 70.342288][ T1207] __sys_bpf+0x1e9/0x760 [ 70.346364][ T1207] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 70.351663][ T1207] ? debug_smp_processor_id+0x17/0x20 [ 70.356867][ T1207] __x64_sys_bpf+0x7c/0x90 [ 70.361114][ T1207] x64_sys_call+0x87f/0x9a0 [ 70.365454][ T1207] do_syscall_64+0x3b/0xb0 [ 70.369708][ T1207] ? clear_bhb_loop+0x35/0x90 [ 70.374222][ T1207] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 70.379949][ T1207] RIP: 0033:0x7fac89ce8719 [ 70.384200][ T1207] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.403641][ T1207] RSP: 002b:00007fac88961038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 70.411887][ T1207] RAX: ffffffffffffffda RBX: 00007fac89e9ff80 RCX: 00007fac89ce8719 [ 70.419696][ T1207] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 0000000000000000 [ 70.427508][ T1207] RBP: 00007fac88961090 R08: 0000000000000000 R09: 0000000000000000 [ 70.435318][ T1207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.443131][ T1207] R13: 0000000000000000 R14: 00007fac89e9ff80 R15: 00007ffe6fd2b0a8 [ 70.450951][ T1207] [ 73.609741][ T1251] FAULT_INJECTION: forcing a failure. [ 73.609741][ T1251] name failslab, interval 1, probability 0, space 0, times 1 [ 73.647410][ T1251] CPU: 1 PID: 1251 Comm: syz.0.266 Not tainted 5.15.167-syzkaller-00002-g3bfe08931bff #0 [ 73.657053][ T1251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 73.666945][ T1251] Call Trace: [ 73.670072][ T1251] [ 73.672848][ T1251] dump_stack_lvl+0x151/0x1c0 [ 73.677362][ T1251] ? io_uring_drop_tctx_refs+0x190/0x190 [ 73.682831][ T1251] dump_stack+0x15/0x20 [ 73.686825][ T1251] should_fail+0x3c6/0x510 [ 73.691074][ T1251] __should_failslab+0xa4/0xe0 [ 73.695673][ T1251] should_failslab+0x9/0x20 [ 73.700011][ T1251] slab_pre_alloc_hook+0x37/0xd0 [ 73.704788][ T1251] __kmalloc+0x6d/0x270 [ 73.708778][ T1251] ? bpf_map_meta_alloc+0x1cc/0x8b0 [ 73.713810][ T1251] ? __fdget+0x1bc/0x240 [ 73.717893][ T1251] bpf_map_meta_alloc+0x1cc/0x8b0 [ 73.722755][ T1251] array_of_map_alloc+0x38/0xc0 [ 73.727438][ T1251] map_create+0x411/0x2050 [ 73.731694][ T1251] __sys_bpf+0x296/0x760 [ 73.735771][ T1251] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 73.740982][ T1251] ? debug_smp_processor_id+0x17/0x20 [ 73.746195][ T1251] __x64_sys_bpf+0x7c/0x90 [ 73.750441][ T1251] x64_sys_call+0x87f/0x9a0 [ 73.754776][ T1251] do_syscall_64+0x3b/0xb0 [ 73.759030][ T1251] ? clear_bhb_loop+0x35/0x90 [ 73.763545][ T1251] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 73.769272][ T1251] RIP: 0033:0x7f7538ea9719 [ 73.773527][ T1251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.793577][ T1251] RSP: 002b:00007f7537b22038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 73.801820][ T1251] RAX: ffffffffffffffda RBX: 00007f7539060f80 RCX: 00007f7538ea9719 [ 73.809634][ T1251] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 0000000000000000 [ 73.817445][ T1251] RBP: 00007f7537b22090 R08: 0000000000000000 R09: 0000000000000000 [ 73.825254][ T1251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.833063][ T1251] R13: 0000000000000000 R14: 00007f7539060f80 R15: 00007fffcb5a2ff8 [ 73.840883][ T1251] [ 74.346900][ T1264] device veth1_macvtap left promiscuous mode [ 74.814993][ T1280] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.834698][ T30] audit: type=1400 audit(1731595380.790:127): avc: denied { create } for pid=1283 comm="syz.2.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 74.915699][ T30] audit: type=1400 audit(1731595380.870:128): avc: denied { create } for pid=1287 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 75.166881][ T30] audit: type=1400 audit(1731595380.900:129): avc: denied { create } for pid=1287 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 77.995852][ C1] sched: RT throttling activated [ 78.142607][ T1340] device sit0 left promiscuous mode [ 78.160342][ T1345] device sit0 entered promiscuous mode [ 78.240084][ T1354] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.710338][ T1366] syz.1.298[1366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.710412][ T1366] syz.1.298[1366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.806302][ T1366] : renamed from vlan0 [ 79.044866][ T30] audit: type=1400 audit(1731595385.000:130): avc: denied { ioctl } for pid=1382 comm="syz.4.306" path="socket:[19058]" dev="sockfs" ino=19058 ioctlcmd=0x54da scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 79.246091][ T1393] device veth0_vlan left promiscuous mode [ 79.280602][ T1393] device veth0_vlan entered promiscuous mode [ 79.432241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.440330][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 79.447792][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.690969][ T1401] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.697990][ T1401] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.187804][ T1427] syz.0.318[1427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.187873][ T1427] syz.0.318[1427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.316871][ T30] audit: type=1400 audit(1731595386.280:131): avc: denied { create } for pid=1439 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 81.175822][ T1472] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.182851][ T1472] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.683023][ T1491] syz.2.336[1491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.683083][ T1491] syz.2.336[1491] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.360072][ T1520] device wg2 left promiscuous mode [ 82.860448][ T30] audit: type=1400 audit(1731595388.820:132): avc: denied { create } for pid=1536 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 82.941829][ T1540] syz.4.353[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.941900][ T1540] syz.4.353[1540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.192307][ T1423] syz.1.313 (1423) used greatest stack depth: 21752 bytes left [ 84.422472][ T30] audit: type=1400 audit(1731595390.380:133): avc: denied { write } for pid=1590 comm="syz.4.367" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 84.593421][ T1597] syz.3.369[1597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.593492][ T1597] syz.3.369[1597] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.826313][ T1605] : renamed from vlan0 [ 85.699842][ T30] audit: type=1400 audit(1731595391.660:134): avc: denied { create } for pid=1624 comm="syz.3.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 86.012064][ T30] audit: type=1400 audit(1731595391.890:135): avc: denied { create } for pid=1624 comm="syz.3.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.174073][ T1630] device syzkaller0 entered promiscuous mode [ 86.527445][ T30] audit: type=1400 audit(1731595392.490:136): avc: denied { write } for pid=1636 comm="syz.4.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 86.721849][ T1648] syz.2.385[1648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.721918][ T1648] syz.2.385[1648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.043619][ T30] audit: type=1400 audit(1731595393.000:137): avc: denied { read } for pid=1672 comm="syz.3.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 87.976403][ T1698] syz.1.400[1698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.976476][ T1698] syz.1.400[1698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.770963][ T30] audit: type=1400 audit(1731595394.730:138): avc: denied { create } for pid=1717 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.866922][ T30] audit: type=1400 audit(1731595394.730:139): avc: denied { setopt } for pid=1717 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 89.148334][ T1731] syz.4.412[1731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.148411][ T1731] syz.4.412[1731] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.277861][ T30] audit: type=1400 audit(1731595395.240:140): avc: denied { ioctl } for pid=1735 comm="syz.1.413" path="socket:[20175]" dev="sockfs" ino=20175 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 90.229258][ T1777] : renamed from vlan1 [ 90.346640][ T1788] syz.3.426[1788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.346710][ T1788] syz.3.426[1788] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.381726][ T30] audit: type=1400 audit(1731595396.340:141): avc: denied { create } for pid=1783 comm="syz.0.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 91.949315][ T1865] syz.4.450[1865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.949389][ T1865] syz.4.450[1865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.319487][ T1882] syz.3.465[1882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.436922][ T1882] syz.3.465[1882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.637764][ T1891] syz.1.468[1891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.705056][ T1891] syz.1.468[1891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.210428][ T1937] syz.1.474[1937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.376661][ T1937] syz.1.474[1937] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.581597][ T1990] syz.1.489[1990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.808659][ T1990] syz.1.489[1990] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.819081][ T2015] syz.3.497[2015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.865196][ T2015] syz.3.497[2015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.181801][ T2057] syz.4.508[2057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.376133][ T2057] syz.4.508[2057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.659110][ T2079] syz.4.512[2079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.737949][ T2079] syz.4.512[2079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.848251][ T2088] device sit0 entered promiscuous mode [ 106.664134][ T2134] device veth0_vlan left promiscuous mode [ 106.783784][ T2134] device veth0_vlan entered promiscuous mode [ 106.915608][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.923737][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 107.082089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 110.193913][ T2182] syz.4.543[2182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.193981][ T2182] syz.4.543[2182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.857586][ T2232] syz.3.559[2232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.868841][ T2232] syz.3.559[2232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.916499][ T2269] syz.2.575[2269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.056989][ T2269] syz.2.575[2269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.481859][ T2326] syz.3.589[2326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.596678][ T2326] syz.3.589[2326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.098917][ T2335] syz.1.601[2335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.200765][ T2329] device sit0 left promiscuous mode [ 120.219466][ T2335] syz.1.601[2335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.428790][ T2334] device sit0 entered promiscuous mode [ 122.453689][ T2364] device sit0 left promiscuous mode [ 126.370815][ T2405] syz.3.607[2405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.370886][ T2405] syz.3.607[2405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.455948][ T2422] device sit0 entered promiscuous mode [ 128.055313][ T2428] device pim6reg1 entered promiscuous mode [ 128.156327][ T2428] syz.3.614 uses obsolete (PF_INET,SOCK_PACKET) [ 128.656145][ T2441] syz.4.619[2441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.656223][ T2441] syz.4.619[2441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.384512][ T2461] device veth0_vlan left promiscuous mode [ 129.463683][ T2461] device veth0_vlan entered promiscuous mode [ 129.601266][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.653983][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 129.724677][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 129.929656][ T2471] device sit0 left promiscuous mode [ 130.348747][ T2490] syz.3.631[2490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.348817][ T2490] syz.3.631[2490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.473937][ T2526] syz.3.642[2526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.566581][ T2526] syz.3.642[2526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.009953][ T2577] syz.3.656[2577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.146828][ T2577] syz.3.656[2577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.016299][ T2628] bond_slave_1: mtu less than device minimum [ 137.213108][ T2633] syz.2.672[2633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.213182][ T2633] syz.2.672[2633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.871117][ T2667] : renamed from vlan1 [ 141.316479][ T2695] syz.2.688[2695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.316554][ T2695] syz.2.688[2695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.667385][ T30] audit: type=1400 audit(1731595448.630:142): avc: denied { create } for pid=2724 comm="syz.1.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 143.268947][ T2748] syz.4.700[2748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.269017][ T2748] syz.4.700[2748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.004970][ T30] audit: type=1400 audit(1731595449.960:143): avc: denied { setattr } for pid=2760 comm="syz.0.705" path="pipe:[14992]" dev="pipefs" ino=14992 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 144.784246][ T2793] syz.4.713[2793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 144.794153][ T2793] syz.4.713[2793] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.857759][ T30] audit: type=1400 audit(1731595452.820:144): avc: denied { remove_name } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 146.891727][ T30] audit: type=1400 audit(1731595452.820:145): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 147.638250][ T30] audit: type=1400 audit(1731595453.600:146): avc: denied { create } for pid=2836 comm="syz.4.724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 148.583127][ T2851] syz.4.727[2851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 148.583196][ T2851] syz.4.727[2851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.503478][ T2886] syz.1.746[2886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.636962][ T2886] syz.1.746[2886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.151769][ T2892] syz.1.748[2892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.277464][ T2892] syz.1.748[2892] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.505192][ T2900] device sit0 left promiscuous mode [ 152.600599][ T2900] device sit0 entered promiscuous mode [ 153.619777][ T2925] syz.3.750[2925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.619845][ T2925] syz.3.750[2925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.387514][ T2967] syz.4.763[2967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.431841][ T2967] syz.4.763[2967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.608675][ T30] audit: type=1400 audit(1731595461.570:147): avc: denied { write } for pid=2982 comm="syz.4.769" name="cgroup.subtree_control" dev="cgroup2" ino=239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 155.643534][ T30] audit: type=1400 audit(1731595461.570:148): avc: denied { open } for pid=2982 comm="syz.4.769" path="" dev="cgroup2" ino=239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 155.936277][ T3009] syz.2.778[3009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.936349][ T3009] syz.2.778[3009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.544058][ T3044] syz.1.791[3044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.582221][ T3044] syz.1.791[3044] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.106279][ T3095] syz.0.806[3095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.136720][ T3095] syz.0.806[3095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.189905][ T3133] syz.3.821[3133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.316754][ T3133] syz.3.821[3133] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.406352][ T3180] syz.2.837[3180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.556440][ T3180] syz.2.837[3180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.836942][ T3184] device sit0 entered promiscuous mode [ 161.294083][ T3228] syz.0.855[3228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.294152][ T3228] syz.0.855[3228] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.657844][ T3242] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 161.784816][ T3242] device syzkaller0 entered promiscuous mode [ 161.922519][ T3272] syz.4.873[3272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.922592][ T3272] syz.4.873[3272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.266730][ T3325] syz.4.890[3325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.287679][ T3325] syz.4.890[3325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.616671][ T30] audit: type=1400 audit(1731595469.580:149): avc: denied { create } for pid=3343 comm="syz.3.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 163.691713][ T3352] device syzkaller0 entered promiscuous mode [ 164.313406][ T3371] syz.2.906[3371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.313475][ T3371] syz.2.906[3371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.397499][ T3376] device pim6reg1 entered promiscuous mode [ 164.694615][ T3386] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.705873][ T3386] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.866084][ T3391] device erspan0 entered promiscuous mode [ 165.324661][ T3425] syz.4.924[3425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.324732][ T3425] syz.4.924[3425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.927714][ T3464] syz.0.939[3464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.939435][ T3464] syz.0.939[3464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.788272][ T3498] syz.4.952[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.799660][ T3498] syz.4.952[3498] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.798193][ T3540] syz.0.966[3540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.841271][ T3540] syz.0.966[3540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.162705][ T3640] FAULT_INJECTION: forcing a failure. [ 170.162705][ T3640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 170.357573][ T3640] CPU: 1 PID: 3640 Comm: syz.0.1001 Not tainted 5.15.167-syzkaller-00002-g3bfe08931bff #0 [ 170.367295][ T3640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 170.377187][ T3640] Call Trace: [ 170.380310][ T3640] [ 170.383092][ T3640] dump_stack_lvl+0x151/0x1c0 [ 170.387606][ T3640] ? io_uring_drop_tctx_refs+0x190/0x190 [ 170.393070][ T3640] ? __kasan_check_write+0x14/0x20 [ 170.398021][ T3640] dump_stack+0x15/0x20 [ 170.402007][ T3640] should_fail+0x3c6/0x510 [ 170.406268][ T3640] should_fail_usercopy+0x1a/0x20 [ 170.411127][ T3640] _copy_from_user+0x20/0xd0 [ 170.415548][ T3640] sock_do_ioctl+0x229/0x5a0 [ 170.419976][ T3640] ? sock_show_fdinfo+0xa0/0xa0 [ 170.424664][ T3640] ? selinux_file_ioctl+0x3cc/0x540 [ 170.429695][ T3640] sock_ioctl+0x455/0x740 [ 170.433864][ T3640] ? sock_poll+0x400/0x400 [ 170.438125][ T3640] ? __fget_files+0x31e/0x380 [ 170.442630][ T3640] ? security_file_ioctl+0x84/0xb0 [ 170.447576][ T3640] ? sock_poll+0x400/0x400 [ 170.451829][ T3640] __se_sys_ioctl+0x114/0x190 [ 170.456344][ T3640] __x64_sys_ioctl+0x7b/0x90 [ 170.460767][ T3640] x64_sys_call+0x98/0x9a0 [ 170.465017][ T3640] do_syscall_64+0x3b/0xb0 [ 170.469274][ T3640] ? clear_bhb_loop+0x35/0x90 [ 170.473786][ T3640] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 170.479512][ T3640] RIP: 0033:0x7f7538ea9719 [ 170.483769][ T3640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 170.503211][ T3640] RSP: 002b:00007f7537b22038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 170.511454][ T3640] RAX: ffffffffffffffda RBX: 00007f7539060f80 RCX: 00007f7538ea9719 [ 170.519264][ T3640] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 000000000000000b [ 170.527077][ T3640] RBP: 00007f7537b22090 R08: 0000000000000000 R09: 0000000000000000 [ 170.534885][ T3640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 170.542698][ T3640] R13: 0000000000000000 R14: 00007f7539060f80 R15: 00007fffcb5a2ff8 [ 170.550521][ T3640] [ 172.017136][ T30] audit: type=1400 audit(1731595477.980:150): avc: denied { ioctl } for pid=3694 comm="syz.2.1020" path="pid:[4026532369]" dev="nsfs" ino=4026532369 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 172.277864][ T3707] bpf_get_probe_write_proto: 2 callbacks suppressed [ 172.277888][ T3707] syz.0.1024[3707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.310796][ T3707] syz.0.1024[3707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.685123][ T3726] FAULT_INJECTION: forcing a failure. [ 172.685123][ T3726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.747143][ T3726] CPU: 0 PID: 3726 Comm: syz.0.1031 Not tainted 5.15.167-syzkaller-00002-g3bfe08931bff #0 [ 172.756866][ T3726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 172.766763][ T3726] Call Trace: [ 172.769881][ T3726] [ 172.772671][ T3726] dump_stack_lvl+0x151/0x1c0 [ 172.777174][ T3726] ? io_uring_drop_tctx_refs+0x190/0x190 [ 172.782646][ T3726] dump_stack+0x15/0x20 [ 172.786634][ T3726] should_fail+0x3c6/0x510 [ 172.790887][ T3726] should_fail_usercopy+0x1a/0x20 [ 172.795744][ T3726] _copy_to_user+0x20/0x90 [ 172.799998][ T3726] simple_read_from_buffer+0xc7/0x150 [ 172.805210][ T3726] proc_fail_nth_read+0x1a3/0x210 [ 172.810069][ T3726] ? proc_fault_inject_write+0x390/0x390 [ 172.815534][ T3726] ? fsnotify_perm+0x269/0x5b0 [ 172.820139][ T3726] ? security_file_permission+0x86/0xb0 [ 172.825518][ T3726] ? proc_fault_inject_write+0x390/0x390 [ 172.830987][ T3726] vfs_read+0x27d/0xd40 [ 172.834978][ T3726] ? sock_show_fdinfo+0xa0/0xa0 [ 172.839664][ T3726] ? kernel_read+0x1f0/0x1f0 [ 172.844093][ T3726] ? __kasan_check_write+0x14/0x20 [ 172.849038][ T3726] ? mutex_lock+0xb6/0x1e0 [ 172.853290][ T3726] ? wait_for_completion_killable_timeout+0x10/0x10 [ 172.859717][ T3726] ? __fdget_pos+0x2e7/0x3a0 [ 172.864137][ T3726] ? ksys_read+0x77/0x2c0 [ 172.868307][ T3726] ksys_read+0x199/0x2c0 [ 172.872386][ T3726] ? vfs_write+0x1110/0x1110 [ 172.876822][ T3726] ? debug_smp_processor_id+0x17/0x20 [ 172.882017][ T3726] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 172.887922][ T3726] __x64_sys_read+0x7b/0x90 [ 172.892259][ T3726] x64_sys_call+0x28/0x9a0 [ 172.896512][ T3726] do_syscall_64+0x3b/0xb0 [ 172.900766][ T3726] ? clear_bhb_loop+0x35/0x90 [ 172.905281][ T3726] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 172.911006][ T3726] RIP: 0033:0x7f7538ea815c [ 172.915262][ T3726] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 172.934700][ T3726] RSP: 002b:00007f7537b22030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 172.942942][ T3726] RAX: ffffffffffffffda RBX: 00007f7539060f80 RCX: 00007f7538ea815c [ 172.950753][ T3726] RDX: 000000000000000f RSI: 00007f7537b220a0 RDI: 000000000000000c [ 172.958565][ T3726] RBP: 00007f7537b22090 R08: 0000000000000000 R09: 0000000000000000 [ 172.966375][ T3726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.974188][ T3726] R13: 0000000000000000 R14: 00007f7539060f80 R15: 00007fffcb5a2ff8 [ 172.982010][ T3726] [ 173.120616][ T3739] : renamed from pim6reg1 [ 173.187846][ T3751] syz.1.1038[3751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.187914][ T3751] syz.1.1038[3751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.246095][ T3791] syz.1.1055[3791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.316000][ T3791] syz.1.1055[3791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.673320][ T3808] device sit0 left promiscuous mode [ 175.039884][ T3808] device sit0 entered promiscuous mode [ 175.735260][ T3837] syz.2.1069[3837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.735334][ T3837] syz.2.1069[3837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.939971][ T3876] syz.0.1083[3876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.988681][ T3876] syz.0.1083[3876] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.281076][ T3890] bridge0: port 3(macsec0) entered blocking state [ 177.301269][ T3890] bridge0: port 3(macsec0) entered disabled state [ 177.308481][ T3890] device macsec0 entered promiscuous mode [ 177.628127][ T3924] syz.4.1100[3924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.628209][ T3924] syz.4.1100[3924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.628577][ T3916] device syzkaller0 entered promiscuous mode [ 177.837551][ T3940] gretap0: refused to change device tx_queue_len [ 178.066381][ T3960] device pim6reg1 entered promiscuous mode [ 178.264872][ T3972] syz.1.1118[3972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.264948][ T3972] syz.1.1118[3972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.833464][ T3971] device syzkaller0 entered promiscuous mode [ 179.641534][ T4017] syz.1.1134[4017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.641604][ T4017] syz.1.1134[4017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.337212][ T4061] syz.4.1150[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.350676][ T4061] syz.4.1150[4061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.537943][ T30] audit: type=1400 audit(1731595487.500:151): avc: denied { create } for pid=4072 comm="syz.3.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 182.261883][ T4111] syz.4.1168[4111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.261946][ T4111] syz.4.1168[4111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.397111][ T4113] device pim6reg1 entered promiscuous mode [ 183.288509][ T4150] syz.0.1182[4150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.288577][ T4150] syz.0.1182[4150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.051515][ T4213] syz.2.1201[4213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.091602][ T4213] syz.2.1201[4213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.266371][ T30] audit: type=1400 audit(1731595490.230:152): avc: denied { create } for pid=4221 comm="syz.0.1204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 184.737292][ T4259] syz.0.1216[4259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.737363][ T4259] syz.0.1216[4259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.889732][ T4311] syz.0.1232[4311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.034021][ T4311] syz.0.1232[4311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.718283][ T30] audit: type=1400 audit(1731595492.680:153): avc: denied { create } for pid=4334 comm="syz.4.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 186.833834][ T4350] syz.0.1245[4350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.833903][ T4350] syz.0.1245[4350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.811220][ T30] audit: type=1400 audit(1731595494.770:154): avc: denied { create } for pid=4449 comm="syz.4.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 189.091378][ T4475] bpf_get_probe_write_proto: 4 callbacks suppressed [ 189.091394][ T4475] syz.2.1290[4475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.141777][ T4475] syz.2.1290[4475] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.908644][ T4531] syz.1.1309[4531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.012635][ T4531] syz.1.1309[4531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.243315][ T4541] syz.1.1312[4541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.263569][ T4541] syz.1.1312[4541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.284650][ T30] audit: type=1400 audit(1731595496.240:155): avc: denied { append } for pid=4544 comm="syz.4.1313" name="ppp" dev="devtmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 190.621048][ T4554] bridge0: port 4(veth0_to_batadv) entered blocking state [ 190.628575][ T4554] bridge0: port 4(veth0_to_batadv) entered disabled state [ 190.655021][ T4554] device veth0_to_batadv entered promiscuous mode [ 191.267131][ T4589] syz.0.1328[4589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.267211][ T4589] syz.0.1328[4589] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.463451][ T4624] syz.2.1340[4624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.718341][ T4635] syz.3.1343[4635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.955010][ T4674] device wg2 entered promiscuous mode [ 195.236441][ T4722] bpf_get_probe_write_proto: 3 callbacks suppressed [ 195.236460][ T4722] syz.3.1370[4722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.294442][ T4722] syz.3.1370[4722] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.381674][ T4633] syz.4.1335 (4633) used greatest stack depth: 21560 bytes left [ 195.855986][ T4756] syz.4.1381[4756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.856052][ T4756] syz.4.1381[4756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.238719][ T4772] device pim6reg1 entered promiscuous mode [ 198.559995][ T4787] device pim6reg1 entered promiscuous mode [ 199.070753][ T4803] syz.4.1397[4803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.070826][ T4803] syz.4.1397[4803] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.650635][ T4800] device syzkaller0 entered promiscuous mode [ 199.963878][ T4815] device pim6reg1 entered promiscuous mode [ 201.016138][ T4852] syz.2.1412[4852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.016209][ T4852] syz.2.1412[4852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.006517][ T4897] syz.4.1428[4897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.110139][ T4897] syz.4.1428[4897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.158393][ T30] audit: type=1400 audit(1731595508.120:156): avc: denied { create } for pid=4910 comm="syz.1.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 203.049519][ T4944] syz.3.1443[4944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.049587][ T4944] syz.3.1443[4944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.996265][ T4993] syz.3.1456[4993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.064430][ T4993] syz.3.1456[4993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.249364][ T5002] device veth0_vlan left promiscuous mode [ 205.270356][ T5002] device veth0_vlan entered promiscuous mode [ 205.311489][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.378904][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 205.442312][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.470466][ T5067] syz.3.1480[5067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.470533][ T5067] syz.3.1480[5067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.739790][ T5095] device veth0_vlan left promiscuous mode [ 206.766681][ T5095] device veth0_vlan entered promiscuous mode [ 206.807769][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.854070][ T5095] syz.2.1489[5095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.854140][ T5095] syz.2.1489[5095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.887887][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 206.918765][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 207.388551][ T5124] syz.0.1498[5124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.388617][ T5124] syz.0.1498[5124] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.500542][ T5105] device syzkaller0 entered promiscuous mode [ 207.600512][ T5116] device sit0 left promiscuous mode [ 208.297383][ T5173] syz.4.1514[5173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.297454][ T5173] syz.4.1514[5173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.376231][ T5171] device syzkaller0 entered promiscuous mode [ 208.516987][ T5174] device pim6reg1 entered promiscuous mode [ 208.831672][ T5183] device wg2 left promiscuous mode [ 208.899246][ T5183] device wg2 entered promiscuous mode [ 209.416693][ T5194] device syzkaller0 entered promiscuous mode [ 209.587052][ T5212] syz.3.1527[5212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.587121][ T5212] syz.3.1527[5212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.307581][ T5228] bridge0: port 3(veth0_to_batadv) entered blocking state [ 210.346444][ T5228] bridge0: port 3(veth0_to_batadv) entered disabled state [ 210.411847][ T5228] device veth0_to_batadv entered promiscuous mode [ 213.088757][ T5325] bpf_get_probe_write_proto: 4 callbacks suppressed [ 213.088776][ T5325] syz.0.1565[5325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.122677][ T5325] syz.0.1565[5325] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.085523][ T5386] syz.4.1582[5386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.157364][ T5386] syz.4.1582[5386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.474229][ T5438] syz.4.1598[5438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.578147][ T5438] syz.4.1598[5438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.788966][ T5447] syz.3.1612[5447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.986315][ T5447] syz.3.1612[5447] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.805032][ T5490] FAULT_INJECTION: forcing a failure. [ 220.805032][ T5490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.829530][ T5490] CPU: 1 PID: 5490 Comm: syz.0.1615 Not tainted 5.15.167-syzkaller-00002-g3bfe08931bff #0 [ 220.839239][ T5490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 220.849131][ T5490] Call Trace: [ 220.852264][ T5490] [ 220.855033][ T5490] dump_stack_lvl+0x151/0x1c0 [ 220.859552][ T5490] ? io_uring_drop_tctx_refs+0x190/0x190 [ 220.865012][ T5490] ? __stack_depot_save+0x34/0x470 [ 220.869960][ T5490] ? kmem_cache_free+0x116/0x2e0 [ 220.874735][ T5490] dump_stack+0x15/0x20 [ 220.878750][ T5490] should_fail+0x3c6/0x510 [ 220.882980][ T5490] should_fail_usercopy+0x1a/0x20 [ 220.887839][ T5490] _copy_from_user+0x20/0xd0 [ 220.892266][ T5490] __copy_msghdr_from_user+0xaf/0x7c0 [ 220.897476][ T5490] ? __ia32_sys_shutdown+0x70/0x70 [ 220.902420][ T5490] ? bpf_probe_read_compat+0x15c/0x180 [ 220.907715][ T5490] ___sys_sendmsg+0x166/0x2e0 [ 220.912226][ T5490] ? __sys_sendmsg+0x260/0x260 [ 220.916835][ T5490] ? __fdget+0x1bc/0x240 [ 220.920905][ T5490] __se_sys_sendmsg+0x19a/0x260 [ 220.925593][ T5490] ? __x64_sys_sendmsg+0x90/0x90 [ 220.930364][ T5490] ? ksys_write+0x260/0x2c0 [ 220.934709][ T5490] ? debug_smp_processor_id+0x17/0x20 [ 220.939912][ T5490] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 220.945815][ T5490] __x64_sys_sendmsg+0x7b/0x90 [ 220.950418][ T5490] x64_sys_call+0x16a/0x9a0 [ 220.954755][ T5490] do_syscall_64+0x3b/0xb0 [ 220.959007][ T5490] ? clear_bhb_loop+0x35/0x90 [ 220.963522][ T5490] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 220.969257][ T5490] RIP: 0033:0x7f7538ea9719 [ 220.973507][ T5490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.992946][ T5490] RSP: 002b:00007f7537b22038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 221.001190][ T5490] RAX: ffffffffffffffda RBX: 00007f7539060f80 RCX: 00007f7538ea9719 [ 221.008998][ T5490] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000006 [ 221.016812][ T5490] RBP: 00007f7537b22090 R08: 0000000000000000 R09: 0000000000000000 [ 221.024627][ T5490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 221.032435][ T5490] R13: 0000000000000000 R14: 00007f7539060f80 R15: 00007fffcb5a2ff8 [ 221.040272][ T5490] [ 221.059084][ T5492] syz.0.1616[5492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.059152][ T5492] syz.0.1616[5492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.540220][ T5518] syz.4.1625[5518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.603609][ T5518] syz.4.1625[5518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.023736][ T5537] syz.1.1630[5537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.098202][ T5537] syz.1.1630[5537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.134082][ T5541] device pim6reg1 entered promiscuous mode [ 222.159737][ T30] audit: type=1400 audit(1731595528.120:157): avc: denied { create } for pid=5540 comm="syz.2.1632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 222.744073][ T5561] device syzkaller0 entered promiscuous mode [ 222.889583][ T30] audit: type=1400 audit(1731595528.850:158): avc: denied { create } for pid=5564 comm="syz.2.1640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 222.948609][ T5567] device pim6reg1 entered promiscuous mode [ 225.087285][ T5627] bpf_get_probe_write_proto: 2 callbacks suppressed [ 225.087301][ T5627] syz.2.1659[5627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.107146][ T5627] syz.2.1659[5627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.313710][ T5674] syz.0.1671[5674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.356003][ T5674] syz.0.1671[5674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.048277][ T5717] syz.0.1685[5717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.090141][ T5717] syz.0.1685[5717] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.908072][ T5726] device pim6reg1 entered promiscuous mode [ 230.737793][ T5764] syz.4.1699 (5764) used greatest stack depth: 21488 bytes left [ 230.777565][ T5770] syz.1.1701[5770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.777635][ T5770] syz.1.1701[5770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.054471][ T5775] : renamed from pim6reg1 [ 231.200745][ T5782] geneve1: tun_chr_ioctl cmd 1074025672 [ 231.247998][ T5782] geneve1: ignored: set checksum enabled [ 231.261188][ T5787] syz.1.1705[5787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.261258][ T5787] syz.1.1705[5787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.839120][ T5816] device wg2 entered promiscuous mode [ 231.861138][ T5820] syz.4.1715[5820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.861208][ T5820] syz.4.1715[5820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.890470][ T5823] device pim6reg1 entered promiscuous mode [ 233.125445][ T5847] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.133185][ T5847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.292206][ T5847] device bridge0 entered promiscuous mode [ 233.448575][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.666718][ T5869] syz.1.1728[5869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.666798][ T5869] syz.1.1728[5869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.808075][ T5875] syz.2.1739[5875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.314814][ T5875] syz.2.1739[5875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.326276][ T5904] device pim6reg1 entered promiscuous mode [ 236.045987][ T5927] syz.3.1744[5927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.046057][ T5927] syz.3.1744[5927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.072984][ T5916] syz.0.1741[5916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.024725][ T5955] syz.1.1752[5955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.071798][ T5955] syz.1.1752[5955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.085765][ T5950] device wg2 left promiscuous mode [ 237.207435][ T5967] syz.0.1755[5967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.207513][ T5967] syz.0.1755[5967] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.094162][ T101] udevd[101]: worker [314] terminated by signal 33 (Unknown signal 33) [ 238.163954][ T101] udevd[101]: worker [314] failed while handling '/devices/virtual/block/loop4' [ 238.340583][ T6011] syz.2.1767[6011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.340662][ T6011] syz.2.1767[6011] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.470862][ T6058] device syzkaller0 entered promiscuous mode [ 242.962791][ T6066] syz.2.1784[6066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.962865][ T6066] syz.2.1784[6066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.976683][ T6201] device veth0_vlan left promiscuous mode [ 246.023229][ T6201] device veth0_vlan entered promiscuous mode [ 246.168092][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.186739][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 246.214305][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.512033][ T6288] bond_slave_1: mtu less than device minimum [ 249.563420][ T6296] device pim6reg1 entered promiscuous mode [ 250.954669][ T6359] syzkaller0: refused to change device tx_queue_len [ 251.277779][ T291] syz-executor (291) used greatest stack depth: 20720 bytes left [ 251.899791][ T6403] : renamed from ipvlan1 [ 251.905352][ T6393] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.921307][ T6393] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.936420][ T6393] device bridge_slave_0 entered promiscuous mode [ 251.984551][ T6393] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.000821][ T6393] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.050918][ T6393] device bridge_slave_1 entered promiscuous mode [ 252.121103][ T396] device veth0_to_batadv left promiscuous mode [ 252.139527][ T396] bridge0: port 3(veth0_to_batadv) entered disabled state [ 252.219485][ T396] device bridge_slave_1 left promiscuous mode [ 252.281472][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.312983][ T396] device bridge_slave_0 left promiscuous mode [ 252.323321][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.335745][ T396] device veth1_macvtap left promiscuous mode [ 252.605752][ T6423] device macsec0 entered promiscuous mode [ 252.908383][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.915783][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.923263][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.942434][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.950871][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.957732][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.968991][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.980148][ T6469] device pim6reg1 entered promiscuous mode [ 252.993091][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.001587][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.009587][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.016562][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.027840][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.038908][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.052200][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.064857][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.073101][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.082497][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.091820][ T6393] device veth0_vlan entered promiscuous mode [ 253.121360][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.131008][ T6393] device veth1_macvtap entered promiscuous mode [ 253.142794][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.152678][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.172336][ T30] audit: type=1400 audit(1731595559.130:159): avc: denied { mounton } for pid=6393 comm="syz-executor" path="/root/syzkaller.bUIkMO/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 253.200202][ T30] audit: type=1400 audit(1731595559.160:160): avc: denied { mount } for pid=6393 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 253.230912][ T30] audit: type=1400 audit(1731595559.190:161): avc: denied { mounton } for pid=6393 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 253.960400][ T6482] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.021972][ T6482] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.036343][ T6482] device bridge_slave_0 entered promiscuous mode [ 254.046235][ T30] audit: type=1400 audit(1731595560.010:162): avc: denied { append } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 254.055354][ T6482] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.078892][ T6482] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.086388][ T6482] device bridge_slave_1 entered promiscuous mode [ 254.097901][ T30] audit: type=1400 audit(1731595560.010:163): avc: denied { open } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 254.124438][ T30] audit: type=1400 audit(1731595560.010:164): avc: denied { getattr } for pid=83 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 254.364009][ T6512] device syzkaller0 entered promiscuous mode [ 254.556400][ T6482] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.563275][ T6482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.565900][ T30] audit: type=1400 audit(1731595560.510:165): avc: denied { create } for pid=6482 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 254.570375][ T6482] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.597468][ T6482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.896416][ T30] audit: type=1400 audit(1731595560.510:166): avc: denied { write } for pid=6482 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 255.045921][ T30] audit: type=1400 audit(1731595560.510:167): avc: denied { read } for pid=6482 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 255.097354][ T576] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.109955][ T576] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.227323][ T30] audit: type=1400 audit(1731595560.610:168): avc: denied { create } for pid=6510 comm="syz.3.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 255.572831][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.584579][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.707816][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.716008][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.723993][ T576] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.730856][ T576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.796906][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.815308][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.864422][ T576] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.871301][ T576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.979400][ T396] device bridge_slave_1 left promiscuous mode [ 255.985388][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.117862][ T396] device bridge_slave_0 left promiscuous mode [ 256.186909][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.306166][ T396] device veth1_macvtap left promiscuous mode [ 256.350639][ T396] device veth0_vlan left promiscuous mode [ 256.472796][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.481035][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.489468][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.497670][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.579809][ T6482] device veth0_vlan entered promiscuous mode [ 256.592300][ T6482] device veth1_macvtap entered promiscuous mode [ 256.642954][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.651552][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.661413][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.669495][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.743134][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.751362][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.759390][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.887348][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.894670][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.913891][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.931035][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.043351][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.072411][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.129586][ T6582] bridge0: port 3(veth0_to_batadv) entered blocking state [ 257.148636][ T6582] bridge0: port 3(veth0_to_batadv) entered disabled state [ 257.186579][ T6582] device veth0_to_batadv entered promiscuous mode [ 257.198588][ T6582] bridge0: port 3(veth0_to_batadv) entered blocking state [ 257.206228][ T6582] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 257.319808][ T6583] device veth0_to_batadv left promiscuous mode [ 257.455971][ T6583] bridge0: port 3(veth0_to_batadv) entered disabled state [ 258.011665][ T6607] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.018630][ T6607] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.025790][ T6607] device bridge_slave_0 entered promiscuous mode [ 258.117806][ T6607] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.182476][ T6607] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.204126][ T6607] device bridge_slave_1 entered promiscuous mode [ 258.929632][ T396] device bridge_slave_1 left promiscuous mode [ 258.936767][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.948778][ T396] device bridge_slave_0 left promiscuous mode [ 258.954794][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.964789][ T396] device veth1_macvtap left promiscuous mode [ 258.970768][ T396] device veth0_vlan left promiscuous mode [ 259.105521][ T6655] device syzkaller0 entered promiscuous mode [ 259.161688][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.169133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.185429][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.193897][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.202551][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.209484][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.218087][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.227291][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.235506][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.242394][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.257218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.265212][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.273347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.297927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.376968][ T6607] device veth0_vlan entered promiscuous mode [ 259.396230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.487666][ T6676] device syzkaller0 entered promiscuous mode [ 259.563196][ T6607] device veth1_macvtap entered promiscuous mode [ 259.631477][ T1751] syzkaller0: tun_net_xmit 48 [ 259.636290][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.665200][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.776690][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.894578][ T6682] : renamed from ipvlan1 [ 259.947094][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.006736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.045046][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 260.056387][ T6686] syz.1.1969[6686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.056462][ T6686] syz.1.1969[6686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.069636][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.714413][ T6698] bridge0: port 4(veth0_to_batadv) entered blocking state [ 260.722177][ T6698] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 260.732767][ T6698] bridge0: port 3(macsec0) entered blocking state [ 260.740207][ T6698] bridge0: port 3(macsec0) entered forwarding state [ 260.750056][ T6698] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.758277][ T6698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.767947][ T6698] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.776426][ T6698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.892172][ T6698] device bridge0 entered promiscuous mode [ 261.180190][ T6719] device pim6reg1 entered promiscuous mode [ 261.445527][ T6704] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.484568][ T6704] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.492103][ T6704] device bridge_slave_0 entered promiscuous mode [ 261.506233][ T6704] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.541839][ T6704] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.549204][ T6704] device bridge_slave_1 entered promiscuous mode [ 261.619219][ T396] device bridge_slave_1 left promiscuous mode [ 261.628843][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.636501][ T396] device bridge_slave_0 left promiscuous mode [ 261.642468][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.651885][ T396] device veth1_macvtap left promiscuous mode [ 261.657798][ T396] device veth0_vlan left promiscuous mode [ 261.715069][ T6735] bond_slave_1: mtu greater than device maximum [ 261.732829][ T6742] device syzkaller0 entered promiscuous mode [ 261.750927][ T30] audit: type=1400 audit(1731595567.710:169): avc: denied { create } for pid=6738 comm="syz.0.1986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 261.783150][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.703478][ T6750] device pim6reg1 entered promiscuous mode [ 262.744598][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.752527][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.777741][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.799395][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.812047][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.818918][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.830336][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.839384][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.851331][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.858197][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.879425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.886959][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 262.894842][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.906194][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 262.914564][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.926314][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.934629][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 263.063081][ T6704] device veth0_vlan entered promiscuous mode [ 263.166896][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 263.178027][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.256930][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.264229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.282497][ T6704] device veth1_macvtap entered promiscuous mode [ 263.315660][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.328585][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.349814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.396458][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.415409][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.446407][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.464693][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 264.237286][ T10] device bridge_slave_1 left promiscuous mode [ 264.243240][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.290151][ T10] device bridge_slave_0 left promiscuous mode [ 264.334785][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.379519][ T10] device veth1_macvtap left promiscuous mode [ 264.385439][ T10] device veth0_vlan left promiscuous mode [ 264.533809][ T6834] device pim6reg1 entered promiscuous mode [ 264.591449][ T6825] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.600566][ T6825] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.659439][ T6825] device bridge_slave_0 entered promiscuous mode [ 264.676936][ T6825] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.683874][ T6825] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.691380][ T6825] device bridge_slave_1 entered promiscuous mode [ 264.892817][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 264.938799][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 264.966114][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.974829][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.991674][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.998556][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.056502][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.067095][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.082702][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.089597][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.111292][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.137882][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 265.155494][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 265.172232][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 265.247202][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.367546][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 265.376457][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.386624][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.401117][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.413212][ T6825] device veth0_vlan entered promiscuous mode [ 265.452485][ T6825] device veth1_macvtap entered promiscuous mode [ 265.463977][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.487764][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 265.504839][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 265.534313][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 265.553747][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 265.636377][ T6869] device syzkaller0 entered promiscuous mode [ 266.639158][ T6897] syz.1.2035[6897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.639230][ T6897] syz.1.2035[6897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.652317][ T6897] syz.1.2035[6897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.674063][ T6897] syz.1.2035[6897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.976714][ T6900] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.015091][ T6900] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.181326][ T6900] device bridge_slave_0 entered promiscuous mode [ 267.497269][ T6900] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.504144][ T6900] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.545051][ T6900] device bridge_slave_1 entered promiscuous mode [ 267.601983][ T10] device bridge_slave_1 left promiscuous mode [ 267.646304][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.728347][ T10] device bridge_slave_0 left promiscuous mode [ 267.757117][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.807735][ T10] device veth1_macvtap left promiscuous mode [ 267.828518][ T10] device veth0_vlan left promiscuous mode [ 268.059630][ T6941] device pim6reg1 entered promiscuous mode [ 268.535323][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.554464][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.643883][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.652559][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.661073][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.667950][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.854478][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.867966][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.876502][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.899878][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.906762][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.073743][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.113208][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.179562][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.187557][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.202995][ T6900] device veth0_vlan entered promiscuous mode [ 269.209188][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.217506][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.226548][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 269.234711][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.253612][ T6988] device syzkaller0 entered promiscuous mode [ 269.337622][ T6900] device veth1_macvtap entered promiscuous mode [ 269.418059][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 269.448537][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 269.524014][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.574687][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.625311][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.761181][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 269.780330][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.091858][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.113376][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.188233][ T6900] syz-executor (6900) used greatest stack depth: 20688 bytes left [ 270.983481][ T7012] device pim6reg1 entered promiscuous mode [ 271.071511][ T7015] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.078518][ T7015] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.085794][ T7015] device bridge_slave_0 entered promiscuous mode [ 271.093181][ T7015] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.109126][ T7015] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.127679][ T7015] device bridge_slave_1 entered promiscuous mode [ 271.154482][ T10] device bridge_slave_1 left promiscuous mode [ 271.176287][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.186321][ T10] device bridge_slave_0 left promiscuous mode [ 271.192264][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.216537][ T10] device veth1_macvtap left promiscuous mode [ 271.232173][ T10] device veth0_vlan left promiscuous mode [ 272.295651][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.303477][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.374351][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.382698][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.398066][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.404948][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.412317][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.420981][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.429222][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.436094][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.443326][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.451349][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.459462][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.481395][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.489660][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.523571][ T7015] device veth0_vlan entered promiscuous mode [ 272.529973][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.537795][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.545591][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.553110][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.572695][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 272.581481][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.593361][ T7015] device veth1_macvtap entered promiscuous mode [ 272.603327][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 272.611787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 272.620104][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.635270][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 272.643426][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.056347][ T7111] geneve1: tun_chr_ioctl cmd 1074025672 [ 274.117099][ T7111] geneve1: ignored: set checksum enabled [ 274.329970][ T396] device bridge_slave_1 left promiscuous mode [ 274.338442][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.434757][ T396] device bridge_slave_0 left promiscuous mode [ 274.497562][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.582652][ T396] device veth1_macvtap left promiscuous mode [ 274.606075][ T396] device veth0_vlan left promiscuous mode [ 274.922096][ T7099] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.939132][ T7099] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.952220][ T7099] device bridge_slave_0 entered promiscuous mode [ 275.027986][ T7099] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.085095][ T7099] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.165584][ T7099] device bridge_slave_1 entered promiscuous mode [ 275.997597][ T7161] device macsec0 left promiscuous mode [ 276.044185][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.065523][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.094775][ T7099] device veth0_vlan entered promiscuous mode [ 276.185967][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 276.236869][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.297520][ T576] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.304371][ T576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.316205][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 276.324433][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.332745][ T576] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.339601][ T576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.347546][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 276.355634][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.365212][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 276.373292][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.429104][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 276.437479][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.445662][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.453424][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.461367][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.469138][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.476567][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.498408][ T7099] device veth1_macvtap entered promiscuous mode [ 276.521608][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.532741][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.535785][ T7179] syz.3.2119[7179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.541141][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.552341][ T7179] syz.3.2119[7179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.571764][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.591596][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.639701][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.886809][ T396] device bridge_slave_1 left promiscuous mode [ 277.892730][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.900068][ T396] device bridge_slave_0 left promiscuous mode [ 277.906105][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.913589][ T396] device veth1_macvtap left promiscuous mode [ 277.919424][ T396] device veth0_vlan left promiscuous mode [ 278.952731][ T7217] device syzkaller0 entered promiscuous mode [ 279.496977][ T7202] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.513998][ T7202] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.523917][ T7202] device bridge_slave_0 entered promiscuous mode [ 279.538581][ T7202] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.548452][ T7202] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.581814][ T7202] device bridge_slave_1 entered promiscuous mode [ 282.720389][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.796252][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.926064][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.080113][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.256647][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.263531][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.530214][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.664488][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.672808][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.679714][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.789357][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.947236][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.026801][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.096309][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.167115][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.196390][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 284.204665][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.215705][ T7202] device veth0_vlan entered promiscuous mode [ 284.228809][ T7202] device veth1_macvtap entered promiscuous mode [ 284.383293][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.434161][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.516938][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.580440][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.588499][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.599309][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.606681][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.765835][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.816832][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.950942][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.959758][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.916386][ T396] device bridge_slave_1 left promiscuous mode [ 285.922305][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.929569][ T396] device bridge_slave_0 left promiscuous mode [ 285.935473][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.943046][ T396] device veth1_macvtap left promiscuous mode [ 285.948865][ T396] device veth0_vlan left promiscuous mode [ 286.619922][ T7274] device syzkaller0 entered promiscuous mode [ 287.101802][ T7281] device syzkaller0 entered promiscuous mode [ 287.194356][ T7286] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.203215][ T7286] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.210772][ T7286] device bridge_slave_0 entered promiscuous mode [ 287.219498][ T7286] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.230622][ T7286] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.238397][ T7286] device bridge_slave_1 entered promiscuous mode [ 287.314886][ T7286] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.321764][ T7286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.328880][ T7286] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.335628][ T7286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.364591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.373164][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.452184][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.628445][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.768496][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.775378][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.060106][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.111671][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.118555][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.193961][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.202001][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.276367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 288.386576][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.514134][ T7286] device veth0_vlan entered promiscuous mode [ 288.557955][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 288.676522][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.756884][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.823404][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.869238][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 288.884763][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 289.087824][ T7286] device veth1_macvtap entered promiscuous mode [ 289.220214][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 289.302436][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 289.331766][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.411447][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.503219][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 290.556685][ T396] device bridge_slave_1 left promiscuous mode [ 290.562607][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.569951][ T396] device bridge_slave_0 left promiscuous mode [ 290.576049][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.583646][ T396] device veth1_macvtap left promiscuous mode [ 290.589511][ T396] device veth0_vlan left promiscuous mode [ 291.194335][ T7380] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.244230][ T7380] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.316944][ T7380] device bridge_slave_0 entered promiscuous mode [ 291.374389][ T7380] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.420047][ T7380] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.438462][ T7380] device bridge_slave_1 entered promiscuous mode [ 292.368480][ T7422] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.529453][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.539461][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.611012][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.625057][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.640269][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.647160][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.670031][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.685705][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.694352][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.701218][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.780682][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 292.789716][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.798821][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.807115][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.815107][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.842104][ T7380] device veth0_vlan entered promiscuous mode [ 292.854234][ T7380] device veth1_macvtap entered promiscuous mode [ 292.927314][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 292.987549][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 293.018226][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 293.032513][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.046104][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 293.059147][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 293.073514][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.087081][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.100883][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.115716][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.129529][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.160451][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.172315][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 293.238203][ T7450] device pim6reg1 entered promiscuous mode [ 293.806689][ T396] device bridge_slave_1 left promiscuous mode [ 293.812649][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.820596][ T396] device bridge_slave_0 left promiscuous mode [ 293.826601][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.834195][ T396] device veth1_macvtap left promiscuous mode [ 293.840105][ T396] device veth0_vlan left promiscuous mode [ 295.052587][ T7464] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.114216][ T7464] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.136823][ T7464] device bridge_slave_0 entered promiscuous mode [ 295.156361][ T7464] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.196250][ T7464] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.254106][ T7464] device bridge_slave_1 entered promiscuous mode [ 296.770382][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.782175][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.866464][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.986259][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.076398][ T576] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.083258][ T576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.226072][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.306994][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.366386][ T576] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.373253][ T576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.380545][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.388528][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.396634][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.404549][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.482659][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.518966][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 297.534111][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.624632][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.632476][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.695930][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.725268][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.776632][ T7464] device veth0_vlan entered promiscuous mode [ 297.817751][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 297.829484][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.840366][ T7464] device veth1_macvtap entered promiscuous mode [ 297.850575][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 297.876409][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.936246][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.976913][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.009741][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.286434][ T396] device bridge_slave_1 left promiscuous mode [ 299.292362][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.299722][ T396] device bridge_slave_0 left promiscuous mode [ 299.305775][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.313528][ T396] device veth1_macvtap left promiscuous mode [ 299.319348][ T396] device veth0_vlan left promiscuous mode [ 299.703308][ T7592] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.710625][ T7592] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.718740][ T7592] device bridge_slave_0 entered promiscuous mode [ 299.725702][ T7592] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.793488][ T7592] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.864526][ T7592] device bridge_slave_1 entered promiscuous mode [ 300.096368][ T7592] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.103247][ T7592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.110376][ T7592] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.117226][ T7592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.151884][ T7614] device pim6reg1 entered promiscuous mode [ 300.209455][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.220942][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.260889][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 300.312249][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.388037][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.452884][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.459744][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.541117][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.596182][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.603067][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.688116][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 300.736539][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 300.790429][ T7631] device veth0_vlan left promiscuous mode [ 300.832696][ T7631] device veth0_vlan entered promiscuous mode [ 301.008990][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.056334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 301.136348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.247278][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.294229][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.338036][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 301.378253][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.401642][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 301.468468][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.549792][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.602223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.669393][ T7592] device veth0_vlan entered promiscuous mode [ 301.721075][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 301.740223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.804057][ T7592] device veth1_macvtap entered promiscuous mode [ 301.867898][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 301.898308][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 301.957740][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 302.026159][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 303.326821][ T396] device bridge_slave_1 left promiscuous mode [ 303.332738][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.340022][ T396] device bridge_slave_0 left promiscuous mode [ 303.346009][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.353422][ T396] device veth1_macvtap left promiscuous mode [ 303.359269][ T396] device veth0_vlan left promiscuous mode [ 304.312704][ T7676] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.348748][ T7676] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.401867][ T7676] device bridge_slave_0 entered promiscuous mode [ 304.448059][ T7676] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.487638][ T7676] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.535532][ T7676] device bridge_slave_1 entered promiscuous mode [ 304.650518][ T7708] bridge0: port 4(veth0_to_batadv) entered disabled state [ 304.660629][ T7708] bridge0: port 3(macsec0) entered disabled state [ 304.669758][ T7708] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.690130][ T7708] device bridge0 left promiscuous mode [ 304.766819][ T7720] device veth0_to_batadv left promiscuous mode [ 304.772912][ T7720] bridge0: port 4(veth0_to_batadv) entered disabled state [ 304.780673][ T7720] device macsec0 left promiscuous mode [ 304.786181][ T7720] bridge0: port 3(macsec0) entered disabled state [ 304.793017][ T7720] device bridge_slave_1 left promiscuous mode [ 304.799033][ T7720] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.807036][ T7720] device bridge_slave_0 left promiscuous mode [ 304.813027][ T7720] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.189798][ T7717] bridge0: port 3(veth0_to_batadv) entered blocking state [ 306.201172][ T7717] bridge0: port 3(veth0_to_batadv) entered disabled state [ 306.249224][ T7717] device veth0_to_batadv entered promiscuous mode [ 306.376354][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.395999][ T576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.540482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.568656][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.657160][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.664407][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.846071][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.853574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.906273][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.933615][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.940491][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.978066][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.990527][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.000667][ T7756] bridge0: port 4(veth0_macvtap) entered blocking state [ 307.008082][ T7756] bridge0: port 4(veth0_macvtap) entered disabled state [ 307.015313][ T7756] device veth0_macvtap entered promiscuous mode [ 307.040826][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 307.072355][ T7676] device veth0_vlan entered promiscuous mode [ 307.080633][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.089534][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.106135][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.204032][ T7676] device veth1_macvtap entered promiscuous mode [ 307.322044][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 307.361414][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.488478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 307.584682][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.650641][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 307.719757][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.734478][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 308.726918][ T396] device bridge_slave_1 left promiscuous mode [ 308.732860][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.740138][ T396] device bridge_slave_0 left promiscuous mode [ 308.746101][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.753462][ T396] device veth1_macvtap left promiscuous mode [ 308.759309][ T396] device veth0_vlan left promiscuous mode [ 309.692612][ T7784] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.788123][ T7784] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.795443][ T7784] device bridge_slave_0 entered promiscuous mode [ 309.843684][ T7784] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.923325][ T7784] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.954020][ T7784] device bridge_slave_1 entered promiscuous mode [ 310.451148][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 310.462872][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.511002][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 310.582175][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.619779][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.626670][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.670655][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 310.703669][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.734850][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.741734][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.789315][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.808179][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.820842][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.834199][ T7784] device veth0_vlan entered promiscuous mode [ 310.859755][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.869022][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.881779][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.894573][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.910597][ T7784] device veth1_macvtap entered promiscuous mode [ 310.920049][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.936991][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.945264][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.965734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.980998][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 311.036763][ T7857] device pim6reg1 entered promiscuous mode [ 311.067212][ T7784] syz-executor (7784) used greatest stack depth: 19736 bytes left [ 311.806954][ T45] device bridge_slave_1 left promiscuous mode [ 311.812864][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.820180][ T45] device bridge_slave_0 left promiscuous mode [ 311.826205][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.833729][ T45] device veth1_macvtap left promiscuous mode [ 311.839559][ T45] device veth0_vlan left promiscuous mode [ 312.847570][ T7873] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.854478][ T7873] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.861703][ T7873] device bridge_slave_0 entered promiscuous mode [ 312.868670][ T7873] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.875507][ T7873] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.882959][ T7873] device bridge_slave_1 entered promiscuous mode [ 312.946918][ T7873] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.953786][ T7873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.960927][ T7873] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.967774][ T7873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.998080][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.005667][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.013177][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.021461][ T7883] device veth1_macvtap left promiscuous mode [ 313.087682][ T7883] device macsec0 left promiscuous mode [ 313.144659][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.186884][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.193758][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.372761][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.492519][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.499419][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.639664][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.667583][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.763389][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 313.829717][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 313.901563][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 313.909413][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.919589][ T7873] device veth0_vlan entered promiscuous mode [ 313.934849][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.942254][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.994803][ T7913] device syzkaller0 entered promiscuous mode [ 314.010536][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.018943][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.070399][ T7873] device veth1_macvtap entered promiscuous mode [ 314.089680][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.097312][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 314.105307][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.175389][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.184283][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 314.204336][ T7926] device syzkaller0 entered promiscuous mode [ 315.407380][ T45] device bridge_slave_1 left promiscuous mode [ 315.413285][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.420610][ T45] device bridge_slave_0 left promiscuous mode [ 315.426575][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.434058][ T45] device veth1_macvtap left promiscuous mode [ 315.439985][ T45] device veth0_vlan left promiscuous mode [ 316.170404][ T7935] device pim6reg1 entered promiscuous mode [ 316.383517][ T7942] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.390419][ T7942] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.397631][ T7942] device bridge_slave_0 entered promiscuous mode [ 316.405231][ T7942] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.417931][ T7942] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.425221][ T7942] device bridge_slave_1 entered promiscuous mode [ 316.549101][ T7942] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.555976][ T7942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.563061][ T7942] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.569869][ T7942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.619946][ T7952] device pim6reg1 entered promiscuous mode [ 316.675542][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.688121][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.729568][ T7942] device veth0_vlan entered promiscuous mode [ 316.741647][ T7942] device veth1_macvtap entered promiscuous mode [ 316.771256][ T7974] device wg2 left promiscuous mode [ 316.779511][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.787102][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 316.794428][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.802831][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.811046][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.817908][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.825615][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.834229][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.847916][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.854772][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.876392][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.884346][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 316.892489][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 316.900572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 316.908742][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 316.936283][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 316.996347][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 317.110301][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.129681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 317.138713][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 317.147384][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 317.154823][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 317.173508][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 317.305170][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 317.348949][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 317.371537][ T7989] syz.4.2338[7989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.371610][ T7989] syz.4.2338[7989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.499483][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.518790][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.696213][ T396] device bridge_slave_1 left promiscuous mode [ 318.702125][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.709445][ T396] device bridge_slave_0 left promiscuous mode [ 318.715344][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.722932][ T396] device veth1_macvtap left promiscuous mode [ 318.728791][ T396] device veth0_vlan left promiscuous mode [ 320.394600][ T8006] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.487411][ T8006] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.743092][ T8006] device bridge_slave_0 entered promiscuous mode [ 320.946781][ T8006] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.953632][ T8006] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.001011][ T8006] device bridge_slave_1 entered promiscuous mode [ 321.911333][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.918727][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.993867][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.207246][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.306723][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.313583][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.542634][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.550973][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.598801][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.605654][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.614566][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.622749][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.630761][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.717186][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 322.725449][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.836242][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.936544][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.063201][ T8006] device veth0_vlan entered promiscuous mode [ 323.128695][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.157022][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.227755][ T8006] device veth1_macvtap entered promiscuous mode [ 323.343595][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 323.396446][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.471458][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 323.655445][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 323.664094][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 323.776178][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 323.876223][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.161885][ T8055] device pim6reg1 entered promiscuous mode [ 325.296596][ T396] device bridge_slave_1 left promiscuous mode [ 325.302513][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.309852][ T396] device bridge_slave_0 left promiscuous mode [ 325.315777][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.323489][ T396] device veth1_macvtap left promiscuous mode [ 325.329372][ T396] device veth0_vlan left promiscuous mode [ 326.636802][ T8067] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.727962][ T8067] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.735283][ T8067] device bridge_slave_0 entered promiscuous mode [ 326.935573][ T8067] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.072683][ T8067] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.293394][ T8067] device bridge_slave_1 entered promiscuous mode [ 327.419816][ T8092] syz.3.2364[8092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.419876][ T8092] syz.3.2364[8092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.488748][ T8088] device pim6reg1 entered promiscuous mode [ 327.881477][ T8104] Y4`Ҙ: renamed from lo [ 328.182866][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.278393][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.352241][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 328.365770][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.381418][ T396] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.388305][ T396] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.489095][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 328.516602][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 328.524844][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.533143][ T396] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.540005][ T396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.549966][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 328.558191][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 328.566267][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 328.574283][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 328.638663][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 328.656229][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 328.701118][ T8067] device veth0_vlan entered promiscuous mode [ 328.744468][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 328.762472][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 328.813311][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 328.866097][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 328.930851][ T8067] device veth1_macvtap entered promiscuous mode [ 328.981654][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 329.006917][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.076828][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 329.108589][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 329.116989][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.175173][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 329.183538][ T396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.246426][ T396] device bridge_slave_1 left promiscuous mode [ 330.252361][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.259675][ T396] device bridge_slave_0 left promiscuous mode [ 330.265607][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.273239][ T396] device veth1_macvtap left promiscuous mode [ 330.279083][ T396] device veth0_vlan left promiscuous mode [ 331.561943][ T30] audit: type=1400 audit(1731595637.520:170): avc: denied { create } for pid=8144 comm="syz.1.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 331.638156][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.645103][ T8154] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.709606][ T8154] device bridge_slave_0 entered promiscuous mode [ 331.876290][ T8154] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.883138][ T8154] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.890476][ T8154] device bridge_slave_1 entered promiscuous mode [ 332.026140][ T8185] device veth0_macvtap left promiscuous mode [ 332.038626][ T8185] bridge0: port 4(veth0_macvtap) entered disabled state [ 332.068657][ T8185] device veth0_to_batadv left promiscuous mode [ 332.074896][ T8185] bridge0: port 3(veth0_to_batadv) entered disabled state [ 332.104936][ T8185] device bridge_slave_1 left promiscuous mode [ 332.115664][ T8185] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.153860][ T8185] device bridge_slave_0 left promiscuous mode [ 332.171853][ T8185] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.461688][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.488721][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.688114][ T8200] device syzkaller0 entered promiscuous mode [ 332.923514][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.931859][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.948603][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.955481][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.964659][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.047322][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.056190][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.063028][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.073060][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.103711][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.127753][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.135292][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.143193][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.151941][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.160312][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.203448][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.217686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.230258][ T8154] device veth0_vlan entered promiscuous mode [ 333.239823][ T30] audit: type=1400 audit(1731595639.190:171): avc: denied { rename } for pid=83 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 333.268409][ T30] audit: type=1400 audit(1731595639.190:172): avc: denied { unlink } for pid=83 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 333.291522][ T30] audit: type=1400 audit(1731595639.190:173): avc: denied { create } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 333.376489][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.406866][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.417610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.425602][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.449946][ T8154] device veth1_macvtap entered promiscuous mode [ 333.481914][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.491716][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.620528][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.721685][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.808586][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=1884 state=3 status=67 (errno 32: Broken pipe) [ 335.167688][ T396] device bridge_slave_1 left promiscuous mode [ 335.173609][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.180913][ T396] device bridge_slave_0 left promiscuous mode [ 335.186895][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.194299][ T396] device veth1_macvtap left promiscuous mode [ 335.200194][ T396] device veth0_vlan left promiscuous mode [ 335.470245][ T30] audit: type=1400 audit(1731595641.430:174): avc: denied { read } for pid=8250 comm="poweroff" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 335.983591][ T30] audit: type=1400 audit(1731595641.940:175): avc: denied { unlink } for pid=139 comm="dhcpcd" name="sock" dev="tmpfs" ino=413 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=sock_file permissive=1 [ 336.021052][ T30] audit: type=1400 audit(1731595641.970:176): avc: denied { unlink } for pid=139 comm="dhcpcd" name="pid" dev="tmpfs" ino=412 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 336.066342][ T30] audit: type=1400 audit(1731595642.030:177): avc: denied { search } for pid=8274 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 336.088443][ T30] audit: type=1400 audit(1731595642.040:178): avc: denied { write } for pid=8274 comm="iptables" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 336.110416][ T30] audit: type=1400 audit(1731595642.040:179): avc: denied { add_name } for pid=8274 comm="iptables" name="xtables.lock" scontext=system_u:system_r:iptables_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 336.209163][ T396] device bridge_slave_1 left promiscuous mode [ 336.215098][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.222343][ T396] device bridge_slave_0 left promiscuous mode [ 336.228314][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.236547][ T396] device bridge_slave_1 left promiscuous mode [ 336.242686][ T396] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.249785][ T396] device bridge_slave_0 left promiscuous mode [ 336.255675][ T396] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.263678][ T396] device veth1_macvtap left promiscuous mode [ 336.269687][ T396] device veth1_macvtap left promiscuous mode [ 337.529430][ T8293] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 339.607445][ T8294] kvm: exiting hardware virtualization [ 339.614046][ T8294] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 339.620462][ T8294] ACPI: PM: Preparing to enter system sleep state S5 [ 339.627271][ T8294] reboot: Power down serialport: VM disconnected.