last executing test programs: 2.387216918s ago: executing program 3 (id=9593): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xb, 0x8, 0x2, 0xc, 0x5}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.146915177s ago: executing program 3 (id=9597): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b00)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}, 0x401, 0xffffffffffffffff, 0x8, 0x6, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/404], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x34, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x23) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c80)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r2, @ANYRES32=0x0, @ANYRES64, @ANYRES16=r0], 0x0, 0xfffffffd, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0xe, 0x15, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x8}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1ff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000500)='syzkaller\x00', 0xc0ca, 0xc9, &(0x7f0000000b40)=""/201, 0x41100, 0x30, '\x00', 0x0, @sk_skb=0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000e00)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000e40)=[0xffffffffffffffff], &(0x7f0000000e80)=[{0x4, 0x5, 0x2, 0x6}, {0x3, 0x3, 0x4, 0x1}], 0x10, 0x6}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac141416441805034d2f87e5940c05ab845013f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000016000000b40000000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x50) 1.769331627s ago: executing program 1 (id=9606): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0xfffffffb}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000f40)={r1, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) close(r4) 585.324033ms ago: executing program 1 (id=9610): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) close(0x4) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000380)=ANY=[@ANYRES8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000740), 0x4}, 0x0, 0x1000000000000, 0x0, 0x1, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000040)='./file0\x00', 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 584.842233ms ago: executing program 4 (id=9611): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000f8ffffff0000000000008000000000000041e6bf325f503243e7e64af5a22f295814f35aa7014672c21825841a64b606f2a49accba46c9692bc0e07763ef7e29fa973e35492d7052794564ce6b28ed492c33244f8f790c99ca02617a9de639868a83b9", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYRES32=r0], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000380)='task_rename\x00', r6}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="62b808170000000e8867aed62fe238acaa471e27d527a60000000064000081f46dcb6fa486ab24"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r7, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000903000001"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r11}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYRES8=r3, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES64=0x0, @ANYRES32, @ANYRES64=r10, @ANYBLOB="1cf70ed5c822cd3a35ffeaf904a8b44194db1059b23cb4ef82c6eafbe023925ed3ecb3daf758d352a77ef57ed621f0bcd02ca051ef659bb404206362e538512f7a1e70d196e1858ed42ded0f7b7c749b2b596f7cdbad67b74042db1fcff839dc2a0577254a8c72a7b50a503ea7d3fefb17cefae7211fc4c44889ef136c749c05d742f4a24002dbde6f3064dedd407ff6067c2b8f2bad52e386d7f10cfb65453311c528a0183c4a1b8656f78dec45407cf9", @ANYRES16=r12, @ANYRESOCT=r5, @ANYRESHEX=r8], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r13}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r14}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="0c363e4ecd4efdc58f96df425351d0a0a7d22bc663d2402ad274b6c946ea0b59211a5b2f4253eceb633f862931566ef25260bd0b66fa8ce64838ab164b2c33d4cc809a246d8aaf7d4f92c80d21721eebf40e10890b35e8a84441132b1b2a33b02f9924aed8977948df2be043b88d42eb5769801cca"], &(0x7f0000000100)='GPL\x00', 0x20000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd67}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) 584.422923ms ago: executing program 2 (id=9612): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000400000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r0}, 0x18) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="180000006b800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000200b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000080)='module_request\x00', r2}, 0x6d) socketpair(0x0, 0x0, 0x0, &(0x7f0000001c00)) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) 583.118783ms ago: executing program 3 (id=9613): r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(r0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000800000000000000", @ANYRES32=0x1, @ANYBLOB="052caf68d5bd5e1d1e00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000000000000100"/28], 0x50) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000340)=""/18) mkdirat$cgroup(r6, &(0x7f0000000080)='syz1\x00', 0x1ff) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018210000", @ANYRES32=r5, @ANYBLOB="00000000ff0f02009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r10}, &(0x7f0000000180), &(0x7f00000001c0)=r9}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x10001, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 582.505083ms ago: executing program 2 (id=9614): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3d, 0x0, 0x1, 0x20}]}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000240), &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480), 0x0, 0x10, &(0x7f0000000700), &(0x7f0000000540), 0x8, 0x9a, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1e000000a01200000a000000fc69ab7703000000", @ANYRES32, @ANYBLOB='\b\x00'/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB="0500000003000000040000000900000000000000e200000000000000"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r6, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ff0000000085000000590000009500"/65], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5}, 0x94) close(r4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='ext4_unlink_enter\x00', r9}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000005000000000900ab7e06000000080000", @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r10}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r10}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) 581.882523ms ago: executing program 4 (id=9615): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xe, 0x4, 0x8, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='ext4_nfs_commit_metadata\x00', r0}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r0, &(0x7f0000000340)="0c584e5e2bdd05149e9069ed9f8843cf45dea7c65c974736514b7e145070df0b9033d99c5455883e5f36a0bc551700410caa7f31bb196e0bf7f9996ff36cda3948ac6dc8b1354b8c02fe44b01e55b4d9b42cdb8a8286628563da4fd2d9d7a2a3c970390023d193f51f1fae75d40b40a0daff0220ca281186dfdc04fae94daf7a70776d7cb3ac666924b169d7fee5f8a87209e2e2214c21", &(0x7f0000000000)=""/69, 0x4}, 0x20) syz_clone(0xae12e400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETVNETLE(r1, 0x800454dd, &(0x7f0000000200)) 578.732943ms ago: executing program 0 (id=9618): r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x0, 0x2, 0xfffffffffffffffc, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdd, 0x3, 0x0, 0x0, 0x0, 0x4000000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0xffffffffffffffff, 0x400000000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="7a0af8ff75257075bfa100000000000007010000f9ffffffb702000005000000bf130000000000008500000071000000b7000000000000009500000000000000b2595285faa6ead0169191d54f8196217fc560e2fc91f6da4dad4fdc2eb1b257183fa3bcd48666d1ddd73f3047d248df061222193165274bc7f2382f6cda4bfdd45be583823c0f09601f3c1c65ee19ee875daf45006a4c4ea5e15b2f9618d547244a22000000000000db453620ce7243d1aebd00000000000000005839c77edf2d34b12cd48a0c20fb7dd843267e0331759f4ec6b5b0af58e604f4942eb613eff289026d5045ef76d7d864409eb2dcc718a09f4886afc26abba34635d0e8b54bc76be40d435aa8b5202db761014b1b999a12df6bee431a666100"/296], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x200fffe, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) r8 = syz_clone(0x2100, &(0x7f0000000340)="f0", 0x1, &(0x7f0000000440), &(0x7f00000016c0), &(0x7f0000001700)="44262f46a7bd6bd3b51cc2305519b43d18538f7e8fdc14c5e90625cc671002f60776d1f7da3c85e6e8fb73350d14") r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001740)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x50) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000019c0)={0x6, 0xf, &(0x7f00000017c0)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @map_val={0x18, 0x1, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0xf556}], &(0x7f0000001840)='syzkaller\x00', 0xfffffffe, 0x91, &(0x7f0000001880)=""/145, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001940)={0x4, 0x8, 0x5, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r7, r7, r7, r7, r7, r7, r7, r7], 0x0, 0x10, 0x7f}, 0x94) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x15008}, r11, 0x0, 0xffffffffffffffff, 0x0) r12 = perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r12, 0x40042408, r13) r14 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = gettid() syz_open_procfs$namespace(r15, &(0x7f0000000680)='ns/cgroup\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, r14, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xff, 0xff, 0xfc, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xae31cbdd19173c77, 0x0, 0x5, 0x9, 0x40, 0x0, 0xf5}, r15, 0x2, r12, 0x3) sendmsg$unix(r5, &(0x7f0000001b80)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="981074fc8a05057daa3b206dcd353f0d3c4b4a0c4e473e62d69b3bc4fa6deb951bcfc676e1911785362d28322760a5e0b67de5b3cadfb223db0696d00fcc13b20f15453fcb3401908502e3742299aeaf3e07293211346f153bdb6f4c03e9454f162d97a0f0fc27d6756cdffd927b5a93852481b84fb65b854594b61698484e7b736ffedffd88d877ae348c4cffa79278b1cc4f37eabe0a8ae3eeb5b1bac9afa4e448531e6df142cc4d622bbf0c81dfc966e209e1bd662fe9363543f9ec0686", 0xbf}, {&(0x7f0000000240)="c4851f26478f8b4cb73d28d95ff29f27c46bef3aa7fe04bcd613f99966b7d3034ca9fc57ee36d8dd001e4ed454b162096c72e85f8c305e96e897d30270daa12e5059f3c40659d34fe0a63caaf5d306fa7e7814ce189f320e21d14e84960882dfbf94aed947bfacb425011e39df13dcc4217c4a5b1ba99ca5cd052049419cdcb54f788022eae73d04813d4bc14c6b7820429c054c4924d59abcdc9cacad", 0x9d}, {&(0x7f0000000180)="306f80a36a6f1784fa51ce127c3c2499b390cf19a7afaa6ba2cd124a22", 0x1d}, {&(0x7f0000000500)="dd2ef6e012dbd6c6fe96381d38560cd634012f74df3a340a25837893f5a7c24d88d06b399c8ed257aae34a0908dac68551bb9ad1a6f323a4da6c603be49646f09986564093cf4bc192545c4d68273525123ea024fb3c05111cf4bb3a7c10c4a2dbd50d8e89534be8e1952fb761c429040d6adc5b92c01dbe1d60d6293dc333e0c9faf0da7a6abfe271b90a36cfd8bc77739222a393d371a777a33b0473c661944224a881afeefb", 0xa7}, {&(0x7f0000000300)="5fdcf65c83ce3a", 0x7}, {&(0x7f00000006c0)="daf9b944366354dd9916e742672a64ba87ef517f99b2c28baa955b38ae844cac0cd9a0d4f8668a4580e47bed1dcda20ac9f360f6088911dcb9e9d440297fb6bf06400a5348f4bebaa8970cea0f9521e79fdedcd39dc92eb82ad862e75aa80ea804eee26d960e634bcf486b5115ff353105643d187e481c264233afec809904db4fd76a42a4adcc8f581f085d2541b7c2a71c6003a26ce7bbcf69bac7a9e93db2c6d86402d72b9cabc8dc96330410c6789ca970915d1c9b4eb32ddc14dac69317196d4201999c5ede5b460c7d237a5b1f28e023497e29e2b6f2a4a63cc286611fc3b1a002dc5ebf907ce87681fd93b96a321f1f29e4a07d9bf612ee25ff325f4f7fb3abd1fb2fa1c694c95fd077374e7358b2d6ba638437a98ffc2053b4508af0ebe5863a166cb432654cc3ac92a2495205df28807a35117f1887defa65329bbba9fb0281c8570ea8e43cc993d4d859fe7eb2f52f55662e9ece845c2e665af03c913b83aad9be136f54078eb160dbcaf89042f263aae2d0afb74869aeee1b4c7f56dafffaf41bf5caaf3850e05b003d6f4b665c649373bf48cc7db8bceef55b5f71528702d0b4b70a9fd11098f69fca508e9d9e63981048d401d4b2ca353485a6b3d1b39614d6af90f6767a64e4460030a6ecc4ece4e3a567b922cb5e39bd4c02124c85feb5de64c64c39943fc319c7f4ef0f72335638ab28b7b20d88bf9eb8b4a638303c1da0dbf9abbbb5cafa0dc1e9a3ca9c8d662ae6028abdce6c3a5492e1347671f31b3aae756cc2dce94ea52a045baac8f8f320a3840a21c4363eb545dd2677879f24b5398546791b211f0eb34aa9a5e3388927340404670b038b5afa33f738f72b93aa44c8b4b5c6c459ca15772ce2ba1c5c9b49bd04af403d35ac87d7d13116ebca342750933335867b90261572b6d0078406f7afb383797a5f12c043b055baa459512d67e0d967c8510fdcfb3d4e2625cbff6ce2e301b96b410448cf3e700a3572fc5c181d6c26c8ca6a668a0af1e931df31fdf2c4a562fafee9214f08102e699ab073fe86c180f19ff17ff41e724f276b9d99343007013e2900cb8dcc54114a5ff2e374054ee612988616545d16c98e59b8ee8e2688cf90918e24db56e6cc3529c5084249963bf1e79573bbc258bfef1dfdf0a11912fe9f70afc5eeb5fcaca556b3b11f6c81a3c1caf81f77fc45a06c40a1512f97349f1b537f5d32fe5576de682aedc8ce6337823adacd53e5cdf25ab0ca53d3c4d4097b14e3bb005db21dd18911ceaf0ac85bd2df7fff8cb6fab29020dcb440d8712e9ab8164cd0117538985f93aedbeb7d174e52b8103ef5a5850f0a88f0fbec3c07ce23424c6d37c0f8ffe3de6ec0e972b219460bfdd91131d4b41842ab1460861a15e316e9bd640aecde4dd4fbac2b1485bdfb3b586cb66475c1dc5af93f7c3f7e6ee6fb50f146a67420dc22a7390541a0f7ddf451592a6bb7aa5ba8c7e549b7181b461d2cca2611adde640949e404a0edb3d691becbc71bd2b019cf2cc16414f474ae33988507475675cd82c43ddaae52c1b838a3b4fd283003dd02dc68d17a09625f82acc5af2d82bd0c1b9afdeb4dfe9a28156801fd9be2dc094f2d77869cd071d7cdbb01c956c10d955e3fbf95a1be58203ee816aa26aa11f22c96d9d1cefe9a87245c25043e9ad6465961fabaf4934ea86b61f675f5adc1c09398b343f681a3a84deb0777ecd119b94f51a4b1b201619938ba7950f2dd559b2d9c73702aafe8c6cee2cf0a271d9fe93f933e47950c95a6092c5c73351170e54483af30a48ee4cfbb7e08c27008cf130ac2d918e308cf7ec3f78e3f6ccb401f48048b3abface1fc26c390ca35a129a6b7c0e4516f7fe285ada737bc10438c1061fb0e8a679beb9df8e0c7dbf6846d618cceb383e50594652e27b7f8566fc11267b6f544dbec7cc284c570080f738ff5c176e1b6b88ca2e876d70adc79bbdb76fbaac085bbdd8f294df0bfe7c9d00ba21292760ec18eb8074a887d598945de0b85ff59d293412f07e52c9d1357cb01c4a34c035a7490c892a69b596ba4aada779889f92f5910e6cd069e604bebd416ebad5b66177a79bb7d75a0d1d4694781e30c221679ba2e15445438182c6dc3676769dda63bccfc8e67c65b99c9bcb83d7b9e7f6bb07630c5acf2d93ed1acce710394206f2d48f2e19ddffa74ae488013580405ae1620b22b12cb312e4f386caf1e8e09eefdedd8f3edf900d4c19fe9b96b52cb206b6c8562f86f6a0c41a8ee90600c0e272310249627f565962b51b861c75acc4af20153ec90b6206e5d6c774be4baa0bb36e4d3ca7013ddf0dcc0b9cf37bda6bf99cfd3d3bf1541fd1b895820e4c0e0af61726fb421e818b7dbba7aeadbcfd3f78a02363deba0d090c5b0fe1360d0c2da072555f967ab9a29c6435aa904a10b1e7e63d6f04b3f6c4b86ee62b6f5129575462df339fb36089bfb2dc8dd651825e103e8ec508938776a289577dce023ccb8b838124e542c6ae33ed77eb594fe43ae753a6684b2c4ec5fd76392ff97dd98395f43c4d8310ee84e337f6d8e049b476366aeeb9a2e89e771617f613962a9a8b66117814b64cd4481202c8e07ddbb027a18acd59fc1d0c80afcde3ed3f9ff9013b578022b6c25ccde415318d4d5e4bc3fcbb2f5f451a6fe28073321cb6b8933e42efbd1d1b087445fdb28ac9694e945db7be2c6cff134a4a8257dea6087f7a2f82f18b15980674cfd0d5f156982e0cf6a16fc5e0cac01aff4ad6027db77aa8257dc90979c6b1357c9e73472117b16c507b5f4a1177d2d1ca3393ad2506a7b83c2d60a06bf67224948c542cad9b29fd31b3024bd1c86ebf5f065cc396aeff78e33a392a0f49b12b6d1f36d748362e07d9f4cf9681a3480ca7e3b09d94358e0029d220603f92b4e1d5804813d0a9721d6c8936f2a91dfcf6f33390795593c60025fdedf696810cf5abbdba800454685bf22718f2cc69f9de571efe393f671ba623e46153a3d661d6991c6b51cba71786a4089e53daf1e45639d8a10c41c69f553e987be9392d44b1bad70874679cf71374905e127e49de1b5939847d7cb249dd742c853d6b3c8f10965470f3756b253180d65b57baac8eb738ea5fcef76759107f27a3b9286021198da4665c1ef3543f475592f7d27528c81b4355e8056cb1cd2fbec89be122b5b1df864f30a0a0e113b1c91a9ddc5d5a81f65d21d63af9a924e348d9fd8de059fa3d0abdfb61439c3ee1936d9cf8c946ca27c82f181d45325ba84c4a1f2cfc6cfaa91c196b2dde564ff8001f9f64f389799a4466638331c2d961df586a825c8e86a6b6101e5fb7162420647ca30f3a1883982515285e169123d785b83de80f20a8124486e9927f4b469d879ad99ec02527c41f459b4b4980ab2ca844dbe6ebd0693971df79ec9b8b159b9977359c21bbbbc7c2cd2c1a92278279961872c8bb1e263d5c0274fb5872717f0ee9ef3988391fb054486e230554366cd8568e0e7d095c9b5e1bed0c55b31d0d3a4702fe42c0139a00e67312d78692823702a012dae97eb5ddce2f4143f10f74ddeb258af46cf0343764e539101b00a6a3543025e2d22a62dc4e886e58f69fd6531ecab85e0b4935131d2ba2ebfbc1acaaacd763b9feb3589b1f402fcea192c707866b970fce272e3cc93e61d586826d58b07b95d7182e05ee61140ead3ef48c742b3a32f11bed8d0379a6cd5f20095e698e7bfcc0658592df0c5d6e7c1e6b18a71c39e1201bd88bc2d21b2f108f7528cde7ca6c53a1fab81c332644cd66fd24539aedf9e3e2d3acd9eb250db29bb10379901dc6a92767798242d18072ee29b98288d4dcc28975353b9541dc16fe9655d0529dc59b5ed22c2bb614154a8bf84f0b3c317fe2d333354c5a6da39baae1b58923802033047aeaa2754e0019eb0b32d04970e9f0f642b84a5b4ae19b21753c0a1b56521a04f354b53ada406e419be701fb1eecb4aa1b04c29b45efc77975b78a0c472ad96798ed9b7f2c2f071b43173fa27f4c8c721a06be8314bce18bd1518f93778e5cb1adbd6d6d69df52f9385b87f68cd8f0691e8b27c49c0da7d2224d6661b92a8ceb58f83afeeafa598e11acbbf68735438a8d4dc1f729a2a0c7b6b762c649364e2ac4e4952e0ff975607785385d4ccdf5cd4c4f1e8fc6680796c8cc8cce2d4a886a9989bcf84adc23d6cc25702c9f47df2ccf9c8eaaa0e821a6c5af71c070e40d6a9bb9bc1527b1276d8c2de0b9f15deac322e171c7015d95e5b89083e7231d505c1ca504c647093ea1468b2cbebfb1ebfedc3da7de8fe037ac54914b53123c081723aebabf46a3640c907425f954de9b29c557ad236ddf94a4be744d80099be601456920bfa79ba2e486b00e8cfa99eaed0199c40e91f3a5999d7a29efc55a360b37e7d4ddc468bdf100af3cb51e7bfb5cf5e51242a679fa63afebafb82c7fab1adbfac9a032f50437a8756c211a0735d6207c0566a1c6e61b3acc59935a3133f6d3285d0226f854339ebe4dce5d4904654901add39fe57007cdd035a3f323d623c33aa0328e63970c233cf7b7012e6665f79d0353b59a0c3d3525a3fc295fad64cf9e98ec191cf68ccf7ccbbba1a10fe5f66e8bd73448409c864a05bb16450fe57b3f24a80bceb4831a0c3b61e1070023f8e69039d409a4efb4b01b3a8568d943685e80796f02de5165e72a203fd4b57d4c5f33fc9b6da1fa6270d6b3bee03d6d55e10db148a86b9ce3c9b07efffc6f193681c39e534346849a0fd38ead3d9e65c7b41f121eabeea0dc7dc39ad9b64088b372332fcf6f8a232d0aca93073870fea1bb2ffc9314cb965aa1e6ce94e129b62f9e861f900a7e89ff2271b35bf37eceb3cbeb2185b8e229327a6ec8efe6a35e0d81ab71bf087425851e41c55cba0ab222b67f07b2e2deb85345d6c28ce38cf4aeeb0f4c402635b95999aea0e19e19bf5e328bee5e1f282de9e12c3b216cea3ab28185b28eb9e4bd44223304f1efcbc4ca9b8c9bc0b9a8c811bea742791c025c2499beeb0003658d5f96da68ac697199bdb5deeb15f7d0610524ecba82548598dff6f9215180a9a400e7a79b144d3f512708746bbdb2cb2e28432ac81199b3605ed7a80f1eee9e143d67a0d39c50487bce4b481a9791f48d1fb6ce9330992c6aa37f929f024658334217d0d5c6e1cd74277e3189c3237c1aa742f41f61a25236464eee8ddc37b98a1a9821f05a7af26f2f404e3dab32eef539fdaf7c4d46e0806887da7d253b527fa35c5a342315e1db35d26f7fda6cf984d4c1c360315807009745091581bd567e94030e0332380e68ef789b3241446dee3eb5cab8b817643a2b53a93db5342a52ea3384866c6563bd631f83acbad2ed736b91f0805df65504c6787f2c8130b176a85762aa765f3fd586d4cc4d5ea71f88ca575ddb9712cf6926b109947512351596b911061a2fc9552778d3024e581d6910dc93593c142335bfb2dfb8b40e5f41782e0e410d218f2e9f737fa3ddd371a82078d991ea9c8441625e751c144c71a94d3af143fc09ec94b933e8f1a1d0a7be2a6c3800aa8c5f09d36b7acce7652dde9b7e06b30faf1fa8275400373637d4ad43db1721ecb99438e0f2eea170f1c789051d7c5ca9dbaca84477a9e92903ec2efd66e733ea73aea55d78f22eef5490269f9f54da98a246a8cbb7319c3a4d53a1108ad1a2e45bfe2df775882b3ccfde5d00a07916bc26e627f616853ee6976d5cdd58fc646d1fb3614f1e8142b53f087291bd575d3a58b877bb3580221f5ff914cc7f19ff9df343eec0962", 0x1000}], 0x6, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {r8}}}, @rights={{0x28, 0x1, 0x1, [r9, r4, r3, r2, r1, r2]}}, @rights={{0x30, 0x1, 0x1, [r1, r7, r0, r3, 0xffffffffffffffff, r3, r10, r5]}}, @cred={{0x1c, 0x1, 0x2, {r11, 0xee00, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r7]}}, @cred={{0x1c, 0x1, 0x2, {r15, 0xffffffffffffffff, 0xee01}}}], 0xd0}, 0xc000) 578.302304ms ago: executing program 1 (id=9619): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000001000000080000000100000000000200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000a40eb6cf06bfa762c60f307616b61b591494caf743e498ed2ce8cee82877ad4e2dffed6854b1bd3d7b2b61bb4de215eb0eb2fe2d4fcd5fc256c62d9f8d167538e656a80df78b736e45c234915a35e42c6e651cf7ce87fc"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x61f1, r1, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000a00)=ANY=[@ANYBLOB="9feb0100180000000000000098000000980000000a000000040000000000000100000000550031010a00000000000012040000000f0000000000000100000000340060001000000000000010100000000000000000000003000000000300000001000000080000000500000003000006040000000d000000050000000b000000030000000900000000000100000000000300000d00000000060000000500000009000000020000000b0000000000000000db1e302e5f005f5f00ceb8c7656e"], &(0x7f0000000b80)=""/4096, 0xba, 0x1000, 0x1, 0x465535aa, 0x10000}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r5}, 0x18) socketpair$unix(0x1, 0x1, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r6}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r8, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000001a00), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x0, 0xfe, 0xfc, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000080)}, 0x108001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe80"], 0xfdef) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc"], 0x48) 577.843804ms ago: executing program 2 (id=9620): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000d4f957d60467b8e0f12be245b2fe0000000000000007"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r2}, 0x18) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 567.665474ms ago: executing program 3 (id=9621): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x5baed6c71352582, 0x0, 0x0}, 0x4c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f1, &(0x7f0000000900)={'ip6tnl0\x00', @random="0600002000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500000000000000", @ANYRES32, @ANYBLOB="00cf75ebbbfca758f800000000a6000000065fe6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000039c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe8}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0x11, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x18000000000002a0, 0x38, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e14f086dd", 0x0, 0x63, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 566.850154ms ago: executing program 4 (id=9622): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) (async) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000280)=ANY=[], 0x0, 0x2}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r4}, &(0x7f0000001c00), &(0x7f0000001c40)=r5}, 0x20) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='GPL\x00', 0xb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00'}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) close(r8) (async) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) close(r9) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) 553.838165ms ago: executing program 4 (id=9623): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/27], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000"], 0x0, 0x26}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3b}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) openat$cgroup_ro(r2, &(0x7f0000000200)='blkio.bfq.dequeue\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="f200000000000000b7043569353e43dd45cf9a0800000000ff00938af8ff00000000bfa24988f56d29360ea7eb409de3b1bc3f00000000000007029037caecc9eed98f5103d4f544d462040000000000f085000000210000e0a63f6469ea45daa843d752b6dc97dcdf6787b7ce44e7d46779a4272318a81fdd48f2a9cf36fd72c227e2014baacb9280112c74654c21948e62fd8bca60299334cd2bdde72ef721c0b4f52ef71ecb92b6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r4) 547.310436ms ago: executing program 1 (id=9624): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="b9ff03076804268c989e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc48, 0x8000}, 0x100018, 0xc8, 0x4, 0x5, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa54000085000000f90500009573c1f63a86"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000200)="b9ff03076804268c989e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)) (async) close(r1) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc48, 0x8000}, 0x100018, 0xc8, 0x4, 0x5, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa54000085000000f90500009573c1f63a86"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) write$cgroup_subtree(r8, &(0x7f0000000200)=ANY=[], 0x12) (async) 492.0545ms ago: executing program 2 (id=9625): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000380)='task_rename\x00', r0}, 0x18) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0x50) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='devlink_hwmsg\x00', r1, 0x0, 0x7}, 0x18) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r2, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000080), 0x8000, r4}, 0x38) bpf$ENABLE_STATS(0x20, &(0x7f0000000540), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r5, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000000fc0000000000", @ANYRES8=r3, @ANYBLOB="0d00ff0000000000830000000000000045", @ANYRES8=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, 0x0, r3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x400, 0x0) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f00000003c0)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 484.999571ms ago: executing program 1 (id=9626): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050000000500", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, 0x0, &(0x7f0000000180)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x16ec0, 0x0, 0x9, 0x6, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r1, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000002c0)=0x3) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[], 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r4, &(0x7f0000000380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018", @ANYRES32, @ANYBLOB="0000000000000000b708000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x50) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000002b00), 0x2, 0x0) 434.221285ms ago: executing program 0 (id=9627): r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0x94, 0x1, 0x2, 0x8, 0x0, 0x9, 0x4000, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6ce, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x2000, 0x8000, 0x9, 0x5, 0x6, 0x5dc, 0xe6d0, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x65, &(0x7f0000000540)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xbb, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000800)={0x1b, 0x0, 0x0, 0x4, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000900)={{0x1, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)='%pS \x00'}, 0x20) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0xfffffffd, 0x10}, 0xc) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000980)={r0, 0xffffffffffffffff}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x6, 0x28, &(0x7f00000001c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3880}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5cd, 0x0, 0x0, 0x0, 0xc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80}}], &(0x7f0000000300)='syzkaller\x00', 0x7, 0xa3, &(0x7f0000000340)=""/163, 0x40f00, 0x20, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x8, 0x5, 0x1}, 0x10, r3, r4, 0x0, &(0x7f00000009c0)=[r5, r6, r7, r8, r9, 0xffffffffffffffff], 0x0, 0x10, 0xfffffff8}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000ac0)={r9, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0xa, 0x24, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r11}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @jmp={0x5, 0x1, 0x3, 0x2, 0x2, 0x20, 0x1}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000c40)='GPL\x00', 0x4, 0xd4, &(0x7f0000000c80)=""/212, 0x40f00, 0xc, '\x00', r2, @fallback=0x2d, 0xffffffffffffffff, 0x8, &(0x7f0000000d80)={0x3, 0x3}, 0x8, 0x10, 0x0, 0x0, r3, r0, 0x0, &(0x7f0000000dc0)=[0xffffffffffffffff, r9, r8, r4, r0, r7, r1], 0x0, 0x10, 0x7}, 0x94) write$cgroup_subtree(r1, &(0x7f0000000ec0)={[{0x2b, 'hugetlb'}, {0x2d, 'memory'}, {0x2d, 'pids'}, {0x2b, 'pids'}, {0x2b, 'cpuset'}, {0x2d, 'net_prio'}, {0x2d, 'io'}]}, 0x33) openat$cgroup_pressure(r4, &(0x7f0000000f00)='cpu.pressure\x00', 0x2, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000f40)=@bloom_filter={0x1e, 0xa, 0x4, 0x400, 0x800, 0x1, 0x1, '\x00', 0x0, r4, 0x2, 0x0, 0x1, 0x3}, 0x50) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200)=r3, 0x4) r14 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_lsm={0x1d, 0x22, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @map_fd={0x18, 0x4, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0xce}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001100)='GPL\x00', 0x4, 0x89, &(0x7f0000001140)=""/137, 0x41100, 0x1, '\x00', r2, 0x1b, r13, 0x8, &(0x7f0000001240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x3, 0x2, 0x4, 0x4}, 0x10, r3, 0x0, 0x1, &(0x7f00000012c0)=[r4, r9, r1, r4, r4, r6, r7], &(0x7f0000001300)=[{0x4, 0x1, 0x2, 0x8}], 0x10, 0x1}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000001400)='%pS \x00') r15 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)={0x1b, 0x0, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0xf, '\x00', r2, r13, 0x4, 0x0, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x12, 0xf, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x1}, @jmp={0x5, 0x1, 0x1, 0x3, 0x3, 0xffffffffffffffe0, 0xffffffffffffffff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @exit, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}]}, &(0x7f00000014c0)='syzkaller\x00', 0x5, 0x34, &(0x7f0000001500)=""/52, 0x41000, 0x18, '\x00', r2, @fallback=0x13, r4, 0x8, &(0x7f0000001540)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0xd, 0x8, 0x10001}, 0x10, r3, r10, 0x0, &(0x7f0000001640)=[r1, r15], 0x0, 0x10, 0xb}, 0x94) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001880)={r7, &(0x7f0000001740)="6d11f8fbe07bb939b28ebadfbd538de7b1fb55ef645c09", &(0x7f0000001780)=""/227}, 0x20) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x9, 0x11, 0xe000000, 0x7, 0x10000, r12, 0xd4, '\x00', 0x0, r4, 0x4, 0x5, 0x4, 0x0, @void, @value, @value=r4}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001bc0)={&(0x7f00000018c0)="f833010c23203e9a004b1680214dd9cf6a70801abd9ace55620d3e8dc9f9341dbc9599c05980b4b30f1c96db3b3fc93440a6113fc290db009ed9df8ffb2ce0bc026325a42849f85b4683f13e", &(0x7f0000001940)=""/175, &(0x7f0000001a00)="617733bf57cad7762a4624896c9fa4c986785a328b35d55b263bcbc3c027e2e05a2d7aecdcf34ee056f1c6b68b8453836dab75216b5b6bcf7704577814f0b47011f45380e5e28e965307ae3eab0f956e104fa6bda47a4e8456b02eb71cd80b52590eeb96a30458ef998571cacfc70a3021180c3aadea412a546fd5046092d175d2fa2312e41d03fbfd1f87b0f70fa085dcb12545e9bdb53cdd", &(0x7f0000001ac0)="edba44c7dfeb3c433336ef2e4e35afcb094d762979ec66edb3d9f79abb7e20f41cb3fdb1de0b25c411d2f1e90ac2e68fee92f008d2cf94f2fcd60d75d8651bfdec14237b6a56eb7820d934ef6cf963f11f2d8c77d66c29eb1f84e30c2580d739bc7bd8c99af3", 0x7, r16, 0x4}, 0x38) r17 = openat$cgroup_ro(r14, &(0x7f0000001c00)='memory.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x2400, 0x6) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001cc0)={{r12}, &(0x7f0000001c40), &(0x7f0000001c80)=r17}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f0000001d00)=r17, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002040)={&(0x7f0000001d40)="99e7118ab8882a3cbc080a5c2f646b49e6a73687336bfe0c1f5ce510242bae9413adbf864aa31a", &(0x7f0000001d80)=""/219, &(0x7f0000001e80)="ea034803ae41f4df85b4afdad5bd142e5824c0ba51a71ad24c13a6c08948773fb651fea78c1975281815ee9ab4911f8b479d53a8c8fbb15f93674470feb4fced09f46723f7e36c69749078a1f8c476adb84c1cff6afcfdbce80910f5fc9a27f3c693cfd2318be50bbfaecf682f1440a2f6d262027ef76278f545909702c6bc37a126598eac3360ebaaf91b054120e40924c21c368810b2b7283b5cab21cbe150c06e53230f0606351f0d56fecb0231eebb398d32f9a8bdae399150c00b3d4886010fade74d389b0877598c4d16ff0395f9ad1c9a6ade2c422ae9d2c21b3d401d40d56c25b86fc281c828b0186e2e5046", &(0x7f0000001f80)="26b16b9c75edafc5eb0b9829445b1adde2485c8b90981944fc68412029cae19d0382ce36119282668ee5fb8225014a0dca7c373609643c1b79901e3a7415c3c6d60ca717623d3b9158f19f0a3f657b8dc0a22bedd08d20de1adc27a01b71ed018da3cf1c29e44d5a1295e8839b235c1ea3cc6379a6f228799bd26dfb15e32f921e4e25863e65c0a2070706a8ced909bf2275145688165304830314cf12c5e48e41cf35ebef0027", 0x1, r4, 0x4}, 0x38) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000002280)={0x1b, 0x0, 0x0, 0x6, 0x0, r6, 0xb467, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x50) 333.557523ms ago: executing program 3 (id=9628): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0x2003, 0xc, 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x12, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=r5, r4, 0x5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 322.535934ms ago: executing program 4 (id=9629): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000102c0)={r0, 0xe0, &(0x7f00000101c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000010000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000010040)=[0x0, 0x0], &(0x7f0000010080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x72, &(0x7f00000100c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000010100), &(0x7f0000010140), 0x8, 0xc6, 0x8, 0x8, &(0x7f0000010180)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x10, 0x14, &(0x7f00000007c0)=@ringbuf={{}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@tail_call], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r4}, 0x10) close(r3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000010580)=@bpf_tracing={0x1a, 0x2, &(0x7f0000010340)=@raw=[@map_fd={0x18, 0x5}], &(0x7f0000010380)='GPL\x00', 0x4, 0x67, &(0x7f00000103c0)=""/103, 0x41100, 0x75, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000010440)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000010480)={0x5, 0x0, 0x7f, 0x7}, 0x10, 0x2087d, 0xffffffffffffffff, 0x8, &(0x7f00000104c0)=[r8, r8, r8], &(0x7f0000010500)=[{0x2, 0x3, 0xd, 0x6}, {0x0, 0x5, 0xc, 0x4}, {0x1, 0x5, 0x3, 0x5}, {0x2, 0x3, 0xa, 0x3}, {0x2, 0x4, 0xc, 0x3}, {0x4, 0x5, 0x7, 0xa}, {0x1, 0x2, 0x7}, {0x3, 0x3, 0x5, 0x1}], 0x10, 0x4}, 0x94) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r9) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) setsockopt$sock_attach_bpf(r12, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r12) 290.637287ms ago: executing program 0 (id=9630): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x25c, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0xffff, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x18, 0xa274, 0x6, 0x2, 0x23061, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000600), &(0x7f00000005c0)}, 0x20) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r5, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000400), 0x0, 0xd6, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000480), 0x0, 0x0, 0xdb, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x7, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc98, 0x0, 0x0, 0x0, 0x6}, [@ldst={0x3, 0x0, 0x4, 0x2, 0x1, 0x50}, @jmp={0x5, 0x0, 0x8, 0x4, 0x9, 0xffffffffffffffe0, 0xfffffffffffffff0}, @map_fd={0x18, 0x2, 0x1, 0x0, r4}]}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41000, 0x44, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000340)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xd, 0x2, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r4], 0x0, 0x10, 0xc64}, 0x94) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@bloom_filter={0x1e, 0x0, 0xffff, 0x9, 0x8008, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3, 0x2}, 0x50) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x1, 0xb, 0x2, 0x8, 0x71b1e3e28dcd97f5, r10, 0x9, '\x00', r6, r7, 0x0, 0x3, 0x5, 0x0, @value, @void, @value=r2}, 0x50) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r13}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0xfffffffffffffffe, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r15) recvmsg$unix(r14, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000008100000081"], 0x48) write$cgroup_subtree(r16, &(0x7f0000000000)=ANY=[], 0x15) r17 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001300)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001400)={0x6, 0x29, &(0x7f0000001080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5f51f176, 0x0, 0x0, 0x0, 0x4cf}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_fd={0x18, 0x6, 0x1, 0x0, r1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4f84db5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @map_fd={0x18, 0x8, 0x1, 0x0, r3}, @call={0x85, 0x0, 0x0, 0xbe}, @map_idx={0x18, 0x7}]}, &(0x7f0000000400)='GPL\x00', 0xd, 0x24, &(0x7f0000000580)=""/36, 0x40f00, 0x2a, '\x00', r6, 0x25, r8, 0x8, &(0x7f0000000600)={0x7, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001380)=[0xffffffffffffffff, r9, r10, r11, r12, r17], &(0x7f00000013c0)=[{0x4, 0x1, 0x9, 0x3}], 0x10, 0x94c2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 161.129367ms ago: executing program 3 (id=9631): socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000004c0)=""/133, 0x85}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000600)=""/238, 0xee}, {&(0x7f0000000700)=""/13, 0xd}], 0x4, &(0x7f0000000780)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc8}, 0x22) gettid() recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x1b, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="1800b361444318c500004d030000000000000000900018450000ff070000000000000000000095f618a5ad36431821e2b5bf9863d7c1e0006ceb4196205c6c5674a075e430ee8b4e8bcb85b43d675cc064948357221be17b5161131034a5317a8af7a562cff0e2d0c80f7325ea3d"], 0x0, 0xb, 0x0, 0x0, 0x41000, 0xff, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000000d80), &(0x7f0000000dc0)=[{0x3, 0x5, 0xa, 0xa}, {0x1, 0x5, 0xe, 0x1}], 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000004000000000000000014c3bc229b35deed004000002ae4809200"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r4}, &(0x7f0000000200), &(0x7f0000000340)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00'}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x50) 159.824297ms ago: executing program 0 (id=9632): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0xb, 0xc, 0xf, 0x34e, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0xa}, 0x50) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r5, 0x4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) close(r2) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) 159.098017ms ago: executing program 2 (id=9633): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x4, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1001, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0xfffffffc, 0x7}, 0x0, 0xffffffffffffffff, r2, 0x0) (async) syz_open_procfs$namespace(0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000100000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0xc8, 0x0, 0x7, 0x0, 0x3, 0x5, 0x0, 0x102, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x1}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) (async) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r7}, &(0x7f0000000080), &(0x7f0000000180)=r8}, 0x20) (async) write$cgroup_subtree(r9, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102036c00fefd000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 113.410181ms ago: executing program 0 (id=9634): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001000)={0xb00, 0x0}, 0x8) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002140)={&(0x7f0000001040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x4, [@struct={0x10, 0x6, 0x0, 0x4, 0x0, 0x10001, [{0x10, 0x0, 0x7}, {0x4, 0x5, 0x6}, {0x8, 0x2, 0x9}, {0x10, 0x4, 0x1}, {0x14, 0x5, 0x4}, {0xa, 0x2, 0x3}]}, @typedef={0x9, 0x0, 0x0, 0x8, 0x5}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0x0, 0x5}, {0xe, 0x3}, {0x8, 0x5}, {0x1, 0x3}, {0x7, 0x1}, {0x8}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x9, 0x2}, {0xf, 0x1}, {0x9, 0x5}, {0x8009, 0x4}]}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000001140)=""/4096, 0xec, 0x1000, 0x1, 0x0, 0x10000}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='mm_page_alloc\x00', r3}, 0x18) (async) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000003000), 0x201, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002540)={r3, 0xe0, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000002280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f00000022c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002300)=[0x0, 0x0], 0x0, 0xb7, &(0x7f0000002340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000002380), &(0x7f00000023c0), 0x8, 0x7a, 0x8, 0x8, &(0x7f0000002400)}}, 0x10) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000003"], 0x48) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYRESHEX=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe}, 0x94) (rerun: 64) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r6) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002580)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="0000000000000000000000e6bbee4ef32f59c238a94772525da6e21138d3ac0adc7f5ed0ed9632343483a0a91c8e000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8982, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[], 0x50) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="d40200002000000018000000000000000000000000000000950000000000000038720a013653e84c584fdd38a1990000df9e190a587bed507002e83640d72226cbc0c89b926a26bce7509cb01faa84adcab3c3ca7654ee7c8532e9d31c4ee9f50b45c70263941287a6587f0574ece141dfa43e89cf14b4c24709cd16549d1a77630ee22b64da2c75c3eadf2f267fc9591999205f1d4848fe0c08b094b405e6fa589610085e19fe374560d6b6a92472049a9c91e9d2ee25b9cd3a6cf25196158238d177ada41056f16c99691e1089a9fb3c31ae2c5c9486ff0853b08119e935f5679e87301ac3819364c9ebcfb509d63c95832248f4b11982dbed0f6c133827"], &(0x7f00000000c0)='GPL\x00', 0x5, 0xdd, &(0x7f0000000000)=""/156}, 0x80) (async) bpf$MAP_CREATE(0x0, &(0x7f0000002200)=@base={0x1a, 0x1, 0x0, 0x8, 0x20, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x94) r11 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r9, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0], 0x0, 0x34, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000700), &(0x7f0000000880), 0x8, 0x31, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) (async, rerun: 32) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000ac0)={r8, 0xffffffffffffffff}, 0x4) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x17, 0xc, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7a}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xed40}}, @func={0x85, 0x0, 0x1, 0x0, 0x7f}]}, &(0x7f00000001c0)='GPL\x00', 0x1, 0xe5, &(0x7f0000000540)=""/229, 0x40f00, 0x2, '\x00', r12, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x2, 0x7, 0x9}, 0x10, 0x0, r10, 0x3, &(0x7f0000000b00)=[r13, r11, r8, r11, r8, r8, r11], &(0x7f0000000b40)=[{0x3, 0x5, 0x10, 0x1}, {0x2, 0x3, 0x4, 0x3}, {0x4, 0x1, 0xe}], 0x10, 0x3}, 0x94) (async, rerun: 32) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002180)=ANY=[@ANYBLOB="0200000f00000000000000000100000080000000", @ANYRES32=0x1, @ANYBLOB="ff0f00"/20, @ANYRES32=r12, @ANYRES32=r2, @ANYBLOB="03000000040000000400"/28], 0x50) (rerun: 32) 112.819611ms ago: executing program 2 (id=9635): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='fib_table_lookup\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="feffffff00"/19, @ANYRES32, @ANYBLOB="000000000100"/21], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="1b000000000100000b0000000080000000000000841fd4cf76326a7304c3338f220fcf003bb432a405a48f27da10c9ed489aa0671e745dd10989abddbdb52e20b46ff628fbf636e4c389f423e400118d3a053d620b2ebafd11090a8965373c593a763e6971cbe90e4a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000140)={0xffffffffffffffff, r1}, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000600)=r4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18f2fff7c9707aca1cd7", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYBLOB="aa47dfeb11f1cdf335964a3be4c07a2f0df4b00388f02bc898c641165d5d2ea0767d9371611090cc8ca1602d65dbce79d6fe001015bd9b93d03c415d48001fec0672c87a11c7fd709dad8fcf4b23c364e550fe0d3da6e623dcc549b73d876f46c4a4f065f725d7c6f1b42463ae3c0bc35a7ea09d36cde3340182eb62277824988038b37df1c9b67d34bffa8a31df9506b0e6baf8138422f79f3d93e44246157d40d407", @ANYRES32, @ANYBLOB="41964ba69100000000002000000000000000002200"/33], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4000, r6}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000740)={r7, &(0x7f00000004c0)="a1a0c7f8fa608035a7417aae2332bec8b67277a064f5e60940f07470e5ee81501a8a6fd90060ac882b01745c9eae386e", &(0x7f0000000680)=""/191}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYRES16], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7020000ffff0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 63.975815ms ago: executing program 4 (id=9636): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xa, 0x4, 0xfff, 0x7, 0x2}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0xc8, 0x0, 0x0, 0x7, 0xffffffff, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) close(r3) (async, rerun: 32) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 32) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r8, 0x0, 0x4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000005c0)='ns/uts\x00') bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff92) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x50, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x0, 0x810, 0x0, 0x5, 0x2, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0xb) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async, rerun: 32) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) (async) close(r9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r11, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 56.819616ms ago: executing program 0 (id=9637): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000580)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x6, 0xe, &(0x7f0000000940)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x7}, [@exit, @ldst={0x2, 0x2, 0x1, 0x8, 0xb, 0x80, 0xfffffffffffffffc}, @ldst={0x1, 0x0, 0x6, 0x4, 0x8, 0x6, 0xfffffffffffffff9}, @exit, @alu={0x3, 0x0, 0xd, 0x0, 0x2, 0xffffffffffffffc0}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x40}]}, &(0x7f00000001c0)='syzkaller\x00', 0xffff, 0x36, &(0x7f0000000540)=""/54, 0x41000, 0x22, '\x00', 0x0, @xdp, r2, 0x8, &(0x7f0000000680)={0x6, 0x2}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000b00)=[{0x4, 0x4, 0x4, 0x3}, {0x5, 0x4, 0xb, 0xc}, {0x5, 0x4, 0xe, 0xf}, {0x3, 0x3, 0x2, 0xb}, {0x3, 0x5, 0xc, 0xa}, {0x4, 0x5, 0x4, 0x1}], 0x10, 0x6}, 0x94) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000a00)={r2}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r3, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000300)=[0x0], &(0x7f0000000500)=[0x0], 0x0, 0x29, &(0x7f0000000580), 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x4b, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x6, 0x4, 0x8, 0xc, 0x19040, 0xffffffffffffffff, 0x0, '\x00', r4, r2, 0x0, 0x0, 0x0, 0x0, @value=r2, @void, @value=r2}, 0x50) close(0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000380), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000002b00), 0x2, 0x0) close(r7) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffc0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 0s ago: executing program 1 (id=9638): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x47, &(0x7f00000003c0)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x47, &(0x7f00000003c0)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext={0xff, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000028c0)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x8}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000640)='ext4_error\x00', r2}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000640)='ext4_error\x00', r2}, 0x18) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r7}, 0xc) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x110e22fff6) (async) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x110e22fff6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000001400010000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) kernel console output (not intermixed with test programs): 5.358350][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.386346][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.395549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.404119][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.411394][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.419329][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.428307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.437405][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.444653][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.525231][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.548191][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.556645][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.564927][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.586907][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.595991][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.609386][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.618293][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.630763][T10726] device veth0_vlan entered promiscuous mode [ 215.643675][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.659469][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.702261][T10726] device veth1_macvtap entered promiscuous mode [ 215.718789][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 215.757815][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 215.815005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 215.935199][T10803] tap0: tun_chr_ioctl cmd 1074025677 [ 215.940924][T10803] tap0: linktype set to 773 [ 216.016420][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.028562][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.053581][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.075282][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 217.205883][ T305] device bridge_slave_1 left promiscuous mode [ 217.212138][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.269016][ T305] device bridge_slave_0 left promiscuous mode [ 217.324883][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.357561][ T305] device veth0_vlan left promiscuous mode [ 228.023750][T10883] device sit0 left promiscuous mode [ 228.199185][T10883] device sit0 entered promiscuous mode [ 228.617995][T10922] device veth0_vlan left promiscuous mode [ 228.647289][T10922] device veth0_vlan entered promiscuous mode [ 228.738416][T10947] device veth1_vlan entered promiscuous mode [ 229.711451][T11022] device veth1_macvtap left promiscuous mode [ 229.752077][T11022] device macsec0 entered promiscuous mode [ 229.979354][T11024] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.005162][T11024] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.068730][T11024] device bridge_slave_0 entered promiscuous mode [ 230.125523][T11024] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.162715][T11024] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.180012][T11024] device bridge_slave_1 entered promiscuous mode [ 230.299427][T11024] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.307676][T11024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.315551][T11024] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.322940][T11024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.696115][T11063] device syzkaller0 entered promiscuous mode [ 230.741573][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.750231][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.758970][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.776859][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.785956][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.793895][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 230.804423][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.813462][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.820985][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 230.832901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.841558][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.865764][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.874307][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.900864][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.915620][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.979108][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.006884][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.061515][T11024] device veth0_vlan entered promiscuous mode [ 231.084491][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.102004][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.139886][T11024] device veth1_macvtap entered promiscuous mode [ 231.167099][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.178072][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.196005][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.232417][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.289131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.298288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.307487][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.330476][T11088] device sit0 entered promiscuous mode [ 231.795250][T11113] device sit0 entered promiscuous mode [ 232.071456][T11130] device veth1_to_team entered promiscuous mode [ 232.127871][T11130] device wg2 entered promiscuous mode [ 232.158438][T11134] device sit0 left promiscuous mode [ 232.188823][T11138] syz.4.3059[11138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.188883][T11138] syz.4.3059[11138] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.718834][ T305] device veth0_vlan left promiscuous mode [ 233.049871][T11171] device pim6reg1 entered promiscuous mode [ 233.343604][ T24] audit: type=1400 audit(1756401505.280:174): avc: denied { read } for pid=11180 comm="syz.4.3071" name="cgroup.subtree_control" dev="cgroup2" ino=339 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 233.445381][T11193] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.452686][T11193] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.469089][T11193] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.476450][T11193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.484008][T11193] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.491439][T11193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.499976][T11193] device bridge0 entered promiscuous mode [ 234.213098][T11219] device syzkaller0 entered promiscuous mode [ 235.585567][T11281] device syzkaller0 entered promiscuous mode [ 236.123098][T11296] device wg2 left promiscuous mode [ 236.305125][T11314] syz.1.3109[11314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.305184][T11314] syz.1.3109[11314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.341333][T11296] device wg2 entered promiscuous mode [ 238.171051][T11430] device veth1_macvtap left promiscuous mode [ 238.177890][T11430] device macsec0 entered promiscuous mode [ 238.233571][T11443] device wg2 left promiscuous mode [ 238.310443][T11453] device wg2 entered promiscuous mode [ 238.485983][T11476] device pim6reg1 entered promiscuous mode [ 238.539433][T11482] A6: renamed from team_slave_1 [ 239.211772][T11541] device sit0 entered promiscuous mode [ 239.561688][T11554] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.572729][T11554] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.665297][T11554] device bridge_slave_0 entered promiscuous mode [ 239.745731][T11554] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.847290][T11554] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.898860][T11554] device bridge_slave_1 entered promiscuous mode [ 240.117535][T11588] device syzkaller0 entered promiscuous mode [ 240.191185][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.200014][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.263818][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.278368][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.293364][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.300470][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.309349][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.318252][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.327053][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.334476][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.362728][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 240.378065][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.388540][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 240.419049][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 240.440432][T11554] device veth0_vlan entered promiscuous mode [ 240.469165][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.480458][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.490106][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.502867][T11554] device veth1_macvtap entered promiscuous mode [ 240.546365][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.567410][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.584307][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.717340][T11627] device veth1_macvtap left promiscuous mode [ 240.929970][ T305] device veth0_vlan left promiscuous mode [ 241.112785][T11648] syz.4.3205[11648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.112871][T11648] syz.4.3205[11648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.282318][T11659] device veth1_to_bond entered promiscuous mode [ 241.806170][T11682] device syzkaller0 entered promiscuous mode [ 242.127282][T11688] device pim6reg1 entered promiscuous mode [ 242.261254][T11706] device pim6reg1 entered promiscuous mode [ 244.093818][ T24] audit: type=1400 audit(1756401516.030:175): avc: denied { create } for pid=11853 comm="syz.3.3265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 244.272225][T11858] device syzkaller0 entered promiscuous mode [ 244.700586][T11868] device syzkaller0 entered promiscuous mode [ 244.791093][T11880] device syzkaller0 entered promiscuous mode [ 245.383283][T11936] device pim6reg1 entered promiscuous mode [ 245.410740][T11941] device veth0_vlan left promiscuous mode [ 245.445486][T11941] device veth0_vlan entered promiscuous mode [ 245.476569][T11947] device veth0_vlan left promiscuous mode [ 245.489462][T11947] device veth0_vlan entered promiscuous mode [ 245.555067][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.565859][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.574053][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.437235][T11978] : port 1(erspan0) entered blocking state [ 246.454956][T11978] : port 1(erspan0) entered disabled state [ 246.517121][T11978] device erspan0 entered promiscuous mode [ 246.556373][T11984] : port 1(erspan0) entered blocking state [ 246.562514][T11984] : port 1(erspan0) entered forwarding state [ 246.854481][T12003] device pim6reg1 entered promiscuous mode [ 247.287957][T12026] syz.1.3310[12026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.288057][T12026] syz.1.3310[12026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.770514][T12046] device pim6reg1 entered promiscuous mode [ 247.992565][T12059] device syzkaller0 entered promiscuous mode [ 248.905464][T12126] device macsec0 entered promiscuous mode [ 249.742133][T12190] device sit0 entered promiscuous mode [ 249.896681][T12196] device wg2 entered promiscuous mode [ 249.997373][T12217] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.004902][T12217] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.029271][T12212] device wg2 entered promiscuous mode [ 250.063719][T12217] device bridge_slave_1 left promiscuous mode [ 250.070701][T12217] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.085299][T12217] device bridge_slave_0 left promiscuous mode [ 250.091674][T12217] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.390988][T12239] device syzkaller0 entered promiscuous mode [ 250.561872][T12254] device sit0 left promiscuous mode [ 251.098884][T12256] device wg2 left promiscuous mode [ 251.157383][T12262] device sit0 entered promiscuous mode [ 253.116359][T12419] device sit0 left promiscuous mode [ 253.613263][T12429] device veth1_to_bond entered promiscuous mode [ 253.721952][T12436] device veth0_vlan left promiscuous mode [ 253.748932][T12436] device veth0_vlan entered promiscuous mode [ 254.040176][T12461] device macsec0 left promiscuous mode [ 254.223024][T12489] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.230263][T12489] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.238461][T12489] device bridge0 left promiscuous mode [ 254.609217][T12534] device wg2 entered promiscuous mode [ 254.806392][T12542] device syzkaller0 entered promiscuous mode [ 255.896235][T12610] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 256.073859][T12621] : renamed from bond_slave_0 [ 256.130504][T12630] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.138450][T12630] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.223091][T12630] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.230705][T12630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.238423][T12630] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.245704][T12630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.255627][T12630] device bridge0 entered promiscuous mode [ 256.263990][T12640] syz.1.3488[12640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.264086][T12640] syz.1.3488[12640] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.625336][T12662] device sit0 entered promiscuous mode [ 256.847207][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.318997][T12723] syz.0.3512[12723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.208108][T12786] syz.0.3531[12786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.254927][T12786] syz.0.3531[12786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.838331][T12832] syz.1.3548[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.871061][T12829] device veth0_vlan left promiscuous mode [ 258.903574][T12832] syz.1.3548[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.931270][T12831] syz.1.3548[12831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.953603][T12829] device veth0_vlan entered promiscuous mode [ 260.423317][T12931] device sit0 entered promiscuous mode [ 260.685599][T12948] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.694333][T12948] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.797335][T12959] device bridge_slave_1 left promiscuous mode [ 260.812883][T12959] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.874377][T12959] device bridge_slave_0 left promiscuous mode [ 260.984454][T12959] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.639163][T13027] device syzkaller0 entered promiscuous mode [ 262.982459][T13047] device pim6reg1 entered promiscuous mode [ 263.016432][T13051] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.024518][T13051] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.037376][T13051] device bridge0 left promiscuous mode [ 263.161896][T13055] device bridge_slave_1 left promiscuous mode [ 263.201077][T13055] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.253986][T13055] device bridge_slave_0 left promiscuous mode [ 263.274946][T13055] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.435228][T13063] syz.3.3616[13063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.435289][T13063] syz.3.3616[13063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.668737][T13099] device veth0_vlan left promiscuous mode [ 263.711738][T13099] device veth0_vlan entered promiscuous mode [ 263.780716][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.795274][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.804154][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.993647][T13117] device veth0_vlan left promiscuous mode [ 264.019913][T13117] device veth0_vlan entered promiscuous mode [ 264.072479][T13123] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.080979][T13123] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.228049][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 264.248822][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 264.296377][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 264.359919][T13134] device bridge_slave_1 left promiscuous mode [ 264.367001][T13134] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.375526][T13134] device bridge_slave_0 left promiscuous mode [ 264.382013][T13134] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.440165][T13135] : renamed from team_slave_1 [ 264.756095][ T24] audit: type=1400 audit(1756401536.700:176): avc: denied { create } for pid=13156 comm="syz.2.3643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 269.358174][T13350] device syzkaller0 entered promiscuous mode [ 269.379556][T13348] device pim6reg1 entered promiscuous mode [ 269.406929][T13352] syz.2.3701[13352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.406988][T13352] syz.2.3701[13352] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.661581][T13373] device sit0 left promiscuous mode [ 269.692714][T13373] device sit0 entered promiscuous mode [ 271.240105][T13523] device veth0_vlan left promiscuous mode [ 271.249485][T13523] device veth0_vlan entered promiscuous mode [ 271.257342][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.305696][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.354716][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 271.384284][T13524] device wg2 left promiscuous mode [ 272.774671][T13638] device wg2 entered promiscuous mode [ 273.409627][T13670] device syzkaller0 entered promiscuous mode [ 273.689701][T13690] device syzkaller0 entered promiscuous mode [ 274.984271][T13793] device wg2 entered promiscuous mode [ 275.836172][T13852] syz.0.3832[13852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.836260][T13852] syz.0.3832[13852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.509623][T13895] device syzkaller0 entered promiscuous mode [ 276.813357][T13904] geneve1: tun_chr_ioctl cmd 1074025672 [ 276.838455][T13904] geneve1: ignored: set checksum enabled [ 277.012454][T13911] device syzkaller0 entered promiscuous mode [ 278.522373][T14016] syz.3.3878[14016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.522451][T14016] syz.3.3878[14016] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.480193][T14079] device sit0 left promiscuous mode [ 279.508186][T14081] syz.4.3901[14081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.508325][T14081] syz.4.3901[14081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 279.538800][T14083] cgroup: fork rejected by pids controller in /syz3 [ 280.406949][T14210] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.420100][T14210] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.434015][T14210] device bridge_slave_0 entered promiscuous mode [ 280.473769][T14210] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.485243][T14210] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.493101][T14210] device bridge_slave_1 entered promiscuous mode [ 280.601076][T14245] device sit0 left promiscuous mode [ 280.790482][T14251] device sit0 entered promiscuous mode [ 281.222511][T14245] device pim6reg1 entered promiscuous mode [ 281.332177][T14265] device wg2 left promiscuous mode [ 281.386302][T14265] device veth0_vlan left promiscuous mode [ 281.398727][T14265] device veth0_vlan entered promiscuous mode [ 281.437411][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.461541][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.482507][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.542879][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.613759][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.621080][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.635179][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.643848][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.652423][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.690696][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.698716][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.711074][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.721140][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.728588][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.736846][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 281.745149][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.777830][ T305] device veth0_vlan left promiscuous mode [ 281.850219][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 281.863300][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.874936][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 281.883877][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.964341][T14294] device sit0 left promiscuous mode [ 282.123281][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 282.132364][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 282.151296][T14210] device veth0_vlan entered promiscuous mode [ 282.259994][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 282.268209][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 282.351403][T14210] device veth1_macvtap entered promiscuous mode [ 282.420050][ T24] audit: type=1400 audit(1756401554.360:177): avc: denied { attach_queue } for pid=14308 comm="syz.2.3934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 282.443353][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 282.452387][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 282.461197][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 282.560009][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 282.587645][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 282.599636][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 282.609020][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.626987][T14324] device wg2 entered promiscuous mode [ 282.807976][T14337] device syzkaller0 entered promiscuous mode [ 283.160177][T14357] device syzkaller0 entered promiscuous mode [ 284.376203][T14406] device pim6reg1 entered promiscuous mode [ 284.525914][T14416] device veth1_macvtap entered promiscuous mode [ 284.965255][T14449] device veth0_vlan left promiscuous mode [ 284.971811][T14449] device veth0_vlan entered promiscuous mode [ 289.810564][T14646] device wg2 left promiscuous mode [ 289.890435][T14646] device wg2 entered promiscuous mode [ 291.281949][T14718] device pim6reg1 entered promiscuous mode [ 291.302802][T14720] tun0: tun_chr_ioctl cmd 1074025676 [ 291.330351][T14720] tun0: owner set to 0 [ 291.436612][T14739] device veth0_vlan left promiscuous mode [ 291.443379][T14739] device veth0_vlan entered promiscuous mode [ 291.452194][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.463817][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.472551][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.228203][T14784] device wg2 left promiscuous mode [ 292.257422][T14784] device wg2 entered promiscuous mode [ 292.410711][T14801] syz.1.4078[14801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.410814][T14801] syz.1.4078[14801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.438796][T14800] syz.1.4078[14800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.454873][T14800] syz.1.4078[14800] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.484973][T14793] device veth1_macvtap left promiscuous mode [ 292.589465][T14793] device macsec0 left promiscuous mode [ 292.614412][T14802] device veth1_macvtap entered promiscuous mode [ 292.621404][T14802] device macsec0 entered promiscuous mode [ 292.634716][T14793] : renamed from vlan1 [ 292.664404][T14820] device pim6reg1 entered promiscuous mode [ 293.568260][T14926] device wg2 left promiscuous mode [ 293.575459][T14926] syz.3.4113[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.575520][T14926] syz.3.4113[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.125414][T15021] device syzkaller0 entered promiscuous mode [ 295.921689][T15045] device syzkaller0 entered promiscuous mode [ 296.049924][T15063] device syzkaller0 entered promiscuous mode [ 296.194600][T15087] device pim6reg1 entered promiscuous mode [ 296.700276][T15119] device pim6reg1 entered promiscuous mode [ 296.881449][T15141] device pim6reg1 entered promiscuous mode [ 297.157245][T15184] syz.4.4186[15184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.157304][T15184] syz.4.4186[15184] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.362798][T15196] device veth0_vlan left promiscuous mode [ 297.398825][T15196] device veth0_vlan entered promiscuous mode [ 297.451859][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.468489][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.484269][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.502999][T15184] device veth0_vlan left promiscuous mode [ 297.526051][T15184] device veth0_vlan entered promiscuous mode [ 297.601755][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.613602][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.663793][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 297.742352][T15219] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.749655][T15219] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.757159][T15219] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.764539][T15219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.772897][T15219] device bridge0 entered promiscuous mode [ 298.497941][T15244] device sit0 left promiscuous mode [ 298.623614][T15246] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.634914][T15246] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.684639][T15247] device sit0 entered promiscuous mode [ 298.862969][T15248] device bridge_slave_1 left promiscuous mode [ 298.874866][T15248] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.883029][T15248] device bridge_slave_0 left promiscuous mode [ 298.889561][T15248] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.009862][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 299.030713][T15256] device syzkaller0 entered promiscuous mode [ 299.407960][T15275] device pim6reg1 entered promiscuous mode [ 300.649421][T15327] device syzkaller0 entered promiscuous mode [ 300.986775][T15355] syz.3.4237[15355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.986823][T15355] syz.3.4237[15355] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.097506][T15362] device sit0 entered promiscuous mode [ 301.411783][T15393] : renamed from vlan1 [ 301.430373][T15391] device pim6reg1 entered promiscuous mode [ 301.463537][T15397] ref_ctr_offset mismatch. inode: 0x46a offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 301.670740][T15415] device pim6reg1 entered promiscuous mode [ 301.809266][T15439] device wg2 left promiscuous mode [ 301.868434][T15439] device wg2 entered promiscuous mode [ 303.451890][T15505] device sit0 left promiscuous mode [ 303.488372][T15505] device sit0 entered promiscuous mode [ 303.579855][T15514] device syzkaller0 entered promiscuous mode [ 303.767953][T15523] device pim6reg1 entered promiscuous mode [ 304.184535][T15576] device veth0_vlan left promiscuous mode [ 304.190873][T15576] device veth0_vlan entered promiscuous mode [ 304.241525][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.255659][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 304.294495][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 304.519549][T15611] device wg2 left promiscuous mode [ 305.129391][T15642] syz.0.4319[15642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.129448][T15642] syz.0.4319[15642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.680800][T15727] device syzkaller0 entered promiscuous mode [ 307.104620][T15752] device sit0 left promiscuous mode [ 307.271355][T15764] device sit0 entered promiscuous mode [ 307.478357][T15769] device veth0_vlan left promiscuous mode [ 307.484634][T15769] device veth0_vlan entered promiscuous mode [ 307.491833][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.500947][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.509026][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.467935][T15831] tun0: tun_chr_ioctl cmd 1074025676 [ 308.478972][T15831] tun0: owner set to 0 [ 308.526938][T15833] device pim6reg1 entered promiscuous mode [ 308.728158][T15835] device syzkaller0 entered promiscuous mode [ 308.988957][T15867] : renamed from vlan0 [ 309.471445][T15908] device pim6reg1 entered promiscuous mode [ 311.150992][T16024] device pim6reg1 entered promiscuous mode [ 312.470336][T16087] device veth1_macvtap left promiscuous mode [ 312.545829][T16087] device veth1_macvtap entered promiscuous mode [ 312.569218][T16087] device macsec0 entered promiscuous mode [ 313.121302][T16128] device pim6reg1 entered promiscuous mode [ 313.254254][T16139] device veth0_vlan left promiscuous mode [ 313.409963][T16139] device veth0_vlan entered promiscuous mode [ 313.759621][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.774069][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.790475][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 313.835243][T16152] device pim6reg1 entered promiscuous mode [ 313.974309][T16159] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 313.982734][T16159] syzkaller0: linktype set to 804 [ 314.112141][T16174] device syzkaller0 entered promiscuous mode [ 314.683015][T16211] device wg2 entered promiscuous mode [ 315.899951][T16268] device syzkaller0 entered promiscuous mode [ 316.276397][T16280] device syzkaller0 entered promiscuous mode [ 316.997416][T16328] device pim6reg1 entered promiscuous mode [ 317.193754][T16341] device wg2 entered promiscuous mode [ 317.326057][T16362] device veth1_macvtap left promiscuous mode [ 317.342809][T16362] device macsec0 left promiscuous mode [ 317.398287][T16371] device veth1_macvtap entered promiscuous mode [ 317.481035][T16371] device macsec0 entered promiscuous mode [ 317.658756][T16389] device syzkaller0 entered promiscuous mode [ 317.973452][T16397] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.981407][T16397] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.026226][T16397] device bridge0 left promiscuous mode [ 318.081873][T16393] device pim6reg1 entered promiscuous mode [ 319.445615][T16492] device pim6reg1 entered promiscuous mode [ 319.647308][T16507] device syzkaller0 entered promiscuous mode [ 321.058059][ T24] audit: type=1400 audit(1756401593.000:178): avc: denied { create } for pid=16588 comm="syz.4.4593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 321.274980][T16606] GPL: port 1(vlan0) entered blocking state [ 321.289652][T16606] GPL: port 1(vlan0) entered disabled state [ 321.326701][T16606] device vlan0 entered promiscuous mode [ 322.134352][T16649] device syzkaller0 entered promiscuous mode [ 323.802989][T16759] device pim6reg1 entered promiscuous mode [ 324.873758][T16852] device wg2 left promiscuous mode [ 325.720546][T16921] device syzkaller0 entered promiscuous mode [ 326.036044][T16945] device syzkaller0 entered promiscuous mode [ 327.303127][T17007] syz.1.4708[17007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.303185][T17007] syz.1.4708[17007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.020096][T17115] device pim6reg1 entered promiscuous mode [ 329.077677][T17117] device pim6reg1 entered promiscuous mode [ 330.216037][T17152] syz.1.4750[17152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.216120][T17152] syz.1.4750[17152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.555804][T17165] device pim6reg1 entered promiscuous mode [ 331.155205][T17178] device wg2 entered promiscuous mode [ 334.215278][T17318] device sit0 entered promiscuous mode [ 336.043375][T17401] syz.4.4823[17401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.043456][T17401] syz.4.4823[17401] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.641297][T17435] device wg2 left promiscuous mode [ 337.020656][T17458] syz.1.4840[17458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.020754][T17458] syz.1.4840[17458] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.204350][T17474] device wg2 left promiscuous mode [ 337.262568][T17473] device bridge_slave_1 entered promiscuous mode [ 337.354872][T17489] device pim6reg1 entered promiscuous mode [ 338.574349][T17528] device dummy0 entered promiscuous mode [ 339.266007][T17550] device syzkaller0 entered promiscuous mode [ 340.270299][T17618] device wg2 entered promiscuous mode [ 340.312457][T17617] device sit0 left promiscuous mode [ 340.323580][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 340.332576][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 340.340578][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 340.353189][T17622] device sit0 entered promiscuous mode [ 340.673084][T17647] device syzkaller0 entered promiscuous mode [ 340.713478][T17661] device sit0 left promiscuous mode [ 340.804430][T17662] device sit0 entered promiscuous mode [ 341.121508][T17681] device sit0 entered promiscuous mode [ 341.577785][T17748] syz.0.4927[17748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.577839][T17748] syz.0.4927[17748] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.712812][T17730] device syzkaller0 entered promiscuous mode [ 341.966121][T17771] device syzkaller0 entered promiscuous mode [ 342.138294][T17807] device pim6reg1 entered promiscuous mode [ 342.272411][T17814] device veth0_vlan left promiscuous mode [ 342.292414][T17814] device veth0_vlan entered promiscuous mode [ 342.316937][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.325671][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 342.333336][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.937380][T17857] device wg2 entered promiscuous mode [ 343.222148][T17859] device macsec0 entered promiscuous mode [ 343.569957][T17863] device syzkaller0 entered promiscuous mode [ 343.703899][T17871] device veth1_macvtap left promiscuous mode [ 343.710336][T17871] device macsec0 left promiscuous mode [ 343.772598][T17871] device veth1_macvtap entered promiscuous mode [ 343.782762][T17871] device macsec0 entered promiscuous mode [ 343.798899][T17873] device pim6reg1 entered promiscuous mode [ 345.475945][T17985] device syzkaller0 entered promiscuous mode [ 346.123020][T18003] device veth0_vlan left promiscuous mode [ 346.158619][T18003] device veth0_vlan entered promiscuous mode [ 346.220187][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.251110][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.259149][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.575534][T18026] device wg2 entered promiscuous mode [ 347.345632][T18082] device wg2 entered promiscuous mode [ 347.772655][T18131] device veth0_vlan left promiscuous mode [ 347.796578][T18131] device veth0_vlan entered promiscuous mode [ 347.810760][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.827296][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.868441][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.015951][T18139] syz.3.5044[18139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.016043][T18139] syz.3.5044[18139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.109803][T18149] device pim6reg1 entered promiscuous mode [ 348.316918][T18160] device sit0 left promiscuous mode [ 349.083141][T18179] device wg2 left promiscuous mode [ 349.195881][T18179] device wg2 entered promiscuous mode [ 351.808439][T18228] device wg2 left promiscuous mode [ 351.965969][T18228] device wg2 entered promiscuous mode [ 352.864248][T18297] device syzkaller0 entered promiscuous mode [ 352.891813][T18289] device pim6reg1 entered promiscuous mode [ 352.913922][T18297] device syzkaller0 left promiscuous mode [ 353.307052][T18342] device veth1_macvtap left promiscuous mode [ 353.313505][T18342] device macsec0 entered promiscuous mode [ 353.325724][T18342] device veth1_macvtap entered promiscuous mode [ 353.759131][T18384] device syzkaller0 entered promiscuous mode [ 354.516673][T18424] device syzkaller0 entered promiscuous mode [ 354.671756][T18436] device pim6reg1 entered promiscuous mode [ 356.181718][T18519] device pim6reg1 entered promiscuous mode [ 356.770965][T18573] device sit0 left promiscuous mode [ 357.218332][T18587] device wg2 left promiscuous mode [ 357.224318][T18589] device wg2 entered promiscuous mode [ 358.155963][T18648] GPL: port 1(erspan0) entered blocking state [ 358.162287][T18648] GPL: port 1(erspan0) entered disabled state [ 358.172325][T18648] device erspan0 entered promiscuous mode [ 358.181445][T18641] GPL: port 1(erspan0) entered blocking state [ 358.188129][T18641] GPL: port 1(erspan0) entered forwarding state [ 358.209029][T18643] device sit0 left promiscuous mode [ 358.470899][T18662] device sit0 entered promiscuous mode [ 359.987114][T18787] device wg2 left promiscuous mode [ 360.024864][T18787] device wg2 entered promiscuous mode [ 360.162926][T18791] device veth0_vlan left promiscuous mode [ 360.193246][T18791] device veth0_vlan entered promiscuous mode [ 360.255686][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.325758][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 360.358358][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 362.185818][T18874] device syzkaller0 entered promiscuous mode [ 363.089984][T18905] device syzkaller0 entered promiscuous mode [ 363.116402][T18898] device wg2 left promiscuous mode [ 363.157198][T18905] device syzkaller0 left promiscuous mode [ 363.265568][T18944] device macsec0 left promiscuous mode [ 363.528803][T18979] syz.0.5298[18979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.528865][T18979] syz.0.5298[18979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.761862][T18989] device veth0_vlan left promiscuous mode [ 363.831110][T18989] device veth0_vlan entered promiscuous mode [ 363.862967][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.877168][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 363.928409][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.011917][T19016] device veth1_macvtap left promiscuous mode [ 364.034278][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 365.604081][T19217] syz.0.5369[19217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.604137][T19217] syz.0.5369[19217] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.143489][T19237] device wg2 left promiscuous mode [ 366.226340][T19237] device veth1_to_team entered promiscuous mode [ 366.334236][T19255] device wg2 entered promiscuous mode [ 366.612858][T19281] device xfrm0 entered promiscuous mode [ 366.659061][T19284] device syzkaller0 entered promiscuous mode [ 366.675041][T19285] device wg2 left promiscuous mode [ 367.775250][T19402] device sit0 left promiscuous mode [ 368.564155][T19460] device wg0 entered promiscuous mode [ 369.416551][T19515] syz.3.5453[19515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.416654][T19515] syz.3.5453[19515] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.769321][T19552] : renamed from vlan1 [ 370.171950][T19606] device pim6reg1 entered promiscuous mode [ 371.479557][T19678] syz.0.5500[19678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.480795][T19678] syz.0.5500[19678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.962802][T19702] device syzkaller0 entered promiscuous mode [ 372.693892][T19725] syz.1.5512[19725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.693953][T19725] syz.1.5512[19725] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.948262][T19725] pim6reg0: tun_chr_ioctl cmd 3221517374 [ 373.315596][T19768] device wg2 left promiscuous mode [ 373.361226][T19768] device wg2 entered promiscuous mode [ 373.448992][T19776] device syzkaller0 entered promiscuous mode [ 374.875195][T19823] device veth0_vlan left promiscuous mode [ 374.921649][T19823] device veth0_vlan entered promiscuous mode [ 375.403859][T19870] device syzkaller0 entered promiscuous mode [ 376.032069][ T24] audit: type=1400 audit(1756401647.970:179): avc: denied { create } for pid=19939 comm="syz.0.5571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 376.156112][T19957] device pim6reg1 entered promiscuous mode [ 376.668972][T19976] syz.4.5581[19976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.669033][T19976] syz.4.5581[19976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.745153][T19976] syz.4.5581[19976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.770266][T19976] syz.4.5581[19976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.092958][T20055] -1: renamed from syzkaller0 [ 378.489318][T20070] device veth1_macvtap entered promiscuous mode [ 378.533899][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 378.678535][T20073] device syzkaller0 entered promiscuous mode [ 378.964185][T20087] device syzkaller0 entered promiscuous mode [ 379.261701][ T24] audit: type=1400 audit(1756401651.200:180): avc: denied { setattr } for pid=20111 comm="syz.4.5619" path="pipe:[49082]" dev="pipefs" ino=49082 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 379.377474][T20117] device wg2 entered promiscuous mode [ 380.850802][T20214] device wg2 left promiscuous mode [ 382.270743][T20313] syz.2.5672[20313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.270810][T20313] syz.2.5672[20313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.319281][T20313] syz.2.5672[20313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.378168][T20313] syz.2.5672[20313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.493353][T20316] device wg2 entered promiscuous mode [ 383.349671][T20365] device wg2 entered promiscuous mode [ 383.364268][T20367] device wg2 left promiscuous mode [ 384.712778][T20436] device veth0_vlan left promiscuous mode [ 384.734069][T20436] device veth0_vlan entered promiscuous mode [ 384.810542][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 384.830660][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 384.868312][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 386.089118][T20501] device syzkaller0 entered promiscuous mode [ 387.595128][T20703] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.602633][T20703] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.610551][T20703] device bridge_slave_0 entered promiscuous mode [ 387.617905][T20703] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.625162][T20703] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.644347][T20703] device bridge_slave_1 entered promiscuous mode [ 387.946858][T20703] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.954852][T20703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 387.962860][T20703] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.970115][T20703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.096150][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.104414][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.119846][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.154238][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.165521][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.173037][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.177808][T20752] syz.0.5772[20752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.181700][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.194864][T20752] syz.0.5772[20752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.205486][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.224208][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.252361][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.274054][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.305386][T20754] device wg2 left promiscuous mode [ 388.313545][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.322277][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.334196][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.352842][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.371393][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.379327][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.405562][T20703] device veth0_vlan entered promiscuous mode [ 388.460120][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.483055][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.555782][T20703] device veth1_macvtap entered promiscuous mode [ 388.680493][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.695103][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 388.714146][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.741059][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 388.765232][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 388.923808][T20788] device veth0_vlan left promiscuous mode [ 388.960612][T20788] device veth0_vlan entered promiscuous mode [ 389.031131][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.040376][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.049000][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 389.067140][T20795] -1: renamed from syzkaller0 [ 389.178695][ T305] : port 1(erspan0) entered disabled state [ 389.197075][ T305] device erspan0 left promiscuous mode [ 389.213276][ T305] : port 1(erspan0) entered disabled state [ 389.250755][T20796] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.273051][T20796] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.285226][T20796] device bridge_slave_0 entered promiscuous mode [ 389.355958][T20796] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.363121][T20796] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.379579][T20796] device bridge_slave_1 entered promiscuous mode [ 389.797532][ T305] device veth1_macvtap left promiscuous mode [ 390.014206][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 390.034574][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 390.091685][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 390.115535][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 390.127447][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 390.134520][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 390.165143][T20840] device veth1_macvtap entered promiscuous mode [ 390.210687][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 390.221055][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 390.241386][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 390.278059][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 390.327206][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 390.334560][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 390.483086][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 390.512476][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 390.597971][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 390.642154][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 390.697132][T20796] device veth0_vlan entered promiscuous mode [ 390.714614][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 390.737578][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 390.838718][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 390.878401][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.965074][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 390.980056][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 390.994427][T20796] device veth1_macvtap entered promiscuous mode [ 391.043241][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 391.069254][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 391.107890][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 391.157189][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 391.205155][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 392.585336][ T305] device vlan0 left promiscuous mode [ 392.591218][ T305] GPL: port 1(vlan0) entered disabled state [ 392.644977][ T305] device bridge_slave_1 left promiscuous mode [ 392.651746][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.715182][ T305] device bridge_slave_0 left promiscuous mode [ 392.721760][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.824849][ T305] device veth1_macvtap left promiscuous mode [ 403.035867][T20886] device pim6reg1 entered promiscuous mode [ 403.211350][T20897] device sit0 entered promiscuous mode [ 403.524481][T20917] device sit0 left promiscuous mode [ 403.714233][T20926] device syzkaller0 entered promiscuous mode [ 403.749568][T20932] device syzkaller0 entered promiscuous mode [ 403.779983][T20932] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 404.303983][T20944] device wg2 left promiscuous mode [ 404.336470][T20950] device macsec0 entered promiscuous mode [ 404.801986][T21010] device veth0_vlan left promiscuous mode [ 404.819304][T21010] device veth0_vlan entered promiscuous mode [ 404.855970][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.878061][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 404.901800][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 405.106429][T21054] device syzkaller0 entered promiscuous mode [ 405.430603][T21082] device syzkaller0 entered promiscuous mode [ 405.573508][T21090] : renamed from team_slave_1 [ 406.996287][T21168] device sit0 entered promiscuous mode [ 407.592230][T21201] device erspan0 left promiscuous mode [ 407.606994][T21201] GPL: port 1(erspan0) entered disabled state [ 407.654236][T21207] device wg2 left promiscuous mode [ 407.715390][T21207] device wg2 entered promiscuous mode [ 408.371534][T21271] device GPL entered promiscuous mode [ 408.388841][T21272] device syzkaller0 entered promiscuous mode [ 409.085416][T21307] device pim6reg1 entered promiscuous mode [ 409.182614][T21319] device pim6reg1 entered promiscuous mode [ 409.422830][T21348] : port 1(veth0_to_team) entered blocking state [ 409.437855][T21348] : port 1(veth0_to_team) entered disabled state [ 409.452773][T21348] device veth0_to_team entered promiscuous mode [ 409.735571][T21385] device pim6reg1 entered promiscuous mode [ 409.753368][T21385] device sit0 entered promiscuous mode [ 410.519785][T21422] device sit0 left promiscuous mode [ 410.634371][T21429] device sit0 entered promiscuous mode [ 410.770729][T21442] device syzkaller0 entered promiscuous mode [ 410.935985][T21462] : port 1(veth0_to_team) entered blocking state [ 410.943046][T21462] : port 1(veth0_to_team) entered disabled state [ 410.951384][T21462] device veth0_to_team entered promiscuous mode [ 411.492647][T21521] : port 1(veth0_to_team) entered blocking state [ 411.499988][T21521] : port 1(veth0_to_team) entered disabled state [ 411.512108][T21521] device veth0_to_team entered promiscuous mode [ 411.894582][T21524] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.905144][T21524] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.913333][T21524] device bridge_slave_0 entered promiscuous mode [ 411.931852][T21524] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.944796][T21524] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.960853][T21524] device bridge_slave_1 entered promiscuous mode [ 412.086639][T21551] device sit0 left promiscuous mode [ 412.289589][T21552] device sit0 entered promiscuous mode [ 412.420216][T21561] syz.3.6004[21561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.420278][T21561] syz.3.6004[21561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.563361][T21564] device pim6reg1 entered promiscuous mode [ 412.635686][T21524] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.643243][T21524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.650701][T21524] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.658381][T21524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.782865][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.792438][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.949060][T21592] device syzkaller0 entered promiscuous mode [ 412.956384][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 412.970920][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 413.023134][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 413.031779][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 413.041057][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.048448][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.079551][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 413.089685][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 413.100367][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.107751][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.181388][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 413.197180][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 413.260089][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 413.271241][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 413.401250][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 413.410403][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 413.430174][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 413.451396][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.496196][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 413.523103][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 413.558720][T21524] device veth0_vlan entered promiscuous mode [ 413.602153][T21620] device syzkaller0 entered promiscuous mode [ 413.614749][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 413.623283][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 413.660611][T21524] device veth1_macvtap entered promiscuous mode [ 413.678449][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 413.686537][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 413.696809][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 413.713006][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 413.721817][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 413.807537][ T7] device veth1_macvtap left promiscuous mode [ 413.825530][ T7] device veth0_vlan left promiscuous mode [ 414.338589][T21645] device pim6reg1 entered promiscuous mode [ 415.670815][T21690] device pim6reg1 entered promiscuous mode [ 416.545260][T21733] device pim6reg1 entered promiscuous mode [ 416.722802][T21749] syz.3.6056[21749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.722888][T21749] syz.3.6056[21749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.127965][T21815] syz.2.6080[21815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.234874][T21815] syz.2.6080[21815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.765652][T21866] device veth0_vlan left promiscuous mode [ 418.804596][T21866] device veth0_vlan entered promiscuous mode [ 419.320766][T21908] device syzkaller0 entered promiscuous mode [ 420.842067][T22035] device syzkaller0 entered promiscuous mode [ 421.461182][T22034] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.468481][T22034] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.476428][T22034] device bridge_slave_0 entered promiscuous mode [ 421.496747][T22034] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.504075][T22034] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.512146][T22034] device bridge_slave_1 entered promiscuous mode [ 421.746890][T22061] device syzkaller0 entered promiscuous mode [ 421.836886][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 421.855285][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.896535][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 421.907897][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.917034][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.924189][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.932258][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 421.941258][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.950181][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.957755][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.965721][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 421.974040][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.983274][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 421.993259][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 422.001714][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 422.015681][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 422.024604][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 422.049867][T22034] device veth0_vlan entered promiscuous mode [ 422.068434][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 422.080085][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.099451][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.114170][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.183345][T22105] GPL: port 1(erspan0) entered blocking state [ 422.189687][T22105] GPL: port 1(erspan0) entered disabled state [ 422.196856][T22105] device erspan0 entered promiscuous mode [ 422.209162][T22105] GPL: port 1(erspan0) entered blocking state [ 422.215399][T22105] GPL: port 1(erspan0) entered forwarding state [ 422.250928][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 422.283763][T22034] device veth1_macvtap entered promiscuous mode [ 422.313631][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 422.335054][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 422.374480][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 422.385227][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 422.731203][T22132] device syzkaller0 entered promiscuous mode [ 423.372190][T22163] device sit0 left promiscuous mode [ 423.460621][T22163] device sit0 entered promiscuous mode [ 424.787050][ T7] device veth0_to_team left promiscuous mode [ 424.794937][ T7] : port 1(veth0_to_team) entered disabled state [ 424.804245][ T7] device veth1_macvtap left promiscuous mode [ 424.812575][ T7] device veth0_vlan left promiscuous mode [ 425.175333][T22246] device sit0 entered promiscuous mode [ 425.297451][T22270] device sit0 left promiscuous mode [ 429.021171][T22371] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.032306][T22371] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.099130][T22380] device bridge_slave_1 left promiscuous mode [ 429.111542][T22380] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.152912][T22380] device bridge_slave_0 left promiscuous mode [ 429.159540][T22380] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.379179][T22396] syz.1.6241[22396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.379242][T22396] syz.1.6241[22396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.415380][T22396] syz.1.6241[22396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.439869][T22396] syz.1.6241[22396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.557899][T22396] syz.1.6241[22396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.574828][T22396] syz.1.6241[22396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.605038][T22402] device pim6reg1 entered promiscuous mode [ 429.856968][T22409] device syzkaller0 entered promiscuous mode [ 429.950405][T22431] syz.2.6252[22431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.950471][T22431] syz.2.6252[22431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.051492][T22431] device wg2 entered promiscuous mode [ 430.817110][T22478] device pim6reg1 entered promiscuous mode [ 431.055003][T22502] device sit0 left promiscuous mode [ 431.479704][T22541] device wg2 entered promiscuous mode [ 432.558375][T22597] device wg2 left promiscuous mode [ 432.963912][T22615] device sit0 entered promiscuous mode [ 433.081190][T22629] device sit0 left promiscuous mode [ 434.063407][T22652] device pim6reg1 entered promiscuous mode [ 435.645667][T22776] syzkaller0: refused to change device tx_queue_len [ 435.862047][T22799] device syzkaller0 entered promiscuous mode [ 436.484964][T22817] device sit0 entered promiscuous mode [ 437.534980][T22844] syz.0.6371[22844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.535080][T22844] syz.0.6371[22844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 438.911329][T22884] syz.0.6382[22884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.013414][T22884] syz.0.6382[22884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.398311][T23035] device veth1_macvtap left promiscuous mode [ 442.012267][T23057] : renamed from team_slave_1 [ 442.242593][T23076] device veth0_vlan left promiscuous mode [ 442.262152][T23076] device veth0_vlan entered promiscuous mode [ 442.332163][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.350570][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 442.395073][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.545134][T23087] device syzkaller0 entered promiscuous mode [ 442.749722][T23096] device pim6reg1 entered promiscuous mode [ 442.921929][T23106] device syzkaller0 entered promiscuous mode [ 443.756566][T23149] syz.2.6458[23149] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.947008][T23158] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.967547][T23158] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.003274][T23160] device bridge_slave_1 left promiscuous mode [ 444.009857][T23160] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.023421][T23160] device bridge_slave_0 left promiscuous mode [ 444.030061][T23160] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.323143][T23180] device wg2 entered promiscuous mode [ 444.425041][T23188] device syzkaller0 entered promiscuous mode [ 446.757399][T23346] device wg2 entered promiscuous mode [ 446.779978][T23351] syz.3.6515[23351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.780031][T23351] syz.3.6515[23351] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.989356][T23383] device syzkaller0 entered promiscuous mode [ 448.059657][T23403] device syzkaller0 entered promiscuous mode [ 449.219554][T23464] device syzkaller0 entered promiscuous mode [ 449.421386][T23479] syz.1.6552[23479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.421447][T23479] syz.1.6552[23479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 450.230632][T23534] device pim6reg1 entered promiscuous mode [ 450.382973][T23545] device wg2 left promiscuous mode [ 450.419059][T23545] device wg2 entered promiscuous mode [ 451.151415][T23637] device pim6reg1 entered promiscuous mode [ 451.595008][T23668] device veth1_macvtap left promiscuous mode [ 451.601358][T23668] device macsec0 entered promiscuous mode [ 452.142244][T23677] device syzkaller0 entered promiscuous mode [ 453.240763][T23706] device syzkaller0 entered promiscuous mode [ 454.461313][T23736] device wg2 entered promiscuous mode [ 455.670562][T23821] device syzkaller0 entered promiscuous mode [ 456.252552][T23844] device syzkaller0 entered promiscuous mode [ 456.538771][T23858] device pim6reg1 entered promiscuous mode [ 456.990061][T23913] device wg2 entered promiscuous mode [ 457.100387][T23923] syz.4.6682[23923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.100481][T23923] syz.4.6682[23923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.173369][T23921] GPL: port 1(erspan0) entered blocking state [ 457.192112][T23921] GPL: port 1(erspan0) entered disabled state [ 457.206373][T23921] device erspan0 entered promiscuous mode [ 457.228146][T23928] GPL: port 1(erspan0) entered blocking state [ 457.234293][T23928] GPL: port 1(erspan0) entered forwarding state [ 457.303754][T23939] device pim6reg1 entered promiscuous mode [ 458.333157][T24003] bridge0: port 1(bridge_slave_0) entered blocking state [ 458.353300][T24003] bridge0: port 1(bridge_slave_0) entered disabled state [ 458.369864][T24003] device bridge_slave_0 entered promiscuous mode [ 458.403701][T24003] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.430373][T24003] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.488291][T24003] device bridge_slave_1 entered promiscuous mode [ 459.048380][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 459.057157][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 459.067178][T24053] syz.0.6718[24053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.067229][T24053] syz.0.6718[24053] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.115015][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 459.145453][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 459.179041][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 459.186852][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 459.207163][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 459.225125][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 459.233695][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 459.240952][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 459.261704][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 459.275600][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 459.289746][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 459.303966][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 459.371298][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 459.386005][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 459.420494][T24003] device veth0_vlan entered promiscuous mode [ 459.430897][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.442813][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 459.457519][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 459.489357][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 459.536787][T24003] device veth1_macvtap entered promiscuous mode [ 459.588403][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 459.607623][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 459.835388][T24063] device syzkaller0 entered promiscuous mode [ 459.861261][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 459.870293][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 459.945193][ T7] device veth0_to_team left promiscuous mode [ 459.962720][ T7] : port 1(veth0_to_team) entered disabled state [ 460.156173][T24095] syzkaller0: tun_chr_ioctl cmd 1074025675 [ 460.177057][T24095] syzkaller0: persist disabled [ 462.405157][T24141] syz.1.6745[24141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 462.405246][T24141] syz.1.6745[24141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.060566][T24156] device sit0 entered promiscuous mode [ 463.183042][T24172] syz.4.6753[24172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.183130][T24172] syz.4.6753[24172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.444558][T24187] device pim6reg1 entered promiscuous mode [ 464.347898][T24217] device syzkaller0 entered promiscuous mode [ 465.320331][T24285] device syzkaller0 entered promiscuous mode [ 465.933227][T24318] device veth1_macvtap left promiscuous mode [ 466.413898][T24343] device wg2 entered promiscuous mode [ 467.176773][T24384] device pim6reg1 entered promiscuous mode [ 469.385568][T24456] syz.1.6836[24456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.385628][T24456] syz.1.6836[24456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.455212][T24468] device sit0 left promiscuous mode [ 469.735868][T24474] syz.3.6841[24474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.735951][T24474] syz.3.6841[24474] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.377519][T24483] device pim6reg1 entered promiscuous mode [ 471.292847][T24513] device sit0 entered promiscuous mode [ 471.565350][T24525] device wg2 left promiscuous mode [ 471.641258][T24525] device wg2 entered promiscuous mode [ 471.698681][T24528] device sit0 left promiscuous mode [ 472.503561][T24564] device wg2 left promiscuous mode [ 472.513107][T24564] syz.2.6865[24564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.513168][T24564] syz.2.6865[24564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.638509][T24564] device wg2 entered promiscuous mode [ 472.919526][T24590] syz.1.6872[24590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.919615][T24590] syz.1.6872[24590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.132331][T24603] device syzkaller0 entered promiscuous mode [ 473.836814][T24662] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.845113][T24662] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.853030][T24662] device bridge_slave_0 entered promiscuous mode [ 473.861994][T24662] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.869706][T24662] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.878395][T24662] device bridge_slave_1 entered promiscuous mode [ 473.930576][T24662] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.937862][T24662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.945441][T24662] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.952648][T24662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.964994][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.985514][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.008550][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 474.016730][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 474.043959][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 474.053279][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 474.062221][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.069498][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.079248][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 474.087937][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 474.096608][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.103829][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.112003][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 474.120945][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 474.129477][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 474.142730][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 474.161650][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 474.170408][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 474.185688][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 474.193761][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.202876][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.211087][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 474.220412][T24662] device veth0_vlan entered promiscuous mode [ 474.235955][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 474.244440][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 474.254131][T24662] device veth1_macvtap entered promiscuous mode [ 474.266183][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 474.273953][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 474.283064][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 474.295288][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 474.303776][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 474.653097][ T7] device bridge_slave_1 left promiscuous mode [ 474.664646][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.689328][ T7] device bridge_slave_0 left promiscuous mode [ 474.699523][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.708916][ T7] device veth1_macvtap left promiscuous mode [ 474.715372][ T7] device veth0_vlan left promiscuous mode [ 475.144902][T24746] sock: sock_set_timeout: `syz.3.6918' (pid 24746) tries to set negative timeout [ 475.162934][T24742] device pim6reg1 entered promiscuous mode [ 475.291027][T24743] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.298607][T24743] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.307443][T24743] device bridge_slave_0 entered promiscuous mode [ 475.315272][T24743] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.322586][T24743] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.330429][T24743] device bridge_slave_1 entered promiscuous mode [ 475.393465][T24743] bridge0: port 2(bridge_slave_1) entered blocking state [ 475.401275][T24743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 475.408994][T24743] bridge0: port 1(bridge_slave_0) entered blocking state [ 475.416663][T24743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 475.460440][T24743] device veth0_vlan entered promiscuous mode [ 475.473684][T24743] device veth1_macvtap entered promiscuous mode [ 475.485065][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 475.493981][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 475.503065][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 475.513363][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 475.543104][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 475.592382][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 475.601706][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 475.613820][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 475.622410][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 475.631463][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 475.640508][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 475.666108][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 475.750309][T24781] device veth1_macvtap left promiscuous mode [ 477.221488][ T7] device bridge_slave_1 left promiscuous mode [ 477.234961][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.247557][ T7] device bridge_slave_0 left promiscuous mode [ 477.254146][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.538465][T24868] device syzkaller0 entered promiscuous mode [ 479.752396][T24974] device veth0_vlan left promiscuous mode [ 479.775616][T24974] device veth0_vlan entered promiscuous mode [ 479.976218][T24987] device pim6reg1 entered promiscuous mode [ 480.232325][T25000] device pim6reg1 entered promiscuous mode [ 480.576164][T25032] device veth1_macvtap left promiscuous mode [ 480.635656][T25034] device sit0 entered promiscuous mode [ 480.791583][T25074] device wg2 left promiscuous mode [ 480.976329][T25092] device veth0_vlan left promiscuous mode [ 480.982739][T25092] device veth0_vlan entered promiscuous mode [ 481.156912][T25134] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 481.945605][T25195] syz.1.7045[25195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.945664][T25195] syz.1.7045[25195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.966964][T25198] syz.2.7046[25198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.979043][T25198] syz.2.7046[25198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.868913][T25277] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 483.093838][T25281] device veth0_vlan left promiscuous mode [ 483.119041][T25281] device veth0_vlan entered promiscuous mode [ 483.305665][T25312] syz.1.7079[25312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.305756][T25312] syz.1.7079[25312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.509356][T25316] device syzkaller0 entered promiscuous mode [ 483.786612][T25329] device bridge0 entered promiscuous mode [ 483.834246][T25329] device veth1_macvtap entered promiscuous mode [ 483.858274][T25329] device macsec0 entered promiscuous mode [ 483.886966][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 483.968375][T25346] device sit0 left promiscuous mode [ 484.018351][T25346] device sit0 entered promiscuous mode [ 484.930426][T25372] device sit0 entered promiscuous mode [ 485.393447][T25383] device syzkaller0 entered promiscuous mode [ 485.457399][T25382] device pim6reg1 entered promiscuous mode [ 485.962058][T25425] device pim6reg1 entered promiscuous mode [ 487.442061][T25504] device macsec0 left promiscuous mode [ 488.313042][T25572] syz.1.7151[25572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.313106][T25572] syz.1.7151[25572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.388350][T25577] syz.1.7151[25577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.501364][T25577] syz.1.7151[25577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.691201][T25570] device wg2 left promiscuous mode [ 488.723656][T25572] device wg2 entered promiscuous mode [ 488.778390][T25590] device syzkaller0 entered promiscuous mode [ 490.046714][T25691] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 490.073789][T25691] device syzkaller0 entered promiscuous mode [ 490.607516][T25734] syz.2.7196[25734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.607598][T25734] syz.2.7196[25734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.918643][T25740] device veth1_macvtap entered promiscuous mode [ 490.993864][T25740] device macsec0 entered promiscuous mode [ 491.054841][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 491.179517][T25753] syz.4.7200[25753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 491.179576][T25753] syz.4.7200[25753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.325994][T25813] device sit0 entered promiscuous mode [ 492.370888][T25814] device bridge_slave_0 entered promiscuous mode [ 492.464795][T25837] tap0: tun_chr_ioctl cmd 1074025680 [ 492.486255][T25839] syz.4.7227[25839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 492.486310][T25839] syz.4.7227[25839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.723774][T25907] GPL: port 1(erspan0) entered blocking state [ 493.801549][T25907] GPL: port 1(erspan0) entered disabled state [ 493.848656][T25907] device erspan0 entered promiscuous mode [ 493.870801][T25914] GPL: port 1(erspan0) entered blocking state [ 493.877248][T25914] GPL: port 1(erspan0) entered forwarding state [ 494.442901][T25972] device pim6reg1 entered promiscuous mode [ 496.577005][T26042] device syzkaller0 entered promiscuous mode [ 498.439228][T26124] : renamed from vlan1 [ 499.483686][T26172] device pim6reg1 entered promiscuous mode [ 499.706136][T26176] : renamed from vlan0 [ 499.817449][T26188] device syzkaller0 entered promiscuous mode [ 499.834410][T26193] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.841828][T26193] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.970634][T26193] device bridge_slave_1 left promiscuous mode [ 499.977861][T26193] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.985986][T26193] device bridge_slave_0 left promiscuous mode [ 499.992356][T26193] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.151759][T26208] device pim6reg1 entered promiscuous mode [ 500.447946][T26230] device syzkaller0 entered promiscuous mode [ 500.502750][T26230] device pim6reg1 entered promiscuous mode [ 500.760120][T26257] : port 1(erspan0) entered blocking state [ 500.767269][T26257] : port 1(erspan0) entered disabled state [ 500.790265][T26257] device erspan0 entered promiscuous mode [ 501.936419][T26319] device pim6reg1 entered promiscuous mode [ 502.056467][T26333] device syzkaller0 entered promiscuous mode [ 502.363573][T26358] device sit0 left promiscuous mode [ 502.468928][T26359] device sit0 entered promiscuous mode [ 503.560307][T26432] device wg2 left promiscuous mode [ 503.587444][T26432] device wg2 entered promiscuous mode [ 503.863699][T26457] device wg2 entered promiscuous mode [ 504.223984][T26475] : renamed from vlan0 [ 504.275585][T26482] device pim6reg1 entered promiscuous mode [ 504.597494][T26522] syz.1.7427[26522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.597605][T26522] syz.1.7427[26522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.780532][T26522] syz.1.7427[26522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.817264][T26522] syz.1.7427[26522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.197638][T26550] device pim6reg1 entered promiscuous mode [ 505.459592][T26546] device syzkaller0 entered promiscuous mode [ 506.069679][T26640] : renamed from vlan1 [ 506.241122][T26658] device pim6reg1 entered promiscuous mode [ 506.456580][T26682] tap0: tun_chr_ioctl cmd 1074025677 [ 506.464370][T26682] tap0: linktype set to 769 [ 507.171754][T26723] syz.1.7484[26723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.171832][T26723] syz.1.7484[26723] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.019769][T26780] device syzkaller0 entered promiscuous mode [ 510.971662][T26851] device syzkaller0 entered promiscuous mode [ 513.282272][T26981] device wg2 left promiscuous mode [ 513.389013][T26993] device pim6reg1 entered promiscuous mode [ 513.425309][T26993] syz.0.7549[26993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.425367][T26993] syz.0.7549[26993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 513.722831][T26998] device pim6reg1 entered promiscuous mode [ 515.301310][T27142] device pim6reg1 entered promiscuous mode [ 516.553901][T27197] device syzkaller0 entered promiscuous mode [ 516.739746][T27235] syz.1.7602[27235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.739808][T27235] syz.1.7602[27235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.040185][T27251] device pim6reg1 entered promiscuous mode [ 517.673584][T27313] device syzkaller0 entered promiscuous mode [ 517.743671][T27328] device syzkaller0 entered promiscuous mode [ 517.961495][T27333] device pim6reg1 entered promiscuous mode [ 518.749152][T27391] device pim6reg1 entered promiscuous mode [ 519.713674][T27481] device syzkaller0 entered promiscuous mode [ 520.495988][T27506] device sit0 left promiscuous mode [ 520.520054][T27512] device sit0 entered promiscuous mode [ 520.799739][T27536] syz.2.7688[27536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.799800][T27536] syz.2.7688[27536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.875994][T27536] syz.2.7688[27536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.918104][T27536] syz.2.7688[27536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.030419][T27536] device wg2 entered promiscuous mode [ 521.159359][T27555] : renamed from vlan1 [ 521.888777][T27616] device pim6reg1 entered promiscuous mode [ 523.669586][T27745] device wg2 entered promiscuous mode [ 523.741102][T27753] syz.4.7749[27753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.741193][T27753] syz.4.7749[27753] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 524.031807][T27765] device veth0_vlan left promiscuous mode [ 524.055320][T27765] device veth0_vlan entered promiscuous mode [ 524.079772][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.105575][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 524.165068][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 524.814826][T27812] device veth0_vlan left promiscuous mode [ 524.821660][T27812] device veth0_vlan entered promiscuous mode [ 524.875547][T27812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.954014][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 524.971755][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 525.002143][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 525.083013][T27817] device pim6reg1 entered promiscuous mode [ 525.315845][T27825] device syzkaller0 entered promiscuous mode [ 525.345869][T27824] device pim6reg1 entered promiscuous mode [ 525.497789][T27828] device pim6reg1 entered promiscuous mode [ 526.091160][T27877] tun0: tun_chr_ioctl cmd 1074812117 [ 526.151292][T27877] tun0: tun_chr_ioctl cmd 1074025678 [ 526.186509][T27877] tun0: group set to 1 [ 527.363152][T27921] device pim6reg1 entered promiscuous mode [ 527.465157][T27932] device wg2 left promiscuous mode [ 528.037781][T27974] syz.4.7811[27974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 528.037867][T27974] syz.4.7811[27974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 529.111068][T28080] batadv0: tun_chr_ioctl cmd 2147767521 [ 529.171471][T28066] batadv0: tun_chr_ioctl cmd 1074025692 [ 529.191344][T28073] device sit0 left promiscuous mode [ 530.570766][T28177] device veth1_macvtap left promiscuous mode [ 530.609363][T28177] device veth1_macvtap entered promiscuous mode [ 530.616673][T28177] device macsec0 entered promiscuous mode [ 543.147984][T28235] device wg2 entered promiscuous mode [ 545.270838][T28343] : renamed from bond_slave_0 [ 545.516607][T28350] 7B: renamed from syzkaller0 [ 545.615599][T28354] device wg2 left promiscuous mode [ 545.625544][T28354] device wg2 entered promiscuous mode [ 545.671566][T28357] device pim6reg1 entered promiscuous mode [ 545.697560][T28359] syz.3.7925[28359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.697670][T28359] syz.3.7925[28359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 545.797681][T28367] device pim6reg1 entered promiscuous mode [ 546.618415][T28415] device syzkaller0 entered promiscuous mode [ 546.696924][T28424] device veth0_vlan left promiscuous mode [ 546.738182][T28424] device veth0_vlan entered promiscuous mode [ 546.755205][T28424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.767158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 546.779792][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.794756][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 547.305125][T28462] device sit0 entered promiscuous mode [ 548.897411][T28518] device wg2 left promiscuous mode [ 548.905172][T28518] syz.2.7971[28518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 549.094218][T28532] device veth0_vlan left promiscuous mode [ 549.173241][T28532] device veth0_vlan entered promiscuous mode [ 549.181486][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 549.190028][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 549.225211][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 549.235051][T28536] device veth1_macvtap left promiscuous mode [ 549.241403][T28536] device macsec0 left promiscuous mode [ 549.249647][T28535] device veth1_macvtap entered promiscuous mode [ 549.256527][T28535] device macsec0 entered promiscuous mode [ 549.620310][T28583] device pim6reg1 entered promiscuous mode [ 551.675682][T28657] bridge0: port 2(bridge_slave_1) entered disabled state [ 551.683264][T28657] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.995704][T28738] Q6`Ҙ: renamed from lo [ 554.498097][T28833] device sit0 left promiscuous mode [ 554.512999][T28834] syz.3.8067[28834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.515039][T28834] syz.3.8067[28834] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.551445][T28835] syz.3.8067[28835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 554.725648][T28859] device veth1_macvtap left promiscuous mode [ 554.783875][T28859] device veth1_macvtap entered promiscuous mode [ 554.899831][T28861] device sit0 left promiscuous mode [ 555.400477][T28895] device wg2 left promiscuous mode [ 555.755370][T28919] device wg2 left promiscuous mode [ 556.012216][T28919] device wg2 entered promiscuous mode [ 557.289427][T29007] syz.3.8111[29007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.289527][T29007] syz.3.8111[29007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 559.278450][T29095] device syzkaller0 entered promiscuous mode [ 560.062892][T29123] device syzkaller0 entered promiscuous mode [ 560.340071][T29166] device syzkaller0 entered promiscuous mode [ 560.670640][T29219] syz.1.8171[29219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 560.670700][T29219] syz.1.8171[29219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 560.781275][T29225] device syzkaller0 entered promiscuous mode [ 561.436324][T29257] syz.3.8185[29257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 561.436405][T29257] syz.3.8185[29257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 561.487571][T29263] syz.3.8185[29263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 561.514953][T29263] syz.3.8185[29263] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 562.503241][T29298] device wg2 left promiscuous mode [ 563.525932][T29373] device pim6reg1 entered promiscuous mode [ 564.597250][T29449] device wg2 entered promiscuous mode [ 564.666793][T29450] device veth0_vlan left promiscuous mode [ 564.677138][T29450] device veth0_vlan entered promiscuous mode [ 564.698140][T29450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 564.707716][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 564.716305][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 564.724078][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 564.954101][T29480] bridge0: port 2(bridge_slave_1) entered disabled state [ 564.962369][T29480] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.015434][T29480] device bridge0 left promiscuous mode [ 565.059800][T29488] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.067445][T29488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 565.074758][T29488] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.082000][T29488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 565.109316][T29488] device bridge0 entered promiscuous mode [ 565.132529][T29490] geneve1: tun_chr_ioctl cmd 35108 [ 565.978606][T29566] device wg2 left promiscuous mode [ 567.894457][T29687] device syzkaller0 entered promiscuous mode [ 568.728538][T29760] device pim6reg1 entered promiscuous mode [ 568.957705][T29771] device veth0_vlan left promiscuous mode [ 568.963644][T29771] device veth0_vlan entered promiscuous mode [ 569.001779][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 569.018301][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 569.034956][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 569.200931][T29807] device pim6reg1 entered promiscuous mode [ 569.509298][T29839] device veth0_vlan left promiscuous mode [ 569.551944][T29839] device veth0_vlan entered promiscuous mode [ 569.559416][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 569.575881][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 569.593936][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 569.691425][T29849] device wg2 entered promiscuous mode [ 569.859479][T29867] device wg2 left promiscuous mode [ 569.959445][T29871] device wg2 entered promiscuous mode [ 570.294118][T29892] device sit0 left promiscuous mode [ 570.348135][T29892] device sit0 entered promiscuous mode [ 571.342650][T29954] syz.3.8384[29954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.342709][T29954] syz.3.8384[29954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 571.575314][T29979] device pim6reg1 entered promiscuous mode [ 571.717414][T29982] device pim6reg1 entered promiscuous mode [ 571.963435][T29999] device veth0_vlan left promiscuous mode [ 571.976233][T29999] device veth0_vlan entered promiscuous mode [ 571.995271][T29999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.011528][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.019585][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.027398][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.360553][T30050] device pim6reg1 entered promiscuous mode [ 573.005701][T30113] device wg2 entered promiscuous mode [ 573.651176][T30179] device wg2 entered promiscuous mode [ 573.942013][T30187] bridge0: port 3(veth1) entered blocking state [ 573.971271][T30187] bridge0: port 3(veth1) entered disabled state [ 574.011169][T30187] device veth1 entered promiscuous mode [ 574.039973][T30187] bridge0: port 3(veth1) entered blocking state [ 574.046826][T30187] bridge0: port 3(veth1) entered forwarding state [ 575.064021][T30233] device wg2 left promiscuous mode [ 575.344304][T30249] device sit0 entered promiscuous mode [ 576.075390][T30288] device syzkaller0 entered promiscuous mode [ 576.347064][T30315] device syzkaller0 entered promiscuous mode [ 577.117894][T30374] syz.4.8508[30374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.117983][T30374] syz.4.8508[30374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 578.066047][T30452] device pim6reg1 entered promiscuous mode [ 578.573125][T30489] device syzkaller0 entered promiscuous mode [ 580.460071][T30551] device lo entered promiscuous mode [ 593.506977][T30638] device wg2 left promiscuous mode [ 593.550172][T30638] device wg2 entered promiscuous mode [ 593.575052][T30638] syz.0.8582[30638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.576536][T30638] syz.0.8582[30638] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.636331][T30650] device syzkaller0 entered promiscuous mode [ 593.895579][T30660] device pim6reg1 entered promiscuous mode [ 595.021708][T30705] device syzkaller0 entered promiscuous mode [ 595.386015][T30737] device veth0_vlan left promiscuous mode [ 595.395289][T30737] device veth0_vlan entered promiscuous mode [ 595.907945][T30755] device pim6reg1 entered promiscuous mode [ 595.917833][T30758] device pim6reg1 entered promiscuous mode [ 596.055275][T30763] device wg2 entered promiscuous mode [ 597.130395][T30823] device syzkaller0 entered promiscuous mode [ 597.157980][T30828] device pim6reg1 entered promiscuous mode [ 598.478576][T30919] @: renamed from bond_slave_0 [ 598.771290][T30924] device syzkaller0 entered promiscuous mode [ 599.167511][T30983] device pim6reg1 entered promiscuous mode [ 599.202646][T30983] device wg2 left promiscuous mode [ 599.225517][T30983] device wg2 entered promiscuous mode [ 599.253933][T30982] tap0: tun_chr_ioctl cmd 1074025677 [ 599.270204][T30982] tap0: linktype set to 769 [ 600.313751][T31026] device wg2 left promiscuous mode [ 600.814461][T31053] device pim6reg1 entered promiscuous mode [ 601.411392][T31068] device syzkaller0 entered promiscuous mode [ 601.772366][T31086] device syzkaller0 entered promiscuous mode [ 602.232414][T31127] device syzkaller0 entered promiscuous mode [ 602.305443][T31127] device syzkaller0 left promiscuous mode [ 602.703538][T31134] device pim6reg1 entered promiscuous mode [ 603.479037][T31175] device sit0 left promiscuous mode [ 603.567519][T31183] device sit0 entered promiscuous mode [ 605.191743][T31266] syz.1.8765[31266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 605.191821][T31266] syz.1.8765[31266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 606.508535][T31330] device veth1_macvtap left promiscuous mode [ 606.526579][T31330] device macsec0 left promiscuous mode [ 606.538258][T31304] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.574767][T31304] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.582447][T31304] device bridge_slave_0 entered promiscuous mode [ 606.598172][T31304] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.605634][T31304] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.613504][T31304] device bridge_slave_1 entered promiscuous mode [ 606.985794][T31304] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.993328][T31304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 607.001297][T31304] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.008729][T31304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 607.056446][T31364] device sit0 entered promiscuous mode [ 607.261019][ T312] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.277022][ T312] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.335101][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 607.358380][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 607.403738][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 607.428880][ T312] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.437461][ T312] bridge0: port 1(bridge_slave_0) entered forwarding state [ 607.445560][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 607.455316][ T312] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.463125][ T312] bridge0: port 2(bridge_slave_1) entered forwarding state [ 607.484821][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 607.575305][T31389] device veth0_vlan left promiscuous mode [ 607.707967][T31389] device veth0_vlan entered promiscuous mode [ 607.795521][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 607.812754][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 607.972105][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 607.981215][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 607.991700][T31304] device veth0_vlan entered promiscuous mode [ 608.049448][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 608.061954][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 608.101769][T31400] device pim6reg1 entered promiscuous mode [ 608.113811][T31304] device veth1_macvtap entered promiscuous mode [ 608.154780][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 608.163916][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 608.187566][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 608.206817][T31403] device syzkaller0 entered promiscuous mode [ 608.236074][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 608.268514][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 608.278520][T24666] GPL: port 1(erspan0) entered disabled state [ 608.287335][T24666] device erspan0 left promiscuous mode [ 608.293470][T24666] GPL: port 1(erspan0) entered disabled state [ 608.343536][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 608.353587][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.200848][T31441] device pim6reg1 entered promiscuous mode [ 609.729894][T31468] device sit0 left promiscuous mode [ 610.866928][T31512] device pim6reg1 entered promiscuous mode [ 611.629144][T31568] device veth0_vlan left promiscuous mode [ 611.636234][T31568] device veth0_vlan entered promiscuous mode [ 611.790605][T31586] device wg2 entered promiscuous mode [ 613.653336][T31667] syz.4.8880[31667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.653400][T31667] syz.4.8880[31667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.673823][T31666] syz.4.8880[31666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 613.695650][T31666] syz.4.8880[31666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.315366][T31701] device pim6reg1 entered promiscuous mode [ 617.671288][T32038] syz.0.8957[32038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.673176][T32038] syz.0.8957[32038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 617.902960][T32046] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.941122][T32046] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.958983][T32046] device bridge_slave_0 entered promiscuous mode [ 617.976275][T32046] bridge0: port 2(bridge_slave_1) entered blocking state [ 617.987409][T32046] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.003180][T32046] device bridge_slave_1 entered promiscuous mode [ 618.098460][T32046] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.105975][T32046] bridge0: port 2(bridge_slave_1) entered forwarding state [ 618.113388][T32046] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.120788][T32046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.201008][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 618.211078][ T305] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.245021][ T305] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.278491][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.293923][ T305] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.304820][ T305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.314013][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 618.322989][ T305] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.330407][ T305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 618.391332][T32046] device veth0_vlan entered promiscuous mode [ 618.398692][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 618.469708][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.524996][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.545042][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.553189][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 618.561866][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 618.623503][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 618.632698][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 618.645721][T32046] device veth1_macvtap entered promiscuous mode [ 618.860239][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 618.871505][T32126] device veth0_vlan left promiscuous mode [ 618.878382][T32126] device veth0_vlan entered promiscuous mode [ 619.035879][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 619.044430][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 619.055018][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 619.063604][ T305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 620.258191][T32221] device syzkaller0 entered promiscuous mode [ 620.641048][T32224] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 620.952395][T32224] pim6reg0: linktype set to 530 [ 621.227443][T24666] device veth1 left promiscuous mode [ 621.233462][T24666] bridge0: port 3(veth1) entered disabled state [ 621.242360][T24666] device bridge_slave_1 left promiscuous mode [ 621.248942][T24666] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.256916][T24666] device bridge_slave_0 left promiscuous mode [ 621.263217][T24666] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.272134][T24666] device veth0_vlan left promiscuous mode [ 621.471496][T32249] device wg2 left promiscuous mode [ 621.478055][T32250] device wg2 entered promiscuous mode [ 621.586665][T32256] device wg2 entered promiscuous mode [ 622.044071][T32277] device pim6reg1 entered promiscuous mode [ 622.262668][T32296] device wg2 left promiscuous mode [ 622.283294][T32296] device wg2 entered promiscuous mode [ 622.302803][T32296] lo: mtu less than device minimum [ 622.442820][T32317] syz.0.9034[32317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 622.442910][T32317] syz.0.9034[32317] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 623.248122][T32374] device wg2 left promiscuous mode [ 624.208561][T32416] device syzkaller0 entered promiscuous mode [ 624.217740][T32411] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.227395][T32411] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.256805][T32411] device bridge_slave_0 entered promiscuous mode [ 624.285471][T32411] bridge0: port 2(bridge_slave_1) entered blocking state [ 624.292535][T32411] bridge0: port 2(bridge_slave_1) entered disabled state [ 624.300377][T32411] device bridge_slave_1 entered promiscuous mode [ 624.484985][T32411] bridge0: port 2(bridge_slave_1) entered blocking state [ 624.492244][T32411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 624.499962][T32411] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.507096][T32411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.564084][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 624.572506][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.582059][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 624.608570][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 624.617303][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.624654][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 624.632979][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 624.642116][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 624.649753][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 624.683226][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 624.692959][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 624.719852][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 624.742727][T32411] device veth0_vlan entered promiscuous mode [ 624.763150][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 624.771583][T32439] syz.2.9068[32439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 624.771677][T32439] syz.2.9068[32439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 624.784241][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 624.804531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 624.820647][T32411] device veth1_macvtap entered promiscuous mode [ 624.878442][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 624.888113][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 624.903633][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 624.912909][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 626.060561][T32493] device syzkaller0 entered promiscuous mode [ 626.638726][T32532] device sit0 entered promiscuous mode [ 627.088645][T32581] device wg2 left promiscuous mode [ 627.105060][T32582] device wg2 entered promiscuous mode [ 628.296991][T32646] device pim6reg1 entered promiscuous mode [ 630.080789][T32732] : port 1(erspan0) entered blocking state [ 630.119071][T32732] : port 1(erspan0) entered disabled state [ 630.145105][T32732] device erspan0 entered promiscuous mode [ 630.169077][T32719] : port 1(erspan0) entered blocking state [ 630.175556][T32719] : port 1(erspan0) entered forwarding state [ 631.154693][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 632.529000][ T409] device veth1_macvtap left promiscuous mode [ 633.234894][ T459] device pim6reg1 entered promiscuous mode [ 633.250725][ T462] device syzkaller0 entered promiscuous mode [ 633.395907][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.403506][ T452] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.412395][ T452] device bridge_slave_0 entered promiscuous mode [ 633.425008][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.444671][ T452] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.453020][ T452] device bridge_slave_1 entered promiscuous mode [ 633.480231][ T472] device veth0_vlan left promiscuous mode [ 633.487078][ T472] device veth0_vlan entered promiscuous mode [ 633.810479][ T452] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.818519][ T452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.827783][ T452] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.836507][ T452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.052042][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 634.086835][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 634.104165][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 634.121152][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 634.251368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 634.266372][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.274057][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.308819][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 634.376762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 634.466698][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 634.476665][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 634.528510][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 634.540862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 634.556134][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 634.564374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 634.574514][ T452] device veth0_vlan entered promiscuous mode [ 634.612056][ T541] device wg2 left promiscuous mode [ 634.633954][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 634.643121][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 634.695396][ T541] device wg2 entered promiscuous mode [ 634.723363][ T452] device veth1_macvtap entered promiscuous mode [ 634.827212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 634.835901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 634.845263][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 634.861354][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 634.871444][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 634.977040][T24666] GPL: port 1(erspan0) entered disabled state [ 634.995790][T24666] device erspan0 left promiscuous mode [ 635.061005][T24666] GPL: port 1(erspan0) entered disabled state [ 636.139295][ T615] device syzkaller0 entered promiscuous mode [ 636.782209][ T662] device wg2 left promiscuous mode [ 636.820716][ T662] device wg2 entered promiscuous mode [ 637.999467][ T736] syz.2.9283[736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 637.999523][ T736] syz.2.9283[736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.409149][ T753] device syzkaller0 entered promiscuous mode [ 638.818091][ T757] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 638.853311][ T757] device syzkaller0 entered promiscuous mode [ 640.394435][ T865] device syzkaller0 entered promiscuous mode [ 640.455236][ T868] device pim6reg1 entered promiscuous mode [ 641.268558][ T912] device syzkaller0 entered promiscuous mode [ 642.102017][ T970] device syzkaller0 entered promiscuous mode [ 642.701381][ T1021] device sit0 left promiscuous mode [ 642.806605][ T1022] device sit0 entered promiscuous mode [ 643.338177][ T1054] device veth0_vlan left promiscuous mode [ 643.381565][ T1054] device veth0_vlan entered promiscuous mode [ 644.084034][ T1141] device syzkaller0 entered promiscuous mode [ 644.622201][ T1201] device wg2 left promiscuous mode [ 644.874039][ T1215] device sit0 entered promiscuous mode [ 646.656486][ T1302] device syzkaller0 entered promiscuous mode [ 646.751069][ T1308] device syzkaller0 entered promiscuous mode [ 647.367804][ T1323] device syzkaller0 entered promiscuous mode [ 647.601465][ T1341] tap0: tun_chr_ioctl cmd 1074025677 [ 647.621564][ T1341] tap0: linktype set to 768 [ 647.711297][ T1354] syz.4.9453[1354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.712878][ T1354] syz.4.9453[1354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 647.847598][ T1360] device wg2 entered promiscuous mode [ 648.167929][ T1391] device veth0_vlan left promiscuous mode [ 648.205001][ T1391] device veth0_vlan entered promiscuous mode [ 648.220706][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 648.234163][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 648.263321][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 649.462783][ T1462] device wg2 left promiscuous mode [ 649.471811][ T1467] device wg2 entered promiscuous mode [ 649.488771][ T1465] device syzkaller0 entered promiscuous mode [ 649.633484][ T1479] device wg2 left promiscuous mode [ 650.267548][ T1535] tap0: tun_chr_ioctl cmd 35108 [ 650.285062][ T1535] tap0: tun_chr_ioctl cmd 1074025677 [ 650.294883][ T1535] tap0: linktype set to 773 [ 650.643798][ T1570] device pim6reg1 entered promiscuous mode [ 650.856041][ T1577] device syzkaller0 entered promiscuous mode [ 651.123924][ T1604] device syzkaller0 entered promiscuous mode [ 651.415067][ T1618] syz.1.9524[1618] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.426583][ T1624] device veth1_macvtap left promiscuous mode [ 651.476195][ T1624] device macsec0 entered promiscuous mode [ 651.925774][ T1654] device syzkaller0 entered promiscuous mode [ 653.228049][ T1698] device veth0_vlan left promiscuous mode [ 653.238781][ T1698] device veth0_vlan entered promiscuous mode [ 653.305148][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 653.313721][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 653.324084][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 653.811660][T24666] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 653.979157][ T1740] device sit0 entered promiscuous mode [ 654.243783][ T1776] device pim6reg1 entered promiscuous mode [ 654.796473][ T1803] cgroup: fork rejected by pids controller in /syz0 [ 657.404770][ T1889] device pim6reg1 left promiscuous mode [ 657.626757][ T1914] device wg2 entered promiscuous mode [ 657.755404][ T1927] device sit0 left promiscuous mode [ 657.820973][ T1931] device syzkaller0 entered promiscuous mode [ 658.390875][ T1945] device syzkaller0 entered promiscuous mode [ 658.445398][ T1949] device wg2 entered promiscuous mode [ 658.492758][ T1956] device pim6reg1 entered promiscuous mode [ 658.746639][ T1967] device pim6reg1 entered promiscuous mode [ 658.775809][ T1979] device veth0_vlan left promiscuous mode [ 658.802683][ T1979] device veth0_vlan entered promiscuous mode [ 658.835186][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 658.846722][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 658.858124][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 659.364452][ T1998] device pim6reg1 entered promiscuous mode [ 659.509328][ T2017] device pim6reg1 entered promiscuous mode [ 659.844891][ T2047] ------------[ cut here ]------------ [ 659.850751][ T2047] kernel BUG at kernel/bpf/arraymap.c:993! [ 659.864706][ T2047] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 659.870988][ T2047] CPU: 0 PID: 2047 Comm: syz.1.9638 Tainted: G W 5.10.240-syzkaller #0 [ 659.880885][ T2047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/14/2025 [ 659.891501][ T2047] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 659.898140][ T2047] Code: 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f8 94 e9 ff 0f 0b e9 78 f9 ff ff e8 ec 94 e9 ff 0f 0b e8 e5 94 e9 ff <0f> 0b e8 de 94 e9 ff 0f 0b e8 d7 94 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 659.918695][ T2047] RSP: 0018:ffffc900011b7ca8 EFLAGS: 00010293 [ 659.924888][ T2047] RAX: ffffffff817a0b8b RBX: ffff8881145e6e10 RCX: ffff8881321b13c0 [ 659.933165][ T2047] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 659.941653][ T2047] RBP: ffffc900011b7d28 R08: dffffc0000000000 R09: fffffbfff0c5d495 [ 659.950617][ T2047] R10: fffffbfff0c5d495 R11: 1ffffffff0c5d494 R12: 00000000fffffff0 [ 659.958360][ T2051] device sit0 entered promiscuous mode [ 659.958888][ T2047] R13: ffff88811ca77e80 R14: 0000000000000001 R15: ffff88811ca77e00 [ 659.973182][ T2047] FS: 00007f22a72ba6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 659.982573][ T2047] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 659.989278][ T2047] CR2: 0000000100000000 CR3: 00000001282a2000 CR4: 00000000003506b0 [ 659.997478][ T2047] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 660.005990][ T2047] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 660.014282][ T2047] Call Trace: [ 660.017793][ T2047] ? bpf_prog_178c55262a54958c+0xb/0x5c8 [ 660.023643][ T2047] fd_array_map_delete_elem+0x14c/0x250 [ 660.029267][ T2047] map_delete_elem+0x336/0x510 [ 660.034065][ T2047] __se_sys_bpf+0x3bf/0x680 [ 660.038593][ T2047] ? __x64_sys_bpf+0x90/0x90 [ 660.043391][ T2047] ? fpu__clear_all+0x20/0x20 [ 660.048358][ T2047] __x64_sys_bpf+0x7b/0x90 [ 660.053118][ T2047] do_syscall_64+0x31/0x40 [ 660.057733][ T2047] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 660.063904][ T2047] RIP: 0033:0x7f22a8872be9 [ 660.068496][ T2047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 660.088899][ T2047] RSP: 002b:00007f22a72ba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 660.097741][ T2047] RAX: ffffffffffffffda RBX: 00007f22a8a9a090 RCX: 00007f22a8872be9 [ 660.105794][ T2047] RDX: 0000000000000020 RSI: 00002000000007c0 RDI: 0000000000000003 [ 660.114130][ T2047] RBP: 00007f22a88f5e19 R08: 0000000000000000 R09: 0000000000000000 [ 660.122397][ T2047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 660.130466][ T2047] R13: 00007f22a8a9a128 R14: 00007f22a8a9a090 R15: 00007fff49b51978 [ 660.138704][ T2047] Modules linked in: [ 660.182459][ T2047] ---[ end trace 78c06f105f38234b ]--- [ 660.201656][ T2047] RIP: 0010:prog_array_map_poke_run+0x6fb/0x710 [ 660.215844][ T2047] Code: 95 e9 ff 48 83 c4 58 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f8 94 e9 ff 0f 0b e9 78 f9 ff ff e8 ec 94 e9 ff 0f 0b e8 e5 94 e9 ff <0f> 0b e8 de 94 e9 ff 0f 0b e8 d7 94 e9 ff 0f 0b 0f 1f 44 00 00 55 [ 660.244664][ T2047] RSP: 0018:ffffc900011b7ca8 EFLAGS: 00010293 [ 660.251251][ T2047] RAX: ffffffff817a0b8b RBX: ffff8881145e6e10 RCX: ffff8881321b13c0 [ 660.261864][ T2047] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 660.272091][ T2047] RBP: ffffc900011b7d28 R08: dffffc0000000000 R09: fffffbfff0c5d495 [ 660.280765][ T2047] R10: fffffbfff0c5d495 R11: 1ffffffff0c5d494 R12: 00000000fffffff0 [ 660.290812][ T2047] R13: ffff88811ca77e80 R14: 0000000000000001 R15: ffff88811ca77e00 [ 660.299256][ T2047] FS: 00007f22a72ba6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 660.308984][ T2047] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 660.316311][ T2047] CR2: 00007f09d659ef98 CR3: 00000001282a2000 CR4: 00000000003506a0 [ 660.324546][ T2047] DR0: 0000200000000300 DR1: 0000200000000300 DR2: 0000000000000000 [ 660.332860][ T2047] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 660.347974][ T2047] Kernel panic - not syncing: Fatal exception [ 660.354407][ T2047] Kernel Offset: disabled [ 660.359007][ T2047] Rebooting in 86400 seconds..