last executing test programs: 1.804376932s ago: executing program 1 (id=9231): r0 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0x3, 0x3, 0x22, 0x0, 0xf31f, 0x80813, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x80, 0x5, 0x6c2d8d73, 0x2, 0x0, 0x3, 0x2, 0x0, 0x1, 0x0, 0x82}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8e76}, 0x1c004, 0x2, 0x0, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x4000}, 0x0, 0xf, r0, 0xa44c008912f79358) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1848bc5c7a51e696d04d95a6737ea6db1700000e004000", @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000880)=""/168}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{}, &(0x7f0000000040), &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000480)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) close(r6) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r6, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB="000a00000056c728c3303ff1cb1fcf000000b7080000000000007b8af8ff00000000bfa200000000000003020000f8ffffffb703000008000000b7040000000400008500000001000009e0ae351f3620c44260a47e"], &(0x7f0000000700)='GPL\x00', 0x200, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x294002, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x90) 1.774031125s ago: executing program 3 (id=9232): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="54000000000000000000000400000000000000600000000100010001000000010000000700000007442cc05000000000000000010000ee06000000080000000100000e4a0000002000650e0300000005000000080000000030000000000000000100000001"], 0x88}, 0x0) close(r4) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r8, &(0x7f0000000580)=ANY=[@ANYBLOB="80fd", @ANYRES16=r9], 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r7, 0x58, &(0x7f0000000180)}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r10}, 0x10) 1.70985731s ago: executing program 1 (id=9234): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000000500000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcff7ffa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67e6ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4510555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cace339f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d000000009682e24b92533ac2a997d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f18215523167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3037ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cb8846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966f08294cd6f496e5dee734fe7da3770845cf442d488afd80e170000000000000000000000000000000000000000000000000000052007563885a1105000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb9aaa57a8abef8b64237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2c09000000bfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07000000ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbcbf2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00a40e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2add58ffb25f339297729a7a51810134d3dfbf71f651600eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47547f164391c673b6079e65d7295eed164ca63e4ea26d65f6b3ce0f6591d80dfb8f386bb74b5589829b6b067903000000000000003d9950d48c774eaa35b24fce696af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c80c57ed04dbc574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff559973c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511732f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db55474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a8340000000000000008029be3788dd8422b1ab7b4c9d5b7d8682fd750947109c713108e1386f5843a9ee29af30ecbeb26ff81f0921be501ade32a81aa175f4f8f117fc23b2adb38200f0f360e213534e14fae98502f92017d32f29777b6890ad5a103352dd80f036db18220932a2d26e0f9f807c4eb9ae9ba0b77c54bcf501873ce30286cdd633346bc11ed2259ab31f0bc2630a23738a646833b4d03f0028835f71cee1a5bafec9de0cfe4b5f0197fa9c7f5bcac99dbd85fb924db68d7384d4c5ab1087e4464592f278036d2b81e02a3be90a6b8757ece967569d66c8399796825e80f4dc6b3920ed9813a259de560000000000000000000000000000aeecc3447c907474d2129496fc6f6bc804965f8caaac7e2ef733f77708d618dbeae5352a5bc32d826a1b62cd698b4cfdc74ba5e8f18e808783fd5f32ef793a3069ac0906609aa9ca7dca982d6e903aea749f60beb35e2bee8eb43b8c65f4526c61281d6517f1f6e9741365acdaf8ae916575459f7d14087f826f97c94b09cd1275e576d17f76b39a6ac9e33030d67262209a52012dd9c9c60e45c51dd06ee7ba3d0c53a16070536d583ab8639d4fafe62997819033338a5ea4a5d2b61d05de4d5ad4c8dd0de3b98a1f4d6142851571b8d61715c7cb557373854f7eaf2f4e4bfd3dcb6c1d2e7b0bcb4d896092e90f95a61df4ffeeb64dee29de77fba312943bc53efb61138a5a82f7a828c04faf679edf2fa31cdfc57a2cb7ce03f3cdc40a1a20e82e54d10ce35579d7e065a8840abf4ce792ced89bd4288c8d427000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884800121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 1.638929396s ago: executing program 1 (id=9236): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%pB \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea", 0x31}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907003675f3757f0086dd6317ce800000000000e0865a6596aff57b00000000000000000000000000ac1414"], 0xfe1b) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="0000186df4b1768c36153d42", @ANYRES32, @ANYBLOB="0a3f000000a3f500950004000000010045"], 0x0}, 0x90) socketpair(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r0, &(0x7f0000000140)="39d90893c058e1d58f76eadf0b0a568048b10ace5a0b25b7330962056970fe63114c230716f10f9d53763e364022001ec0eeff12e440d0c53142ad105822d533d34f5788349b78a7338bdd1ec088e40e6d0ba48bd1770f85850ac70faf38044b4609abefc693ad398be3310f01283f589581e4f952d93008e261683efb5cb4b37b58aead6e0139833bb9dfcc647ac8e8e1b1cf2e6215d0c181a666219268b47045fb340d2e3b27ed91c9ee2caf37be7fdc050cb71fbc659e686d99f223fa", &(0x7f0000000200)=""/31}, 0x20) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0xb, 0x42, 0x40, 0x42}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340)="f25f4af207f45c9f0a0073a2e133585d0b05aba757e60a25f1f968f80190937c00b46c4add7a033184592a589ca69235ea3f3ad66788b3f648b647b2274b80e4bdbb7bd3cfa8252c57e977b4e97d90de66a52818a326e3e2", &(0x7f0000001080), 0x20101, r7}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000500)={r7, &(0x7f00000004c0)}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.557611073s ago: executing program 2 (id=9238): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080080fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r0], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) sendmsg$unix(r4, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000280)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r7}, &(0x7f0000000040), &(0x7f0000000300)}, 0x20) 1.532122085s ago: executing program 2 (id=9239): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000240)=@ringbuf={{}, {}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x0, 0x7fe2, 0x2}, 0x48) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x1ff) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x4020940d, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000280)={'tunl0\x00'}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socketpair(0x8, 0x0, 0x0, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='jbd2_submit_inode_data\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x44000) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0x28, 0x0, 0x0, 0xfffff01c}, {0x6}]}) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="66f7db1d0000000069117700000000008510000002000000bf0000000000000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000046230000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000e65732038500000004000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x3, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x0, 0x0, 0x9f53a5adbb74a6e4, 0x5f]}}, &(0x7f00000000c0)=""/247, 0x2a, 0xf7, 0x4}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) 1.501885867s ago: executing program 3 (id=9240): bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xbbdb58a70b28004c, 0x4, 0x1, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xd, &(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001a00)='./cgroup/syz1\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001980)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffcb4, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0xe, 0x6, &(0x7f00000019c0)=ANY=[@ANYBLOB="950000000000000818420000f3bfaf27e0f8923f976402cf8efc134adf330ae955d33700000000957400000000000000"], &(0x7f0000002340)='GPL\x00', 0xf0d, 0x0, 0x0, 0x40f00, 0x41, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000002540)={0x3, 0x1}, 0x67, 0x10, &(0x7f0000002580)={0x0, 0x3, 0x6, 0xffb}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000025c0), 0x10, 0x3}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x6, 0xb, &(0x7f0000000280)=ANY=[@ANYRESHEX, @ANYRES8, @ANYRES8], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x38, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000000)='ext4_unlink_exit\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r2}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x280, 0xa0072, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100350}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f00000026c0)=""/21, 0x15}, {&(0x7f0000002700)=""/114, 0x72}, {&(0x7f0000002780)=""/222, 0xde}, {&(0x7f0000002880)=""/215, 0xd7}, {&(0x7f0000002980)=""/186, 0xba}, {&(0x7f0000002a80)=""/33, 0x21}, {&(0x7f0000002ac0)=""/62, 0x3e}], 0x7, &(0x7f0000001bc0)=""/242, 0xf2}, 0x140) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000010180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002280)=@generic={&(0x7f0000002240)='./file0\x00', r7}, 0x18) 1.357807879s ago: executing program 2 (id=9241): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x0, 0x9, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x3, 0x3, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}}, &(0x7f0000000280)='GPL\x00', 0x1000, 0xfc, &(0x7f0000000540)=""/252, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, r0, 0x0, &(0x7f00000006c0)=[r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x3}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x3349, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001140)={&(0x7f0000001100)='afs_send_data\x00', r0}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"/593], &(0x7f0000000100)='GPL\x00'}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020722500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x10) socketpair(0x0, 0x6, 0xffeffffd, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000640)="a86ad861d57a0058d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000, 0xce, 0x105, &(0x7f0000001340)="9c82ed296f2793305399e21e29209d03a5889ea374529c3107ae39316d9f31e47504618c0819131cd7321b645f787f6885e9ed57bad93f2b0580a8ee81bb5baca76a5d704e3477552e63e0268b46453ed1aff7f2fcb079dcd7a7301e7dcf5a1784f6127b4464af204d4c7dcd4298e632b7e824693f758c1c7333d59cc3af33cd7bea1b2845c1bed1b7f638b14c2c4759695fa2ebb7bbecddfc9e5c2a5394bf2075a93550aef39ae1801435360fc59e64ff6b3b5de322abda5525a415641e8a18fb71eb89c207be4d8c88d8cffc9a", &(0x7f0000001180)="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"}, 0x50) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d40)={r1, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r9, 0x0, &(0x7f0000001780)=""/4096}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x1e, 0x9, &(0x7f0000001440)=ANY=[@ANYBLOB="18120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001860000210000000000000000000010018390000000000000000ddc5697111cb73c889616ffb3409e51759f489c1d9125af928c2a02140ef32523a993bf796bd146bf8964a763ddcc5659c85713491e7f1b959986acb4497d5fd3273fe59027636e6961eecb6f988"], &(0x7f0000000c80)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x25, r2, 0x8, &(0x7f0000000cc0)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000d00)={0x2, 0xc, 0x9, 0x8}, 0x10, 0x0, r3, 0x0, &(0x7f0000000d80)=[r1, 0xffffffffffffffff, r1, r7, r1, r1, r1, r1, r9, r1], 0x0, 0x10, 0x8}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)=@generic={&(0x7f0000000a00)='./file0\x00', 0x0, 0x0, 0xffffffff}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x6, &(0x7f0000001540)=@raw=[@func, @ldst={0x0, 0x1, 0x1, 0x3, 0x5, 0x0, 0x1}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000001}], 0x0, 0x6, 0x9c, &(0x7f00000008c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000a80)=[r1, r11], &(0x7f0000000ac0)=[{0x0, 0x5, 0xf, 0x3}, {0x1, 0x2, 0x0, 0xa68717dcfa87b6fb}, {0x0, 0x0, 0x0, 0xa}]}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) 1.352684679s ago: executing program 4 (id=9242): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="c871cac02661"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x14fbe9a222499890, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="180800000000000080000000000000001881ff03075be35b03d9c075a5d9b8ed2f4399d6d040f63e3bd640", @ANYRES32=r3, @ANYBLOB="0000000000000000b70300000080ffff850000000c000000b709000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x5, 0x5, 0x0, 0x0, 0xa0, 0x3000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000240), 0x2}, 0xb200, 0x4cebfd5c, 0x5, 0x9, 0x2, 0xa7a, 0x2664, 0x0, 0x1, 0x0, 0x200000007}, 0x0, 0x0, r2, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x2, [@restrict, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3}}]}}, &(0x7f0000001b80)=""/4090, 0x52, 0xffa, 0x8}, 0x20) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYRES16=r5], 0xfdef) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000100)={r7, &(0x7f00000000c0), 0x20000000}, 0x20) 1.198342752s ago: executing program 4 (id=9244): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000071102c00000000009500000000000000", @ANYRES16=r0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) socketpair(0x23, 0xa, 0x8, &(0x7f0000000000)) 1.172132214s ago: executing program 2 (id=9245): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0x20008, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x9, 0x1, 0xc0}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000003040)=@base={0x9, 0x0, 0x7f, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r7, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000300000000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000b40)=ANY=[@ANYBLOB="180000000000000000000000000000e295000000000000006328194412a2e7f649ceea0e4ae0fdef6c8b855ea64b63035754fd0a0beef0fbcf37be40d7797a5db52541081c698f4aa4b6adb606f998da0000000000000000"], &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='f2fs_get_victim\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000633311d3b7e4e67154"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r8, &(0x7f0000000080), 0x0}, 0x20) 1.117948499s ago: executing program 4 (id=9246): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x7, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000b80)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) 977.51988ms ago: executing program 4 (id=9247): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0xc1, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x146, 0x600000}, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) close(r1) (async, rerun: 32) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000"], 0xfdef) (async, rerun: 32) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (rerun: 32) write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x13, &(0x7f0000000000)=@framed={{}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x70}}, @printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (rerun: 64) 802.430114ms ago: executing program 4 (id=9248): openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000008000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfffffdef) 457.427423ms ago: executing program 3 (id=9249): openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='block_bio_remap\x00', r1}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xffffdfff00000001}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000080)='ext4_evict_inode\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xeb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./cgroup\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="aeaa000000000000711013000000000095000000000000002020e4bd8503f8ab2215f80bc72d5b764d019741c507000000920a5fea5629126f02f22fbe444467069b956e57cdd4b3434573eae5fb148b55fe50ecc9bb6eecf85aab6369a66c"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='io.stat\x00', 0x26e1, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r3, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000000540), 0x0, 0x10, &(0x7f00000001c0), &(0x7f00000005c0), 0x8, 0x6e, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', r5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYRES64=r2, @ANYRESDEC=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x19, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="1806000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000080000000850000006c000000b7000000080000009500000000000000"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000000c0)={&(0x7f0000000040)="2dccadff14e980269e8673d40e07cb1229159e6f0a099aec29e4458eaa6e7eac65218ddfb8b9a872af68af468f6ee403193c5fa97d92a60033356e2f90916a50e8a7427bf01c2066d7e261fdb8a385fa2b1fd891e1555696b929e42c5ef140d0bda23f380ce9", &(0x7f0000000140)=""/94, &(0x7f0000000240)="b037f5030d8e077d28145b446823a3e32c9ad783341a43f64901e23fa5f9f3588bd3ea8cd4a3829f2370dee668e0a5501c3c9aef63f33d49a40de995cf8e994889d8cf03b7fc1e293ca63d89712cec0253f18800470e28f39b2111a3cc0191fba19a6be9d9198b596d8f8c1da02d4f15ef511ec29c93b5acd7c618d71702aa8e1e005baf169ee9354b1c7c33ce5d57c46cc40ff1532a368e8f39b560415c0543ac715309912f8cd55e96d23dd645b073283ffbe5b2c2b498e1502315025722ce733e897bc5ad7777f45c4326b5868cfc42230af223bcfa1bb31a4be6ff8d3d0ba37ec4c35540f6c3d9b1c2e525fd77", &(0x7f00000003c0)="302fcf890a0c3f61771946f94d052400ca9341dbe0fa17cc064f212d8e2b37112ed924bb6818215bb02a7f1f5fc11cd8df568804e08a2d321885ca0915464a067c301db05e9bbc1ea52472c945bb8f349ccaac33b145fa77e4ad01aabf9864854ac71cf37087368be61c9c1c825980631abb0bfaaa21089a489d631a19e984e56f6077d4d42b77f68e9c6ee8ac2160ce7423e4e8455d85eac93f07b3c49ae18b62579c6f4f90668e164400895e33845855bc0ae77caf77c480d2919ae78bb1b182865bad1c787d0c00dd46d20a3eacbda684b5f181", 0x2, r7, 0x4}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfe1b) 403.689297ms ago: executing program 0 (id=9251): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x3d}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) (async, rerun: 32) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x31d}, {}, {}, [@alu={0x7, 0x1, 0x4, 0x1, 0x8, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x19, 0x0, 0x0, 0x41100, 0x55, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x243db, 0xffffffffffffffff, 0x1, &(0x7f0000000300)=[r0], &(0x7f00000009c0)=[{0x1, 0x3, 0xf, 0x7}], 0x10, 0x10000}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00'}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (async, rerun: 64) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) (async, rerun: 32) socketpair(0x27, 0x1, 0x0, &(0x7f0000000040)) (async, rerun: 32) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(r4, 0x4b49, 0x2000000c) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18270000", @ANYRES32=r0, @ANYBLOB="000000000500000018220000", @ANYRES32=r0, @ANYBLOB="32eb5d4f58cfaa7b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) 358.709631ms ago: executing program 3 (id=9252): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1e, 0xe, &(0x7f0000001600)=ANY=[], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00ff0002000000000000000000000f020042122a80000000000000000f0200000092000000"], &(0x7f00000006c0)=""/196, 0x36, 0xc4, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, &(0x7f0000000380)=""/216, 0x0, 0xd8}, 0x20) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0xffffffff, 0xfff, 0x7, 0xd68, 0xffffffffffffffff, 0x20000, '\x00', 0x0, r2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095", @ANYRES64], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000c3a0000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f00000003c0), &(0x7f0000000580)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={r4, 0xffffffffffffff23, &(0x7f00000011c0)={0x0, 0x0}}, 0x10) r6 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000d0, &(0x7f00000002c0)=ANY=[@ANYRES8=r5, @ANYRES32=r6, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3558ecdfdc82135e, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000000)=""/140, 0x50, 0x8c, 0x1}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095000000000000003464d071e1ff193cac18e78551e6ae5dc926959b1605f6e528c49e7d8618a05d29fe4df3dbffdbc657c49af31ec0789a22245c83b34eba7c1f17f47a2b8f59ca53db8512773b0e7de97ee58544dd2709f07143e8f898add07110efa83971bb667bee5beb5fbb18b00dcff74c4c00b0e13212a55db69f2a6bdc6ac0af3f519cb8cf0265b20ff96e7e8fdd3338aa3b200c0a57104f0d24a46620e2843d64749695d1bfd7f792ae95a881942be1c5a4c004c546b0d7da604b48eb0a0c9d3501f64ae16ebe17c59639ef27738a7ec524a05ef279751468e28b492a4827314b84fed4c903e42e6a1e520bb62377e95bb15c8888d355d9ec9620e36911aa8522d2dc3fb0e601a1ddde9214f23c1deefdc320e6e71abf58da477505871857c58d66a45f0af309ff67f9d948d6ea767fc6adc12250ad37e00b2e1305a73dd3eb9b5e49eb03c0a0142d3a0cfbef22b1a264c62328e5cb3aa752b9780f51b079312eec1c06917a4b9aba00dfbfaf258d445119e134f6a049998b68b5a0f2b2c02be3c7044931ef3c13a23064942ac498fc1cb2e7a437c1a41ca77c3aff58e2f72bc1699b233fd3deb49debae3e4e3227d9bd68fa11436e0ed78f2229a6e13854e4504e65bb32ad0c54a3da3f88321d92308055b358eb0ecdf7cf37e3cfc26656a00347ff1e9a8800fa966d597a011349c9edfe42b56f204f7b0bba3783904a9032a59c0ec1c54bc32b5cfb84dc4dbb0ff09efaaebb1e284a45e7c85b6d3bbbf280e799894d937300000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 301.712605ms ago: executing program 0 (id=9253): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1a41, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xd132}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x140, 0x140, 0x7, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}, @union={0x0, 0x9, 0x0, 0x5, 0x0, 0x5, [{0x7, 0x0, 0x4}, {0xa, 0x1}, {0x3, 0x0, 0xfa4}, {0x9, 0x5, 0x3}, {0x5, 0x2, 0x8001}, {0xb, 0x2, 0x8}, {0xe, 0x5, 0x3ff}, {0x0, 0x4, 0x2bec}, {0xf, 0x1, 0x1000}]}, @typedef={0x1, 0x0, 0x0, 0x8, 0x1}, @enum={0x1, 0xa, 0x0, 0x6, 0x4, [{0xa, 0xb}, {0xd, 0x100}, {0x8, 0x2}, {0x1, 0x2}, {0xb, 0xf}, {0x8, 0x4}, {0x9, 0x1}, {0x4, 0x5}, {0x2, 0x7}, {0xd, 0x2}]}, @struct={0x10, 0x6, 0x0, 0x4, 0x1, 0x1, [{0x6, 0x4, 0x101}, {0x8, 0x0, 0x6}, {0x7, 0x0, 0x401}, {0xa, 0x5, 0x100}, {0x4, 0x5, 0x3}, {0x8, 0x8003, 0xdb9e}]}]}, {0x0, [0x0, 0x6f, 0x2e, 0x51, 0x2e]}}, &(0x7f0000000700)=""/30, 0x15f, 0x1e, 0x0, 0x2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000380)="93702f29d15f8da9577028c22914d463fbcd4e72dcb218558e0be19109b36ef762d3c5d952d5a6049fda6f14833fbd9f51eb333e05055ceee8e1137442627cb6b0669379ec9ccfc5986541ba6ffb3d610ba10b30ec1f7c97576e00b50971ada538fd2611889aa0bde79712", 0x6b}, {&(0x7f0000000580)="b5f6a20a1d66a51927ee32462767f0234c95075c8be8c8347d8fbac87fa29e0c6690a5da28dad394d9bc122d22bd6e2bf7df924bd8061ba93d15c8f64e36e2d4d056dd762a5785670657fff836aa4f429a3cb0654f256a849dbf6575dbd063b552d7a5f1e2ce87ce9d66e77326da14decbfda5373fbe495219bd720a611b9fa555f3ea5da763c87f80f4bd684d7d32ec2cc655caa2a659b4fc5d1b6e37a13cbabebab2d56507a4adaee8a76c83ad808d83bddef3ab1facefe7bca18e02578d5fce685a39de45c5853410b2654d574c8bcbacb112", 0xd4}, {&(0x7f0000000680)="81331f6bb51dd157d16590c42bb82b415ff2f7d88fb1539a7f72b46b2bb337e2058381cc9c5835dce0f013ece0a25e511eec38f90f0304307d9c47bcee3fb0d2f93a3051acc5a0b945d0e7b34eda1cc9208c9a81235ac8357965be585f96ab3c851500f0dbf8e92771f04879dd031bdff12b43fce917a0464ce7b3", 0x7b}, {&(0x7f00000008c0)="01765a45ec7a7f02dc8a42ac231bd0ccf9b086dff953cdd060a6b3dce446a2b65e0fe735537a55563355f2a6dd232f4c98c843770c444096737be4a0623188b187f4b2c650b6e290db8c8ae542420935da8a309e01b4f33576f1e0b8403e8c56159680188f948bc55deea6232e8ab555f5fd15c65f4bb5ad32ba39ed010a71c211ad2f10ef46673ca15b848c7e9474fc4389bd7d36b276476904701536db4601cd7493e385da49ba4aa7a80296e156e4f5f938cb443212ee4d89566beb38a56ba6b6084ce032962b09468f294a0b2133c0950b31486e8926fef427405367800f2f0c32ffd2f1c7fd2dda39b59bedba56d7f6a6", 0xf3}, {&(0x7f0000000280)="2d3c817fe96af77a701c8ffd9d98c704de1b9ded8a4f1afe7f84e6ecd302a8b4fafff69af3902a5507fc924e7b28855308", 0x31}, {&(0x7f0000000780)="15eb7e2000607010e44c3df828033fdbc276535eb1b20a76bcef97b9342852140ae7f7ef90561ae12e910c153b17a08ef2d73d8eced5e18b9d924cf8352755e1a6fd899810f2e6dac13844d1f47ebc367d5776c90a280a6128c8fd4150392ffe579122ddea62d5fd8dd16f416554749b6a8891ae111144ff78fc2e09", 0x7c}, {&(0x7f0000000a40)="bab135b5ef2116e980c36eff4efad554cbcb02cacc5bbca24e59ce7780b727ef3e654e5412a995b31f930b68bf24c26f0630a6ca915808e62066188f68e85c50ecc41263099fed4686a943130facb4ddb0cd7cff18520fb47a60", 0x5a}], 0x7, &(0x7f0000000400)="c85bef2e00430bce9e4863c942fb036be5c07c8d09479ff0812051157ead8eabdc12c07983", 0x25, 0x11}, 0x40000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r7}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x6e8a) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00'}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 298.695156ms ago: executing program 2 (id=9254): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f0000000480)='mm_page_alloc\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800083}, 0x10}, 0x90) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xe) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f0000000200)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 280.177038ms ago: executing program 4 (id=9255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x1, 0x0}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='%-/\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000380)='mm_page_alloc\x00', r4}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 251.30049ms ago: executing program 0 (id=9256): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffead, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x4a}, 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000380)={0xfffffff8, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000003c0)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}]}, @func]}}, 0x0, 0x3e}, 0x20) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x24, 0x8, 0xff, 0x0, 0x0, 0x5, 0x5, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x10041, 0x2, 0x5, 0x6, 0xffffffffffff7fff, 0x3, 0x2571, 0x0, 0x18, 0x0, 0x6}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000240)='veth1_virt_wifi\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xfffffffffffffdf2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8946, &(0x7f0000000080)) 193.988714ms ago: executing program 1 (id=9257): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x7, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000b80)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) 192.615835ms ago: executing program 3 (id=9258): bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x60, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180200001000000000000000000000008500000028000000850000007d00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1, 0x8, 0x2, 0x4}, 0x48) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_allocate_inode\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001bc0)='memory.events\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000711231000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071113300000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) perf_event_open(&(0x7f0000002680)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x6a, 0xa, 0x0, 0xffc4, 0x0, 0x69, 0x10, 0x3a}}, &(0x7f0000000480)='GPL\x00'}, 0x80) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x6, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180200001e00000000000000000000008500000017000000850000000700000095"], &(0x7f0000000080)='GPL\x00'}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 179.881186ms ago: executing program 2 (id=9259): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000ac0)='consume_skb\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r7) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst, @ldst], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x200008e4, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 141.227319ms ago: executing program 0 (id=9260): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001e00)=ANY=[@ANYBLOB="180000005ce59315e27f3ea3f237c50010000000", @ANYRES16=r0, @ANYRESDEC=r1, @ANYRES16=r2, @ANYBLOB="6cfd2d13033539a8b129174ff66c3c9bf424c3b86e0c9d11636e1cffff106f70e39b7619de46bfdd80e454fc5c3bb4df42ac25d4973e2e638f4618cd57316e3143f13408149d9bf661378f5ee042d5979d46a97ae815c549d62876fa9b9f9765ae70667f0a905f80e3fe02c8d8405b5c16e86b07846d7ff6d0ceb95bc69e32086fb05a6afa55f7142e574cc863469f7d7b5e25bdd639389ea87524ac39c1b237a03ed86d0242da59955544b8ae704df699eee664ab29ac8c147be93b57977feab62da3bda019bb70eef4d054aa33bbae0ea88e1e799979744e8e01b0f9550645ef07ee0accdea066985261408db8f3524ee8dcf3476f8c6814e493b258ed5ffe761e8a4a05c09e131abbee5b8668417fa9a8110e49a8ccc50bb1d06dd986c2329235114500dbef89dfde7d01678ddaa09427f15d4b9bf6145e1feaaafd143c5bffbacdc64000c4097c020104d05c70ed95de275cb5b17acb37c4e4048e3645d3111b2c8418cdf4eed126c41224395126eda84a78aa9aff65028b0390b9530b5fec8cb374f0683644c9231da0573886b539c06d600c7e66746409c971e298b8dc1d9543cc2f8c5763c045afcf2fbdfb22a75b82be1209ae6257295082c5f53814795a62bd6d0fa58003390bc9281c993664d38f1f547380360a3ea5344572cba54a694ea40e10612caeb88a0383443d82019a49fdc41be9693c554348b559d1080b6bbf01cd80ad71c93adb76cc99f0d5bc22038487564d1ba98a6b029d7b5c17d845b670e7cd1fee26d21d98204ef97bb85b7823561b7c940e44a1a54a34941c682615710e938d1f647a4850ffee64400605512439f66eab65258f92454ba8dceac3f22b91ef5a2bf44f14da71cbd13af8d4d49a90b6df585dee25c42293a935c163c128be6a77804a56885fcc6e334d0b11614bb31fccc68be1f174d2c56ac9a66ec882fda775c8abf368a9b4b8305623c7102be2f5d62e8b36404a6ec623a9930dda8d4f728a91605af129c321514efce462e72bec05764ebc95d2675b2509e6bf3d89754c88ae8e5706097ae5f046036f2725dd47ae0aa2d264c4c4357bdec1d9084b3f9e747ebe800ef1b8034f6af6f1cf6a2a7a0cc1ecb375320d4c84a7025fe0a49d43c63c1079df163558296abf66632f0960426d7d288316ee2693e882a6664502f78215e670852e5e3d86e305441a5ce09bfba103f82ca03d5eedda5f914f56e4d7098966548116fb86ca5185fcd13bd35db566ddc5bcee6134fe646f091ad4758040be36dbf08c52fc333e5db2c10dc3b57fd69f3500857408ca3207d9d8a24b782948c98de6c1d142b2ffa8ceca7e347773ac8d90f8f7e0f98c41714f4b29f9d6e4a75450486483c0ed1052de8585274ed78d1d64eaab7dce803ddbaf58524f6231ce9a6b5cec0aed105fc9541f4908dbc0ecb858c9e9a233c20ddc463b56b135aa6e4f51a29381bf58233943981a55ed00cca70f03d4e6f117c8c459af3d7ad0fa10fbf77c9e4fa782e87a917e34181d79d07ab5ae258801fe73d40e0b72406b8df025082b065b2ca99483cba42a60eb60be6b2ab83b872f45924ec545e7dc8d0cc5dcdf6ef83a2d34a9fd6216d6ac32f3b213d2561f91579da2973b6cb809f34cdc38fa5edd3c5aafb6c0e82d71f0f2144e03d7803ac0e6199b647224cfa051d4e450e7850073d848d13758fd1198ba238e6e59202b0c791f9dc29af95c6e8ea368fca16b69c3b234841646eadbdfd82e419679146bf82df5ae73130644f09ece22e3a5c4b61ab01c8c4f3dfa0c721c28bdb08be02eb274b7b7cd92d61df17da36bdf20017da1d289e5d4ed721d4c886336a5909b115aa469ec3114d0e88de07f61269939c6f6384014ac2640da2a7f4649cc90cae4f974b068a8b81bf481a0cb082880be290a784802e2fb33e9b9ee752fc38accef3cd70b6a6e8b17e4c9d4691f3f791b703ed79a3c831e2f7061e94ff87851117b44bed43608dd07b319726e032cf3e88c78bbc25d09fb6b76194c60ca04bb114c04d043315c262d2f687307fabf8806df7847ca1ee07fce046a9bf2d8dd7c88c25f60b3a76387afe2e8a1438ae3f06f1cb1d6cba49a94d6cdb923f4812db88fcc9dc116a38e301b605c1f97651c860666672b6b53613420cafa6f746d57e42b38bfe4e3246628df46849b65f14b964cb17165745f8598110a94642a30fcd718e1772e14fb3520166cf4302fb787eef41fd147b4bbcab799f736656d9cc51145b69576761bc40579903c5c4ee0b5297dd4d10ad47abcc70223cf418c8460f169605ccc8625481e52e51e645dc581651e4eaf94fb44ae07a66cd2caa1112f424e026156a05e95335baa405cf94af0f5f06023c6a74fc8871220d09343e8b8da18718e762e976b146dabe1a63d86d330c26c79ad64c6fc01518d1ac931732577c38e0ebeda19e32666aa927760ceb74b74c2f0930ab00a795d5b14db54575d3a0f01734f7962df074ce0c006002d7c8b96cc264c77d68cbba20c53706e9a3d9dc1c74d80c7d0c58504c01bcf54c455dce49e1108b51b7d63397701a82ad34a6cc1592b900337fa7ef47f9938cd26d26740db93acb22a4220fcf6442271c5319b59ec4cc7f628cfd0fc8996048751428ac85f67b203c659bf11ebad6519ff6b95582f4989c1a20c92e4f3a173ad6ca5626f0b33e6b25b12bb3c9e6d819a03551d7678f319802c597eef334d512bc7ab6809443aa16b4d85d60e862a87a5c6dbbadaead5d32f4f07e37b93c09c9c6c69770322ead77811929ffe269a56d60011a01ffe438418d35214e51a6284e870ec40e80266a8fb5d371396c894e26fd920c9c7b980c5c9128e122c77ce83df804a45c787bc36ac835d4b7d652c21d104e88dd89a9c697dd4fdb9eb0a7f5b6b2d23437c3a0f179fa84f948a6f5c0ea73141dd9f43ffc4b018a22c46221944320dc4ba887230f6359dcbd14caea38eb9fadf6234de9caa50415b5e805816dc878e4c3802c018b81a575df09bf7f90a72df356dc287434ad669ee3806958712576595b847ca94bee9463a1e9d7958cba4a943bd43e73947e2e77b292730cf9d3921f1493c48c0a8d54be4f2762598baeef1d9f01f9fbbb0bd2f52fe664be278685af0588facf4a94deb1609074bd44d20fd5ed2d860ef70fdc130e5841c8af81b57652feecf933ec8c6daf981b7e4039518b23b424a590607919193bdd7258d2d5fcf1129ea8027159299a032fd0b126b985b62b755fdebcd1897cbf65e0c69a8a434aaf9514801307ad54e4705d4b1ce90a5e6d28bf8e93182ceb63f1ce6bcdd5f7db6a090d60975ba9100885bfe6d9c8f48d3bbfcc2a95914a418b10cb5a3bb3586752e5a2a1480dcfdfd6ad3c88477c42b0eff4f41e089e0dc62b0b7c64ecfc7bb190cd490f96554cd28b0073db1e6a2d15712735b97f5e3c52f9e36b125f276118499d793ec722507771f6c5341626bbd4a368910b6d1a41ce17c0c2a200b307ba14f8651bf7716ef64ea13b0fc78d4f04988d835b54b5a7efbfda8bf82b9c55fcdde0b47a1cc0f7c6d84f19e25fb7174dca8e2e9146b2245c92dce0910cb4080bc7f7decc4538c679f19e75eca54081aa9fbffbeaf771c751533f299a77ed50f5e85a22d76fd60b796f290b5e36ab94454a93dd561d4828ebb68a989bd21bbd18de93833f4476896647fd3ff5595fe28446f2156a01c03ccbe7756deddeee6d50f5a78326e2db75f217edd2d86a8a3c25e10cbc4a8e87e95e808ea2e34b29a08a8480e67e088d87467d10dc66d7f10a55b5c0c9940120780134ac94b70bfaa5c59ca42699035c0b411de41c46a20d1d845623581e32dcd8388cf3549dacfafa3bf0b4f412b0d2e94b7d876179dff419e3e2993d12828654ff5fa712607610d8c38131c961efb86781b745674632cfd82a3b517532a894739a49d538ed847edbbb125688abe5f5014bbefc589f801a431a05b3b2ea9f4a68bcdeafc60c7254461a955efa90c9b8d267c600840baa4dca7e8bf74122a372e463bb27d88d13ad0e833243c7c9e27af7c0f724dad1fd5d4f613d7423f3b85d8fc543ca4612cb5640f522fef496b32b5a4ffbb83684a7549498d655864ff86c58256808a47d62bdd4ebcaf59cdf522beccdceddc9bfcc55781db3340f79863568fb384b7c9a3cdfcc646ec33150ffba308086e4936e700087d18558cecc3a5d9d9661d93e57fa0a64707a08d4a02c02acbee5b98bac09ffbbda20f4c2fcb0bea90456f9ec4e764bb5aaa13ba8d367cf58dfffc38230da932659eab6fb48c01c0b51652267c66da3d821c7a4803c54f90be5811f094f1430538f13a351f5b637b3191c819e695297d468027acfaa5c0e40b75e19bf8d89b168ee9828aa4f567198924241f8afa7f04aa86f30716df3ab49bca2c50a38442afac91150d51e8c06d78a9de7c5d785f56907691c30792c7ec77163b9a6eb534cf0e0a52ee9fc087a8cad7f2552ae71f85a8ce2f92ce62603d5b74e7356db18f6f31f8fa84baa278b17935867799bdb796e46a1367353e01f9ba0e86830d5fa2f541366742d43213c862805f4c2724ced617d89088fa197a05fb57434b198e23630557d3653632805512d3d98acc6c5ba8a405b1762db7a37f516252350c43f70a16b7b6acfa9f3efc09d8c848a8e3b7068c2fe115ffe94db6d2935817909c37b382e451fc2c3193d2188e8e5acb64a1e6c443417c602d8af8330907e0b6e5d6c7bc7014f8d5230a10d905e708a359e6274ea20619a8a07bdf35fd7a9883b6f702a7609d47319f267359381ebb29ea71fd60d1f9a0ccb038d429676f67745f1d90f6ecb1bf6dfc3952ba62129c6294fa967863fafbfa3a4eae252be0320fcfc4c76d674242bd0590a6790df16f06a88178a355357723e251f4c1ec8233966f91aeaabcac52a2ba17fd4ef6b2e7afc2c4b2487126b1ad06e8b7c71d03c8979c6e17637c30f58881defc5b7be28b21456b721fb4b0a05a58f14d3200b0748791c4dc83d746a90e900e3232d6191cd9d940be5003eaccbbf54347057821ff30a9eb351ee2bbcdd9a4c3261cef273e9730437fba22729bfeec5b5ec07426481a6b605e89d39071476c181b3ea2a8ccc71ba03072d02aa12f51199810d53e0a154c8c4bc6fa11bba5aa6131f68723f6ff5df3791e22a9a10c802fe4cb6a29b3ad6cf0a9ef9a0719fb2f2c6a66f18155fc9ddd64111d98ac652ee044c89bfd0a75fdaa8880fbee9ef06154d7d34a4a6a2c8ed36f4d616e5921f7ba2b70a65e94f448572e09b863865fe34fc99d9f68e0abf6c522243b7fb4e56aa68e138a91209de492d2bc9a5fc57135afb38fb9722eafb62216e5920ffe57e8bf397142b0503db1b49c6a1a396b42d20a6a82b9774a313f28a846963e7be7108ac941b959277b7bcf82f4b845bffecebda5c764c44824fe7f020eae6ab6e653aabe7d603b41ccbb9448d68e87a8ce7e426e3299fef3b5761304643b4abe29ebec6a7d91d8b410be26b7e8287c25406d4e2270d91ee7edcc53187ba71011a5f26133c54f9fb4933710765e701ed5d2a052487359c4f5174e53b4ec3017684686275f746ed2383ad2649ad426156ecf6f3eb94aafa3a0645c24f82b8614973f6c4189d44de3ce2124917bcfeaa89ff8476a13648f61877f6545b80003592f3698b879310d07dc40c987bc0ed6fbedb01ebd60f12526f3b4987a0b36b6955a00bfe4d4de6feb81fd747d907e28d4cc04e78e384762b2b7f8bf2a57f29f915c4e93c7cc5705ec0db9c3edd264f3e9e135fe0dd8"], 0x0, 0x10000}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x7, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a5e}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r6}, 0x3d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r7}, &(0x7f0000000000), &(0x7f00000000c0)='%pK \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000f17bca038f76ca09e8e4c9c5d2534ee6fb72e7823150bd06a284107c4fdb71241a35723da01ae5a671b51e2a219d39ab82833a5070ba44e6a4076b87fd94fb3e0d47c8c682c074d709637bd4762490df1d627c97d3667a9a4fb164f1c898ea9b5aa516ef96c8b33969fb01d24be87cbbab420fb94e0ac9d60000000000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r8, 0x2f08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r8, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000580)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x42, &(0x7f00000006c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x0, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffff}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0xe, &(0x7f00000002c0)=@raw=[@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8000}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @ldst={0x0, 0x1, 0x2, 0x6, 0x9, 0x100, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x3, 0x0, 0x9, 0x40, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @alu={0x7, 0x1, 0x0, 0x0, 0x5, 0x0, 0x10}], &(0x7f00000001c0)='GPL\x00', 0x0, 0x1e, &(0x7f0000000400)=""/30, 0x40f00, 0x0, '\x00', r9, 0x25, r10, 0x8, &(0x7f0000000a00)={0x4}, 0x8, 0x10, &(0x7f0000000c80)={0x5, 0x7, 0x7fffffff, 0x3}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000cc0)=[{0x1, 0x1, 0x9, 0xc}, {0x0, 0x2, 0x5, 0x8}, {0x5, 0x2, 0x4, 0x5}], 0x10, 0xfffffffd}, 0x90) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYRESOCT=r4], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r12}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r13, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 140.031439ms ago: executing program 3 (id=9261): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x101000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.max\x00', 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1503"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) close(r1) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x1d}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000001340)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000340000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfffc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8548e000000000000a665c45a3449abe802f5ab3e89cf6cfdffffffb8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8ff7e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae1d39c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da083e8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c3f081ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a58a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b8840558b3f918d675a79907a7078252cd3fbaea5d3006a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb5ff0f000002ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbdf6ad488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc856df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d0e68d7eef5d32d5fcc7923d7544fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c22e46af480c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f98638009c142751518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c1b9a8a14604fe52837a19dd6952fe2724c0105ab158a54a4a23ff0f4bc43c0e0e426e51258e40bb4b68ff4e3a8fe314a05677f7243a97e509d37794c1df6fc61a5b6488e738fb6ae587e068352f8e690fb9463498f79de93ce106e312b1ae457384939f13abbd346b6a869b956793ed1136827ff87c51b3ffcd824a9d238effb9fa1230dc0bcfafbf7cfc78525ea399bfff0fa92d7cd38ba9b4d735dcff98a8140af7acae003053e4b80baf16b9566566d299c0b1699eed"], &(0x7f0000000140)='GPL\x00'}, 0x48) 101.189082ms ago: executing program 1 (id=9262): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000840), &(0x7f0000000880)=r4}, 0x20) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x0, {0x0, 0x2}}, 0x10, 0x0}, 0x0) socketpair(0x18, 0x5, 0x8001, &(0x7f0000000a40)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r2}, 0x10) write$cgroup_pid(r1, &(0x7f0000000980), 0x12) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000c00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r10}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) 53.864726ms ago: executing program 0 (id=9263): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x5d) (async) close(r1) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000), 0x2000000e) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r5, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000c00)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2, 0x0, 0x80000001}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r7, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r10, 0x800454e1, &(0x7f0000000380)=r7) (async) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4}, 0x48) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', r8, r11, 0x5, 0x5}, 0x48) (async) r15 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000900)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xd, 0x10, &(0x7f00000007c0)=ANY=[@ANYBLOB="180000000900000000000000080000001800000006000000000000000400000055e81000040000001851000002000000000000000000000018130000", @ANYRES32=r13, @ANYBLOB="0000000000000000186b00000300000000000000ff0f0000950000000000000081302d05060000a50000006b4b0100000000009500000000000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x1d, &(0x7f0000000840)=""/29, 0x41100, 0x40, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0x5, 0x800}, 0x10, r9, r15, 0x3, &(0x7f0000000980)=[r14, r14, r14, r12], &(0x7f00000009c0)=[{0x2, 0x4, 0xc, 0x9}, {0x4, 0x3, 0xd, 0x3}, {0x1, 0x4, 0x4, 0x5}]}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r6, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r16 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r16}, 0x10) (async) r17 = getpid() write$cgroup_pid(r13, &(0x7f0000000280)=r17, 0x12) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) 42.588487ms ago: executing program 1 (id=9264): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xb, 0x8}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0xfffffff2, 0x0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000006c0)) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030400fefdffffff000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x7, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x1e, &(0x7f00000002c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0xe0, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) (async, rerun: 32) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 0 (id=9266): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r0, @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f00000002c0)='vnet_skip_tx_trigger\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{}, &(0x7f0000000080), &(0x7f0000000200)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_tracing={0x1a, 0x1b, &(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000", @ANYRES32, @ANYBLOB="0000000000000000b7020000000000008500000086000000184a0000f8ffffff0000000000000000180000000000000000000000f5040000181a0000", @ANYRES32], &(0x7f0000000840)='syzkaller\x00', 0x7, 0x3b, &(0x7f0000000880)=""/59, 0x41100, 0x5, '\x00', r5, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0xa, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x1f306, r3}, 0x90) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r4, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)={'batadv0\x00', 0x7023}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00'}) kernel console output (not intermixed with test programs): orrupt user memory! [ 182.468144][T12424] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.513559][T12424] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.521975][T12424] device bridge_slave_0 entered promiscuous mode [ 182.528879][T12424] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.535953][T12424] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.545470][T12424] device bridge_slave_1 entered promiscuous mode [ 182.669782][T12424] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.676653][T12424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.683760][T12424] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.690532][T12424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.749635][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.760220][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.769636][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.781176][T12470] device pim6reg1 entered promiscuous mode [ 182.792094][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.806871][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.824238][T12424] device veth0_vlan entered promiscuous mode [ 182.832315][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.841331][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.849378][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.856792][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.872410][T12474] device pim6reg1 entered promiscuous mode [ 182.890654][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 182.898748][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.910457][T12424] device veth1_macvtap entered promiscuous mode [ 182.976823][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.000378][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.030130][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.069317][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.099706][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 183.863396][T12514] syz.3.3442[12514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.863443][T12514] syz.3.3442[12514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.023376][T12519] device pim6reg1 entered promiscuous mode [ 184.112010][ T24] audit: type=1400 audit(1720279606.259:175): avc: denied { create } for pid=12543 comm="syz.2.3452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 184.145616][T12549] device sit0 left promiscuous mode [ 184.172541][T12541] device sit0 entered promiscuous mode [ 184.299477][T12564] device syzkaller0 entered promiscuous mode [ 184.323671][T12566] device sit0 entered promiscuous mode [ 184.729623][T12595] device syzkaller0 entered promiscuous mode [ 185.175888][T12630] device syzkaller0 entered promiscuous mode [ 185.313960][T12639] FAULT_INJECTION: forcing a failure. [ 185.313960][T12639] name failslab, interval 1, probability 0, space 0, times 0 [ 185.349804][T12639] CPU: 1 PID: 12639 Comm: syz.2.3479 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 185.360992][T12639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 185.370888][T12639] Call Trace: [ 185.374012][T12639] dump_stack_lvl+0x1e2/0x24b [ 185.378519][T12639] ? panic+0x812/0x812 [ 185.382424][T12639] ? bfq_pos_tree_add_move+0x43b/0x43b [ 185.387717][T12639] ? 0xffffffffa00101dc [ 185.391711][T12639] dump_stack+0x15/0x17 [ 185.395714][T12639] should_fail+0x3c6/0x510 [ 185.400047][T12639] ? __alloc_skb+0x80/0x510 [ 185.404387][T12639] __should_failslab+0xa4/0xe0 [ 185.408984][T12639] should_failslab+0x9/0x20 [ 185.413325][T12639] kmem_cache_alloc+0x3d/0x2e0 [ 185.417924][T12639] __alloc_skb+0x80/0x510 [ 185.422091][T12639] ? stack_trace_save+0x113/0x1c0 [ 185.426955][T12639] tipc_msg_create+0x49/0x5d0 [ 185.431469][T12639] ? tipc_node_remove_conn+0x2fc/0x420 [ 185.436759][T12639] ? __fsnotify_parent+0x4b9/0x6c0 [ 185.441706][T12639] __tipc_shutdown+0x11ca/0x1510 [ 185.446484][T12639] ? tipc_recvstream+0xf70/0xf70 [ 185.451514][T12639] ? sock_init_data+0xc0/0xc0 [ 185.456025][T12639] ? wait_woken+0x250/0x250 [ 185.460369][T12639] tipc_release+0x76/0x1440 [ 185.464709][T12639] sock_close+0xdf/0x270 [ 185.468781][T12639] ? sock_mmap+0xa0/0xa0 [ 185.472862][T12639] __fput+0x309/0x760 [ 185.476687][T12639] ____fput+0x15/0x20 [ 185.480504][T12639] task_work_run+0x129/0x190 [ 185.484929][T12639] exit_to_user_mode_loop+0xbf/0xd0 [ 185.489960][T12639] syscall_exit_to_user_mode+0xa2/0x1a0 [ 185.495427][T12639] do_syscall_64+0x40/0x70 [ 185.499686][T12639] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 185.505543][T12639] RIP: 0033:0x7f84119c1bd9 [ 185.509793][T12639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.529312][T12639] RSP: 002b:00007f8410c43048 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 185.537555][T12639] RAX: 0000000000000000 RBX: 00007f8411b4ff60 RCX: 00007f84119c1bd9 [ 185.545364][T12639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 185.553176][T12639] RBP: 00007f8410c430a0 R08: 0000000000000000 R09: 0000000000000000 [ 185.560985][T12639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.568796][T12639] R13: 000000000000000b R14: 00007f8411b4ff60 R15: 00007ffdbd0f33f8 [ 185.751405][T12653] device pim6reg1 entered promiscuous mode [ 185.837431][T12662] device syzkaller0 entered promiscuous mode [ 185.856270][T12662] device wg2 left promiscuous mode [ 185.870505][T12662] device wg2 entered promiscuous mode [ 185.958997][T12684] syz.0.3494[12684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.959051][T12684] syz.0.3494[12684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 187.158250][T12758] device sit0 entered promiscuous mode [ 187.894315][T12803] device syzkaller0 entered promiscuous mode [ 188.473507][ T7] device bridge_slave_1 left promiscuous mode [ 188.491857][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.511863][ T7] device bridge_slave_0 left promiscuous mode [ 188.517921][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.526130][ T7] device bridge_slave_1 left promiscuous mode [ 188.532216][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.540247][ T7] device bridge_slave_0 left promiscuous mode [ 188.546299][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.554913][ T7] device veth0_vlan left promiscuous mode [ 188.560996][ T7] device veth1_macvtap left promiscuous mode [ 188.982135][T12941] device pim6reg1 entered promiscuous mode [ 189.033155][T12952] device pim6reg1 entered promiscuous mode [ 189.510397][T13008] device syzkaller0 entered promiscuous mode [ 189.516890][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.525263][T13004] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.532928][T13004] device bridge_slave_0 entered promiscuous mode [ 189.540038][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.546947][T13004] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.554546][T13004] device bridge_slave_1 entered promiscuous mode [ 189.914540][T13004] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.921415][T13004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.928500][T13004] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.935309][T13004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.947282][ T914] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.954917][ T914] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.998249][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.016790][ T1880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 190.202592][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.215241][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.224039][ T422] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.230912][ T422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.239835][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.250732][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.258787][ T422] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.265663][ T422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.272872][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.280942][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.288642][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.296521][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.811316][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.854580][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.184151][T13004] device veth0_vlan entered promiscuous mode [ 191.190496][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.198483][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.206375][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.213787][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.345781][T13004] device veth1_macvtap entered promiscuous mode [ 191.363606][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.372066][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.380071][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.454035][ T914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 191.462535][ T914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 191.470777][ T914] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 191.478936][ T914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.038060][T13128] device syzkaller0 entered promiscuous mode [ 192.443303][T13138] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.469322][T13138] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.479932][T13138] device bridge_slave_0 entered promiscuous mode [ 192.504977][T13138] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.532168][T13138] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.559268][T13138] device bridge_slave_1 entered promiscuous mode [ 192.700921][ T7] device gretap0 left promiscuous mode [ 192.706250][ T7] bridge0: port 4(gretap0) entered disabled state [ 192.975188][T13138] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.982102][T13138] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.989148][T13138] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.996065][T13138] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.055912][T13138] device veth0_vlan entered promiscuous mode [ 193.067770][T13138] device veth1_macvtap entered promiscuous mode [ 193.095173][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.103867][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.113355][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.126248][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.135273][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.143862][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.152568][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.160814][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.168160][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.175968][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.192140][ T7] device veth0_to_batadv left promiscuous mode [ 193.198273][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 193.205774][ T7] device bridge_slave_1 left promiscuous mode [ 193.211913][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.219338][ T7] device bridge_slave_0 left promiscuous mode [ 193.225472][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.493187][T13203] device syzkaller0 entered promiscuous mode [ 193.502750][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.511582][ T422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.906632][T13281] tap0: tun_chr_ioctl cmd 1074025677 [ 193.922038][T13281] tap0: linktype set to 776 [ 193.930364][T13287] geneve1: tun_chr_ioctl cmd 19271 [ 194.009407][T13297] geneve1: tun_chr_ioctl cmd 35111 [ 194.042953][T13297] device syzkaller0 entered promiscuous mode [ 195.041381][T13381] €Â: renamed from veth0_vlan [ 195.761815][T13479] ref_ctr_offset mismatch. inode: 0xa9 offset: 0x0 ref_ctr_offset(old): 0x7602 ref_ctr_offset(new): 0x7604 [ 196.151234][T13497] device pim6reg1 entered promiscuous mode [ 196.484117][T13532] device pim6reg1 entered promiscuous mode [ 197.210986][T13574] device pim6reg1 entered promiscuous mode [ 197.741402][T13651] device sit0 left promiscuous mode [ 197.912144][T13667] device sit0 entered promiscuous mode [ 198.092117][T13669] device syzkaller0 entered promiscuous mode [ 198.338612][T13693] syz.1.3795[13693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.338667][T13693] syz.1.3795[13693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.606040][T13703] device sit0 entered promiscuous mode [ 200.212285][T13776] device pim6reg1 entered promiscuous mode [ 200.401476][T13781] device sit0 entered promiscuous mode [ 201.693442][T13831] syz.2.3836[13831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.693497][T13831] syz.2.3836[13831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.705912][T13831] syz.2.3836[13831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.717593][T13831] syz.2.3836[13831] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.866090][T13855] device sit0 entered promiscuous mode [ 202.658793][T13896] device syzkaller0 entered promiscuous mode [ 202.712118][T13909] syz.4.3855[13909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.712174][T13909] syz.4.3855[13909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.988772][T13939] syz.3.3865[13939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.064811][T13939] syz.3.3865[13939] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.160130][T13953] cgroup: fork rejected by pids controller in /syz4 [ 203.648915][T14091] device sit0 left promiscuous mode [ 203.693436][T14091] device sit0 entered promiscuous mode [ 203.943102][T14098] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.949975][T14098] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.957184][T14098] device bridge_slave_0 entered promiscuous mode [ 203.963998][T14098] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.970939][T14098] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.978154][T14098] device bridge_slave_1 entered promiscuous mode [ 203.990773][T14115] syz.0.3887[14115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.990826][T14115] syz.0.3887[14115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.033949][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.053639][ T1874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.076653][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.085024][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.093312][ T6888] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.100190][ T6888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.107786][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.115943][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.124244][ T6888] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.131100][ T6888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.149492][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.156976][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.164934][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.185746][ T914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.203587][T14098] device veth0_vlan entered promiscuous mode [ 204.212240][ T894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.221718][ T894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.230950][ T894] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.276625][T14147] device pim6reg1 entered promiscuous mode [ 204.292448][T14098] device veth1_macvtap entered promiscuous mode [ 204.306244][ T900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.320963][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 204.342035][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.625626][T14203] device syzkaller0 entered promiscuous mode [ 204.688100][T14223] device pim6reg1 entered promiscuous mode [ 204.792774][T14245] device pim6reg1 entered promiscuous mode [ 205.145454][T14276] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.152586][T14276] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.225290][T14285] device bridge_slave_1 left promiscuous mode [ 205.300904][T14285] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.358833][T14285] device bridge_slave_0 left promiscuous mode [ 205.369384][T14285] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.410696][ T334] device bridge_slave_1 left promiscuous mode [ 205.426310][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.435752][T14311] syz.2.3943[14311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.435805][T14311] syz.2.3943[14311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.447449][ T334] device bridge_slave_0 left promiscuous mode [ 205.468750][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 205.477653][ T334] device veth1_macvtap left promiscuous mode [ 205.675338][T14332] device syzkaller0 entered promiscuous mode [ 205.682688][T14333] device syzkaller0 entered promiscuous mode [ 206.217234][T14423] device sit0 left promiscuous mode [ 207.244775][T14560] syz.4.4008[14560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.564150][T14616] device veth0_vlan left promiscuous mode [ 207.596654][T14616] device veth0_vlan entered promiscuous mode [ 207.605922][ T2143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.615362][ T2143] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 207.623521][ T2143] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.641677][T14619] device syzkaller0 entered promiscuous mode [ 207.750052][T14637] device sit0 entered promiscuous mode [ 207.783434][T14639] device pim6reg1 entered promiscuous mode [ 207.959490][T14656] device veth0_to_team entered promiscuous mode [ 208.234478][T14695] device wg2 entered promiscuous mode [ 208.258498][T14695] tap0: tun_chr_ioctl cmd 1074025677 [ 208.269269][T14695] tap0: linktype set to 704 [ 208.589974][T14740] device veth0_vlan left promiscuous mode [ 208.685562][T14740] device veth0_vlan entered promiscuous mode [ 208.849384][T14751] device pim6reg1 entered promiscuous mode [ 209.158595][T14825] syz.1.4085[14825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.158652][T14825] syz.1.4085[14825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.227185][T14825] syz.1.4085[14825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.280472][T14825] syz.1.4085[14825] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.372996][T14842] device syzkaller0 entered promiscuous mode [ 209.558931][T14879] device veth1_macvtap left promiscuous mode [ 209.676250][ T24] audit: type=1400 audit(1720279631.819:176): avc: denied { create } for pid=14877 comm="syz.2.4100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 209.704234][T14885] device veth1_macvtap entered promiscuous mode [ 209.717798][T14885] device macsec0 entered promiscuous mode [ 209.794159][T14898] syz.1.4106[14898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.794204][T14898] syz.1.4106[14898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.806540][T14898] syz.1.4106[14898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.831802][T14898] syz.1.4106[14898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.010422][T14901] device syzkaller0 entered promiscuous mode [ 210.528989][T14944] device syzkaller0 entered promiscuous mode [ 211.011874][T14967] device pim6reg1 entered promiscuous mode [ 211.472904][T15000] syz.0.4136[15000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.472954][T15000] syz.0.4136[15000] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.675675][T15034] device syzkaller0 entered promiscuous mode [ 212.826282][T15136] geneve1: tun_chr_ioctl cmd 1074025672 [ 212.832707][T15136] geneve1: ignored: set checksum enabled [ 213.535759][T15199] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.665584][T15199] O3ãc¤±: renamed from bridge_slave_0 [ 214.242682][T15215] device pim6reg1 entered promiscuous mode [ 214.374325][T15248] bpf_get_probe_write_proto: 2 callbacks suppressed [ 214.374335][T15248] syz.4.4204[15248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.394429][T15248] syz.4.4204[15248] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.605560][T15272] device pim6reg1 entered promiscuous mode [ 215.187934][T15324] device syzkaller0 entered promiscuous mode [ 216.354186][T15418] syz.0.4252[15418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.354239][T15418] syz.0.4252[15418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.410987][T15429] device syzkaller0 entered promiscuous mode [ 218.488978][T15559] device syzkaller0 entered promiscuous mode [ 218.499988][T15561] ªªªªªª: renamed from vlan0 [ 218.551413][T15526] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.558435][T15526] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.566019][T15526] device bridge_slave_0 entered promiscuous mode [ 218.575110][T15526] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.582345][T15526] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.589855][T15526] device bridge_slave_1 entered promiscuous mode [ 218.682261][T15577] syz.0.4298[15577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.682300][T15577] syz.0.4298[15577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.693889][T15579] syz.0.4298[15579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.705224][T15579] syz.0.4298[15579] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.893694][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.915042][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.935465][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.944050][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.953308][ T919] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.960191][ T919] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.968500][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.976894][ T919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.984945][ T919] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.991829][ T919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.017963][T15595] device syzkaller0 entered promiscuous mode [ 219.032252][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.041772][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.050423][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.061353][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.069705][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.106992][T15526] device veth0_vlan entered promiscuous mode [ 219.117246][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.126350][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.135147][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.143124][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.156846][T15526] device veth1_macvtap entered promiscuous mode [ 219.172209][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.180436][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.187743][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.195813][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.204082][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 219.218316][T15612] device pim6reg1 entered promiscuous mode [ 219.227453][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.235995][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 219.286182][ T334] device bridge_slave_1 left promiscuous mode [ 219.295478][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.325191][ T334] device bridge_slave_0 left promiscuous mode [ 219.351730][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.360254][ T334] device veth1_macvtap left promiscuous mode [ 219.366086][ T334] device veth0_vlan left promiscuous mode [ 219.462477][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.475221][ T327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 220.105632][T15664] syz.1.4323[15664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.105686][T15664] syz.1.4323[15664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.578897][T15727] syz.2.4337[15727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.597214][T15727] syz.2.4337[15727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.712994][T15727] device pim6reg1 entered promiscuous mode [ 223.763007][T15971] device syzkaller0 entered promiscuous mode [ 225.082880][T16037] device vxcan1 entered promiscuous mode [ 225.140150][T16043] device pim6reg1 entered promiscuous mode [ 226.707236][T16147] device syzkaller0 entered promiscuous mode [ 227.690843][T16226] device syzkaller0 entered promiscuous mode [ 228.207531][T16258] device syzkaller0 entered promiscuous mode [ 228.221022][T16243] syz.3.4473[16243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.221084][T16243] syz.3.4473[16243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.246523][T16259] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 228.268437][T16259] device syzkaller0 entered promiscuous mode [ 228.333931][T16278] device pim6reg1 entered promiscuous mode [ 228.832855][T16322] device syzkaller0 entered promiscuous mode [ 229.552191][T16367] device pim6reg1 entered promiscuous mode [ 229.964119][T16394] device pim6reg1 entered promiscuous mode [ 230.170021][T16424] device sit0 entered promiscuous mode [ 230.494723][T16462] device syzkaller0 entered promiscuous mode [ 230.579958][T16470] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.899594][T16522] syz.2.4551[16522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.899649][T16522] syz.2.4551[16522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.935069][T16522] device pim6reg1 entered promiscuous mode [ 231.034971][T16555] syz.2.4551[16555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.035028][T16555] syz.2.4551[16555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.224761][T16603] device macsec0 left promiscuous mode [ 232.718494][T16630] device syzkaller0 entered promiscuous mode [ 233.246425][T16685] syz.0.4598[16685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.246479][T16685] syz.0.4598[16685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.367915][T16696] syz.4.4602[16696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.426283][T16683] device pim6reg1 entered promiscuous mode [ 233.430499][T16696] syz.4.4602[16696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.565983][T16706] ªªªªªª: renamed from vlan0 [ 233.667651][T16724] syz.4.4610[16724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.667923][T16724] syz.4.4610[16724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.711744][T16734] device pim6reg1 entered promiscuous mode [ 233.879833][T16777] device pim6reg1 entered promiscuous mode [ 234.143277][T16803] device syzkaller0 entered promiscuous mode [ 234.367358][T16841] device syzkaller0 entered promiscuous mode [ 234.626654][T16897] device syzkaller0 entered promiscuous mode [ 234.764014][T16928] syz.0.4665[16928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.764058][T16928] syz.0.4665[16928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.875270][T16936] syz.1.4667[16936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.887143][T16936] syz.1.4667[16936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.164463][T16933] device syzkaller0 entered promiscuous mode [ 235.484029][T17030] device syzkaller0 entered promiscuous mode [ 235.538384][T17025] device syzkaller0 entered promiscuous mode [ 235.800620][T17042] device syzkaller0 entered promiscuous mode [ 236.912673][T17079] device sit0 entered promiscuous mode [ 238.844620][T17231] device pim6reg1 entered promiscuous mode [ 238.882039][T17236] bpf_get_probe_write_proto: 4 callbacks suppressed [ 238.882047][T17236] syz.4.4746[17236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.888647][T17236] syz.4.4746[17236] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.953137][T17243] device pim6reg1 entered promiscuous mode [ 239.389182][T17312] device macsec0 left promiscuous mode [ 239.793169][T17350] device syzkaller0 entered promiscuous mode [ 239.831173][T17356] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.846374][T17354] device veth0_vlan left promiscuous mode [ 239.964039][T17354] device veth0_vlan entered promiscuous mode [ 240.070608][T17356] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.077472][T17356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.085203][T17356] device bridge0 entered promiscuous mode [ 241.104383][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.141638][T17519] device vxcan1 entered promiscuous mode [ 243.413340][T17535] device pim6reg1 entered promiscuous mode [ 244.996618][T17612] device pim6reg1 entered promiscuous mode [ 245.084290][T17620] device syzkaller0 entered promiscuous mode [ 245.541150][T17646] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.548019][T17646] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.555489][T17646] device bridge_slave_0 entered promiscuous mode [ 245.562611][T17646] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.569690][T17646] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.576844][T17646] device bridge_slave_1 entered promiscuous mode [ 245.716683][T17646] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.723584][T17646] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.730669][T17646] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.737443][T17646] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.766897][ T801] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 245.775309][ T801] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.849391][ T801] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.906227][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 245.924229][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.931212][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.968524][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 245.991636][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.998536][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.040201][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 246.051886][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.068519][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.116297][T17646] device veth0_vlan entered promiscuous mode [ 246.126885][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 246.140646][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 246.148097][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 246.168397][T17646] device veth1_macvtap entered promiscuous mode [ 246.175494][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 246.192431][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 246.206407][ T1841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 246.255928][T17688] device pim6reg1 entered promiscuous mode [ 246.344780][T17711] device syzkaller0 entered promiscuous mode [ 246.571410][T17729] geneve1: tun_chr_ioctl cmd 19271 [ 246.660551][T17749] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.667573][T17749] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.001181][T17780] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.008022][T17780] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.015355][T17780] device bridge_slave_0 entered promiscuous mode [ 247.023607][T17780] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.030670][T17780] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.038067][T17780] device bridge_slave_1 entered promiscuous mode [ 247.092819][T17780] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.099714][T17780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.106764][T17780] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.113589][T17780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.123411][ T9] device bridge_slave_1 left promiscuous mode [ 247.129488][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.136594][ T9] device O3ãc¤± left promiscuous mode [ 247.142234][ T9] bridge0: port 1(O3ãc¤±) entered disabled state [ 247.313576][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.322633][ T301] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.330051][ T301] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.345368][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.353747][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.361971][ T1838] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.368838][ T1838] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.376163][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.384281][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.392334][ T1838] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.399170][ T1838] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.409657][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 247.417802][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.425881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 247.433915][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.451229][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 247.459560][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.468758][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 247.476795][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.485680][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.492998][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.502931][T17780] device veth0_vlan entered promiscuous mode [ 247.523294][ T285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 247.531426][ T285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.542882][T17780] device veth1_macvtap entered promiscuous mode [ 247.570579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 247.580200][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 247.588403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.625521][ T285] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 247.638167][ T285] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.177986][T17885] device pim6reg1 entered promiscuous mode [ 248.549700][T17926] device syzkaller0 entered promiscuous mode [ 248.733873][ T9] device bridge_slave_1 left promiscuous mode [ 248.744234][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.759192][ T9] device O3ãc¤± left promiscuous mode [ 248.784836][ T9] bridge0: port 1(O3ãc¤±) entered disabled state [ 248.795369][ T9] device veth0_vlan left promiscuous mode [ 248.893699][T17957] device pim6reg1 entered promiscuous mode [ 248.988650][T17968] device syzkaller0 entered promiscuous mode [ 249.947731][T18023] ¯Ê®¸}p: renamed from pim6reg1 [ 250.121909][T18053] device syzkaller0 entered promiscuous mode [ 251.234165][T18127] device syzkaller0 entered promiscuous mode [ 251.473245][T18157] device veth0_vlan left promiscuous mode [ 251.485310][T18157] device veth0_vlan entered promiscuous mode [ 251.687138][T18179] device syzkaller0 entered promiscuous mode [ 251.744006][T18177] device pim6reg1 entered promiscuous mode [ 252.108664][T18222] syz.0.5038[18222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.109045][T18222] syz.0.5038[18222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.578217][T18270] device syzkaller0 entered promiscuous mode [ 252.622881][T18273] device syzkaller0 entered promiscuous mode [ 252.717763][T18274] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.725052][T18274] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.732616][T18274] device bridge_slave_0 entered promiscuous mode [ 252.739885][T18274] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.746736][T18274] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.754193][T18274] device bridge_slave_1 entered promiscuous mode [ 252.804161][T18289] device syzkaller0 entered promiscuous mode [ 252.869553][T18291] device syzkaller0 entered promiscuous mode [ 252.903243][T18296] syz.4.5064[18296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.903294][T18296] syz.4.5064[18296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.903399][T18297] syz.4.5064[18297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.929043][T18274] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.929392][T18297] syz.4.5064[18297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.940259][T18274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.940337][T18274] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.940345][T18274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.004272][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.012806][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.021333][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.056726][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.065157][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.086017][T18274] device veth0_vlan entered promiscuous mode [ 253.098694][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.109613][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.117930][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.126622][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.136976][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.187959][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.267798][T18274] device veth1_macvtap entered promiscuous mode [ 253.308811][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.326368][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.398826][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.516539][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.548599][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.613482][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.621779][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.748869][T18351] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.256129][T18435] device syzkaller0 entered promiscuous mode [ 254.466585][ T9] device veth1_macvtap left promiscuous mode [ 254.503186][T18475] device lo entered promiscuous mode [ 254.606184][T18492] syz.2.5123[18492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.606241][T18492] syz.2.5123[18492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.021289][T18518] device syzkaller0 entered promiscuous mode [ 255.045586][ T24] audit: type=1400 audit(1720279677.189:177): avc: denied { create } for pid=18529 comm="syz.0.5133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 255.895478][T18593] syz.3.5149[18593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.895530][T18593] syz.3.5149[18593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.078727][ T24] audit: type=1400 audit(1720279678.219:178): avc: denied { create } for pid=18600 comm="syz.2.5151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 256.374385][T18608] device veth0_vlan left promiscuous mode [ 256.380734][T18608] device veth0_vlan entered promiscuous mode [ 256.496247][T18620] device syzkaller0 entered promiscuous mode [ 256.656494][T18652] device veth0_vlan left promiscuous mode [ 256.773928][T18652] device veth0_vlan entered promiscuous mode [ 256.793981][T18671] device syzkaller0 entered promiscuous mode [ 256.831911][T18678] device pim6reg1 entered promiscuous mode [ 257.072148][T18761] device pim6reg1 entered promiscuous mode [ 257.247654][T18798] device syzkaller0 entered promiscuous mode [ 257.676010][T18863] device syzkaller0 entered promiscuous mode [ 257.701548][T18860] tun0: tun_chr_ioctl cmd 2147767517 [ 257.829499][T18867] device sit0 left promiscuous mode [ 258.966302][T18941] device syzkaller0 entered promiscuous mode [ 260.088042][T19064] device syzkaller0 entered promiscuous mode [ 260.447657][T19117] device pim6reg1 entered promiscuous mode [ 260.474837][T19134] device pim6reg1 entered promiscuous mode [ 260.491104][T19136] device veth0_vlan left promiscuous mode [ 260.498865][T19136] device veth0_vlan entered promiscuous mode [ 260.529448][T19138] device syzkaller0 entered promiscuous mode [ 260.834156][T19159] device syzkaller0 entered promiscuous mode [ 261.269904][T19233] device veth0_vlan left promiscuous mode [ 261.360267][T19233] device veth0_vlan entered promiscuous mode [ 261.535559][T19241] device veth1_macvtap left promiscuous mode [ 261.573191][T19243] device syzkaller0 entered promiscuous mode [ 261.791808][T19289] device pim6reg1 entered promiscuous mode [ 262.516263][T19315] device veth1_macvtap left promiscuous mode [ 262.910535][T19372] device lo entered promiscuous mode [ 263.288500][T19397] syz.0.5369[19397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.288557][T19397] syz.0.5369[19397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.436910][T19397] syz.0.5369[19397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.481360][T19392] device syzkaller0 entered promiscuous mode [ 263.512387][T19402] syz.0.5369[19402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.512444][T19402] syz.0.5369[19402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.523075][T19397] syz.0.5369[19397] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.958321][T19433] device pim6reg1 entered promiscuous mode [ 264.175304][T19443] device syzkaller0 entered promiscuous mode [ 264.491472][T19465] syz.0.5389[19465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.491524][T19465] syz.0.5389[19465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.655022][T19476] syz.0.5389[19476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.789339][T19476] syz.0.5389[19476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.050023][T19496] device dummy0 entered promiscuous mode [ 266.165891][T19538] ªªªªªª: renamed from vlan0 [ 266.423998][T19543] device sit0 entered promiscuous mode [ 266.546315][T19557] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.553321][T19557] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.586038][T19557] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.592949][T19557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.600034][T19557] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.606782][T19557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.617666][T19557] device bridge0 entered promiscuous mode [ 268.507819][T19659] device wg2 left promiscuous mode [ 268.697169][T19691] device syzkaller0 entered promiscuous mode [ 268.976811][T19705] device veth0_to_team entered promiscuous mode [ 269.821488][T19772] device pim6reg1 entered promiscuous mode [ 269.908640][T19779] device pim6reg1 entered promiscuous mode [ 270.671169][T19831] device veth1_macvtap left promiscuous mode [ 271.652310][T19914] bridge_slave_0: mtu greater than device maximum [ 272.954408][T20017] device syzkaller0 entered promiscuous mode [ 273.040691][T20042] bpf_get_probe_write_proto: 8 callbacks suppressed [ 273.040702][T20042] syz.1.5548[20042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.048186][T20042] syz.1.5548[20042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.182284][T20061] device pim6reg1 entered promiscuous mode [ 273.210966][T20061] device wg2 entered promiscuous mode [ 273.834518][T20107] device wg2 entered promiscuous mode [ 274.129124][T20122] device pim6reg1 entered promiscuous mode [ 275.674500][T20180] device macsec0 entered promiscuous mode [ 275.688604][T20161] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 275.699942][T20180] device veth1_macvtap entered promiscuous mode [ 275.706941][ T1869] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 275.840471][T20207] device wg2 left promiscuous mode [ 275.851016][T20207] device wg2 entered promiscuous mode [ 275.973878][T20225] bridge_slave_0: mtu greater than device maximum [ 276.080333][T20246] device sit0 entered promiscuous mode [ 277.135499][T20263] device syzkaller0 entered promiscuous mode [ 277.447889][T20310] device syzkaller0 entered promiscuous mode [ 277.628564][ T24] audit: type=1400 audit(1720279699.769:179): avc: denied { create } for pid=20331 comm="syz.2.5635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 277.805860][T20362] device syzkaller0 entered promiscuous mode [ 278.114833][T20420] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 278.122775][T20420] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 278.697243][T20495] device pim6reg1 entered promiscuous mode [ 278.984441][T20511] syzkaller0: refused to change device tx_queue_len [ 280.044559][T20573] device syzkaller0 entered promiscuous mode [ 280.078661][T20581] device wg2 left promiscuous mode [ 280.143258][T20584] syz.4.5709[20584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.143642][T20584] syz.4.5709[20584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.466403][T20635] syz.2.5719[20635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.478885][T20635] syz.2.5719[20635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.758772][T20645] device syzkaller0 entered promiscuous mode [ 281.163111][T20713] device pim6reg1 entered promiscuous mode [ 281.213197][T20717] device syzkaller0 entered promiscuous mode [ 281.268735][T20730] device wg2 entered promiscuous mode [ 281.453698][T20764] device veth1_macvtap left promiscuous mode [ 282.167538][T20830] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.177729][T20830] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.185594][T20830] device bridge_slave_0 entered promiscuous mode [ 282.195902][T20837] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 282.209066][T20837] device syzkaller0 entered promiscuous mode [ 282.216461][T20830] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.224150][T20830] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.232612][T20830] device bridge_slave_1 entered promiscuous mode [ 282.344455][T20849] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.351843][T20849] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.360185][T20849] device bridge_slave_0 entered promiscuous mode [ 282.367050][T20830] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.374011][T20830] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.381148][T20830] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.387996][T20830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.399485][T20849] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.406349][T20849] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.424574][T20849] device bridge_slave_1 entered promiscuous mode [ 282.435623][ T1541] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.448141][ T1541] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.550448][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 282.568418][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 282.629056][T20885] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 282.689297][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 282.697531][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 282.764570][ T1541] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.771725][ T1541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 282.805857][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 282.841418][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.855346][ T1541] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.862272][ T1541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.869660][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 282.877529][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.885475][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 282.893466][ T1541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.938420][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 282.952369][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 282.995702][T20830] device veth0_vlan entered promiscuous mode [ 283.011573][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 283.029962][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.038173][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.059945][ T865] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.413958][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.421240][ T340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.446914][T20830] device veth1_macvtap entered promiscuous mode [ 283.459029][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.474033][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.482829][ T420] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.489692][ T420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.497281][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.506288][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.514770][ T420] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.521651][ T420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.532116][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.549618][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 283.557703][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 283.565835][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 283.573514][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.581590][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 283.589831][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 283.598267][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.681509][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 283.723444][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 283.753336][ T9] device bridge_slave_1 left promiscuous mode [ 283.764760][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.779698][ T9] device bridge_slave_0 left promiscuous mode [ 283.817359][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.019551][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 284.030504][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 284.043373][T20849] device veth0_vlan entered promiscuous mode [ 284.056950][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 284.067185][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.086467][T20849] device veth1_macvtap entered promiscuous mode [ 284.104669][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.112745][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.120414][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.128505][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.137318][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.180381][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 284.191944][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 284.205455][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 284.215173][ T1554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 284.586243][T21023] device veth1_macvtap left promiscuous mode [ 284.609308][T21023] device macsec0 entered promiscuous mode [ 284.666512][T21023] device syzkaller0 entered promiscuous mode [ 284.703878][T21033] device veth0_vlan left promiscuous mode [ 284.709957][T21033] device veth0_vlan entered promiscuous mode [ 284.728596][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 284.741418][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.752646][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.323522][ T9] device bridge_slave_1 left promiscuous mode [ 285.331045][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.361406][ T9] device bridge_slave_0 left promiscuous mode [ 285.375211][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.663698][T21097] device syzkaller0 entered promiscuous mode [ 285.873897][T21128] syz.2.5863[21128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.873955][T21128] syz.2.5863[21128] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.916492][T21126] device wg2 entered promiscuous mode [ 285.958835][T21128] €Â: renamed from pim6reg1 [ 286.025773][T21137] syz.1.5865[21137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.025827][T21137] syz.1.5865[21137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.264637][T21207] device pim6reg1 entered promiscuous mode [ 287.484231][T21248] device pim6reg1 entered promiscuous mode [ 288.448987][T21293] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.456023][T21293] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.921224][T21341] device veth0_vlan left promiscuous mode [ 291.018497][T21341] device veth0_vlan entered promiscuous mode [ 291.483971][T21396] device veth0_vlan left promiscuous mode [ 291.490662][T21396] device veth0_vlan entered promiscuous mode [ 291.670076][T21400] device syzkaller0 entered promiscuous mode [ 291.725880][T21410] device pim6reg1 entered promiscuous mode [ 292.539805][T21444] device syzkaller0 entered promiscuous mode [ 292.567706][T21449] bridge0: port 3(veth0_to_batadv) entered blocking state [ 292.575019][T21449] bridge0: port 3(veth0_to_batadv) entered disabled state [ 292.582606][T21449] device veth0_to_batadv entered promiscuous mode [ 292.681656][T21473] device pim6reg1 entered promiscuous mode [ 292.894820][T21501] device pim6reg1 entered promiscuous mode [ 293.025170][ T24] audit: type=1400 audit(1720279715.169:180): avc: denied { create } for pid=21536 comm="syz.4.5976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 293.047679][T21539] syz.2.5977[21539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.047731][T21539] syz.2.5977[21539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.060236][T21540] syz.2.5977[21540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.072038][T21540] syz.2.5977[21540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.088057][T21539] device pim6reg1 entered promiscuous mode [ 293.117852][T21553] ¯Ê®¸}p: renamed from pim6reg1 [ 293.166508][T21557] device syzkaller0 entered promiscuous mode [ 294.041048][T21633] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 294.065822][ T1061] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.226284][T21660] syz.4.6012[21660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.226345][T21660] syz.4.6012[21660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.307087][T21663] device syzkaller0 entered promiscuous mode [ 294.325456][T21660] syz.4.6012[21660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.325513][T21660] syz.4.6012[21660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.357019][T21660] syz.4.6012[21660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.368996][T21660] syz.4.6012[21660] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.383973][T21660] device pim6reg1 entered promiscuous mode [ 294.476033][T21702] device syzkaller0 entered promiscuous mode [ 295.230404][T21764] device pim6reg1 entered promiscuous mode [ 295.660289][T21808] device syzkaller0 entered promiscuous mode [ 295.963515][T21828] device veth0_vlan left promiscuous mode [ 295.969796][T21828] device veth0_vlan entered promiscuous mode [ 296.035068][T21847] device wg2 entered promiscuous mode [ 296.474176][T21927] device veth1_macvtap left promiscuous mode [ 296.592466][T21949] device pim6reg1 entered promiscuous mode [ 298.177050][T22056] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.184052][T22056] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.191399][T22056] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.198159][T22056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.206294][T22056] device bridge0 entered promiscuous mode [ 298.429350][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.460408][T22064] device veth1_macvtap entered promiscuous mode [ 298.533337][T22064] device macsec0 entered promiscuous mode [ 298.555201][ T420] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.861885][T22091] device syzkaller0 entered promiscuous mode [ 300.978341][T22204] bridge0: port 3(vlan1) entered blocking state [ 300.984565][T22204] bridge0: port 3(vlan1) entered disabled state [ 300.991358][T22204] device vlan1 entered promiscuous mode [ 301.069314][T22232] device ip_vti0 entered promiscuous mode [ 301.081870][T22231] device bridge0 entered promiscuous mode [ 301.438547][T22255] device syzkaller0 entered promiscuous mode [ 302.494914][T22306] device pim6reg1 entered promiscuous mode [ 303.093952][T22371] device syzkaller0 entered promiscuous mode [ 303.124357][T22374] bpf_get_probe_write_proto: 2 callbacks suppressed [ 303.124367][T22374] syz.3.6218[22374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.136025][T22374] syz.3.6218[22374] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.488801][T22408] device pim6reg1 entered promiscuous mode [ 306.845109][T22494] device syzkaller0 entered promiscuous mode [ 308.517086][T22558] device syzkaller0 entered promiscuous mode [ 308.740847][T22592] device sit0 entered promiscuous mode [ 309.087921][T22604] device syzkaller0 entered promiscuous mode [ 309.393204][T22614] device pim6reg1 entered promiscuous mode [ 309.968604][T22644] device pim6reg1 entered promiscuous mode [ 310.451185][T22684] device syzkaller0 entered promiscuous mode [ 310.598514][T22701] device syzkaller0 entered promiscuous mode [ 311.423721][T22774] device veth0_vlan left promiscuous mode [ 311.438231][T22774] device veth0_vlan entered promiscuous mode [ 311.446013][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.456829][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.464999][ T893] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.472539][ T893] bridge0: port 3(vlan1) entered blocking state [ 311.478643][ T893] bridge0: port 3(vlan1) entered forwarding state [ 311.494743][ T914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.551072][T22793] device macsec0 left promiscuous mode [ 311.646055][T22817] syz.0.6335[22817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.646132][T22817] syz.0.6335[22817] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.169669][T22907] device syzkaller0 entered promiscuous mode [ 312.630237][T22951] device wg2 left promiscuous mode [ 313.026868][T22997] device syzkaller0 entered promiscuous mode [ 313.851563][T23069] device veth0_vlan left promiscuous mode [ 313.863685][T23069] device veth0_vlan entered promiscuous mode [ 313.884608][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.893525][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.901914][ T1839] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.107856][T23129] device syzkaller0 entered promiscuous mode [ 314.187435][T23137] device vxcan1 entered promiscuous mode [ 314.635882][T23211] tun0: tun_chr_ioctl cmd 1074025692 [ 314.715645][T23217] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.724933][T23217] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.731836][T23217] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.062417][T23233] bridge0: port 3(vlan1) entered disabled state [ 315.169145][T23239] device veth0_vlan left promiscuous mode [ 315.211240][T23239] device veth0_vlan entered promiscuous mode [ 315.293045][T23239] bridge0: port 3(vlan1) entered blocking state [ 315.300302][T23239] bridge0: port 3(vlan1) entered forwarding state [ 315.329128][T23239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.365915][ T888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 315.373978][ T888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 315.381371][ T888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 315.470313][T23264] device sit0 left promiscuous mode [ 315.623720][T23279] syz.2.6478[23279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.623776][T23279] syz.2.6478[23279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.648220][T23287] device syzkaller0 entered promiscuous mode [ 315.679794][ T899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.737813][T23300] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 315.773063][T23300] device syzkaller0 entered promiscuous mode [ 316.061146][T23340] bridge0: port 3(veth0_vlan) entered blocking state [ 316.067962][T23340] bridge0: port 3(veth0_vlan) entered disabled state [ 316.075145][T23340] bridge0: port 3(veth0_vlan) entered blocking state [ 316.081704][T23340] bridge0: port 3(veth0_vlan) entered forwarding state [ 316.601642][T23382] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 317.735488][T23493] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.482131][T23513] device pim6reg1 entered promiscuous mode [ 319.513017][T23572] device syzkaller0 entered promiscuous mode [ 319.562978][T23580] device sit0 left promiscuous mode [ 319.924618][T23637] device syzkaller0 entered promiscuous mode [ 321.566068][T23761] device syzkaller0 entered promiscuous mode [ 321.851734][T23820] device veth0_vlan left promiscuous mode [ 321.863936][T23820] device veth0_vlan entered promiscuous mode [ 322.045440][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.053927][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.063956][ T800] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 325.710411][T23932] device wg2 left promiscuous mode [ 325.717641][T23932] device wg2 entered promiscuous mode [ 326.406977][T24012] device syzkaller0 entered promiscuous mode [ 326.776312][ T24] audit: type=1400 audit(1720279748.919:181): avc: denied { create } for pid=24038 comm="syz.3.6691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 326.947293][T24050] device syzkaller0 entered promiscuous mode [ 327.036032][T24046] device pim6reg1 entered promiscuous mode [ 327.575650][T24091] syz.3.6705[24091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.575716][T24091] syz.3.6705[24091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.751106][T24100] device syzkaller0 entered promiscuous mode [ 328.549851][T24121] device syzkaller0 entered promiscuous mode [ 329.004781][T24146] device pim6reg1 entered promiscuous mode [ 330.671729][T24218] syz.2.6742[24218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.672576][T24218] syz.2.6742[24218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.252111][T24301] syz.1.6766[24301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.263965][T24301] syz.1.6766[24301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.571951][T24325] tap0: tun_chr_ioctl cmd 1074025678 [ 332.620909][T24325] tap0: group set to 0 [ 332.663362][T24335] device syzkaller0 entered promiscuous mode [ 332.731608][T24335] syz.0.6777[24335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.731663][T24335] syz.0.6777[24335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.744200][T24338] device sit0 entered promiscuous mode [ 332.770227][ T24] audit: type=1400 audit(1720279754.919:182): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 332.873700][T24344] syz.2.6780[24344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.873744][T24344] syz.2.6780[24344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.047750][T24344] syz.2.6780[24344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.059201][T24344] syz.2.6780[24344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.668881][T24403] device syzkaller0 entered promiscuous mode [ 333.747661][T24421] syz.3.6803[24421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.747725][T24421] syz.3.6803[24421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.283988][T24432] device lo entered promiscuous mode [ 334.586477][T24438] device syzkaller0 entered promiscuous mode [ 334.860708][T24471] device sit0 left promiscuous mode [ 334.964444][T24471] device sit0 entered promiscuous mode [ 335.561584][T24498] device pim6reg1 entered promiscuous mode [ 336.044382][T24524] syz.0.6833[24524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.044436][T24524] syz.0.6833[24524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.100372][T24527] device syzkaller0 entered promiscuous mode [ 336.166007][T24508] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.173191][T24508] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.180955][T24508] device bridge_slave_0 entered promiscuous mode [ 336.187888][T24508] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.195071][T24508] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.202780][T24508] device bridge_slave_1 entered promiscuous mode [ 336.247614][T24535] Â: renamed from pim6reg1 [ 336.258831][T24508] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.265696][T24508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.272801][T24508] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.279590][T24508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.395020][ T1877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.405874][ T1877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.415325][ T1877] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.551306][T24552] device pim6reg1 entered promiscuous mode [ 336.566440][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.575642][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.593162][T24508] device veth0_vlan entered promiscuous mode [ 336.605667][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.614289][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.622138][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.629895][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.816283][T24508] device veth1_macvtap entered promiscuous mode [ 336.850892][ T1876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 336.922098][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 336.976966][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.985311][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 336.993418][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 338.049059][T24656] device veth0_to_team entered promiscuous mode [ 338.643494][ T110] device vlan1 left promiscuous mode [ 338.648839][ T110] bridge0: port 3(vlan1) entered disabled state [ 338.714911][ T110] device bridge_slave_1 left promiscuous mode [ 338.766266][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.774034][ T110] device bridge_slave_0 left promiscuous mode [ 338.780482][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.788421][ T110] device veth1_macvtap left promiscuous mode [ 338.795039][ T110] device veth0_vlan left promiscuous mode [ 338.991322][T24713] device pim6reg1 entered promiscuous mode [ 339.518876][T24790] device syzkaller0 entered promiscuous mode [ 339.678422][T24816] device pim6reg1 entered promiscuous mode [ 340.422224][T24860] device sit0 entered promiscuous mode [ 342.016133][T24964] device pim6reg1 entered promiscuous mode [ 342.036772][T24968] syz.2.6951[24968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.036830][T24968] syz.2.6951[24968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.404652][T24994] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.439042][T24994] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.447053][T24994] device bridge_slave_0 entered promiscuous mode [ 342.468035][T24994] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.475081][T24994] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.482531][T24994] device bridge_slave_1 entered promiscuous mode [ 342.519555][T25011] device syzkaller0 entered promiscuous mode [ 342.677784][T24994] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.684861][T24994] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.692370][T24994] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.699238][T24994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.737247][T22383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.745170][T22383] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.753557][T22383] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.772360][T22397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.783678][T22397] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.790913][T22397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.799165][T22397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.834938][T22397] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.841808][T22397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.862221][T22397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.870143][T22397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.906909][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 342.935485][T24994] device veth0_vlan entered promiscuous mode [ 342.946611][T22397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 342.960531][T22397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 342.970170][T22397] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 342.993310][T22383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 343.008324][T24994] device veth1_macvtap entered promiscuous mode [ 343.021451][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 343.067634][ T902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 343.278672][T25076] device pim6reg1 entered promiscuous mode [ 343.319934][T25082] syz.4.6985[25082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.319987][T25082] syz.4.6985[25082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.350600][T25082] syz.4.6985[25082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.362719][T25082] syz.4.6985[25082] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.515494][ T110] device bridge_slave_1 left promiscuous mode [ 343.532960][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.540709][ T110] device bridge_slave_0 left promiscuous mode [ 343.546777][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.838284][T25110] device veth1_macvtap entered promiscuous mode [ 343.905083][T25110] device macsec0 entered promiscuous mode [ 343.913979][ T2149] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 343.975912][T25116] device syzkaller0 entered promiscuous mode [ 344.094033][T25139] device syzkaller0 entered promiscuous mode [ 344.105596][T25132] device veth1_macvtap left promiscuous mode [ 344.155494][T25143] device syzkaller0 entered promiscuous mode [ 344.449186][T25168] device syzkaller0 entered promiscuous mode [ 344.475031][T25174] device veth0_to_batadv left promiscuous mode [ 344.491272][T25174] bridge0: port 3(veth0_to_batadv) entered disabled state [ 344.509057][T25174] device bridge_slave_1 left promiscuous mode [ 344.516903][T25174] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.539735][T25174] device bridge_slave_0 left promiscuous mode [ 344.545749][T25174] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.686974][T25217] device syzkaller0 entered promiscuous mode [ 344.772445][T25231] bridge0: port 3(veth0_vlan) entered disabled state [ 344.787229][T25231] bridge0: port 3(veth0_vlan) entered blocking state [ 344.793796][T25231] bridge0: port 3(veth0_vlan) entered forwarding state [ 344.910464][T25240] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.917398][T25240] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.924898][T25240] device bridge_slave_0 entered promiscuous mode [ 344.932199][T25240] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.939921][T25240] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.947281][T25240] device bridge_slave_1 entered promiscuous mode [ 344.980893][T25245] device syzkaller0 entered promiscuous mode [ 345.015744][T25240] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.022754][T25240] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.029841][T25240] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.036583][T25240] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.055939][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.063419][ T856] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.072155][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.091089][ T3797] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.099162][ T3797] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.106398][ T3797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.116488][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.125088][ T856] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.131975][ T856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.150591][ T3797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.159814][ T3797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.174365][ T860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 345.193017][T25240] device veth0_vlan entered promiscuous mode [ 345.199426][ T2144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 345.207509][ T2144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 345.215586][ T2144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 345.229133][ T3784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 345.239002][T25240] device veth1_macvtap entered promiscuous mode [ 345.249833][ T3784] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 345.258296][ T3784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 345.453214][T25290] device sit0 left promiscuous mode [ 345.609975][T25290] device sit0 entered promiscuous mode [ 345.812639][T25299] device syzkaller0 entered promiscuous mode [ 346.076599][ T354] device bridge_slave_1 left promiscuous mode [ 346.083004][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.147840][ T354] device bridge_slave_0 left promiscuous mode [ 346.189858][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.198516][ T354] device veth1_macvtap left promiscuous mode [ 346.205003][ T354] device veth0_vlan left promiscuous mode [ 346.650380][T25354] syz.1.7070[25354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.650451][T25354] syz.1.7070[25354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.702301][T25356] device syzkaller0 entered promiscuous mode [ 347.193475][T25369] syz.1.7074[25369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.193533][T25369] syz.1.7074[25369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.348778][T25374] device pim6reg1 entered promiscuous mode [ 347.666732][T25404] syz.1.7085[25404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.666854][T25404] syz.1.7085[25404] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.761712][T25427] device syzkaller0 entered promiscuous mode [ 348.206832][T25482] device syzkaller0 entered promiscuous mode [ 349.243847][T25540] device syzkaller0 entered promiscuous mode [ 351.722431][T25712] device syzkaller0 entered promiscuous mode [ 351.776208][T25717] device pim6reg1 entered promiscuous mode [ 352.023763][T25751] device pim6reg1 entered promiscuous mode [ 352.566210][T25791] bridge0: port 4(veth0_to_bridge) entered blocking state [ 352.591390][T25791] bridge0: port 4(veth0_to_bridge) entered disabled state [ 352.612356][T25791] device veth0_to_bridge entered promiscuous mode [ 352.638998][T25791] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.666665][T25791] bridge0: port 4(veth0_to_bridge) entered blocking state [ 352.673641][T25791] bridge0: port 4(veth0_to_bridge) entered forwarding state [ 352.701813][T25800] device dummy0 entered promiscuous mode [ 352.799940][T25798] device syzkaller0 entered promiscuous mode [ 353.788213][T25905] device syzkaller0 entered promiscuous mode [ 354.126025][T25949] device veth1_macvtap left promiscuous mode [ 354.162720][T25953] device syzkaller0 entered promiscuous mode [ 354.176562][T25950] device veth1_macvtap entered promiscuous mode [ 354.184027][T25950] device macsec0 entered promiscuous mode [ 354.357780][T25970] syz.2.7239[25970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.357834][T25970] syz.2.7239[25970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.046868][T26002] device pim6reg1 entered promiscuous mode [ 355.511082][T26006] device pim6reg1 entered promiscuous mode [ 356.776366][T26066] device wg2 entered promiscuous mode [ 358.550746][T26110] device syzkaller0 entered promiscuous mode [ 362.222222][T26233] device pim6reg1 entered promiscuous mode [ 364.123255][T26322] syz.4.7332[26322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.123309][T26322] syz.4.7332[26322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.159086][T26321] syz.4.7332[26321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.171643][T26321] syz.4.7332[26321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 366.411325][T26396] device syzkaller0 entered promiscuous mode [ 367.425623][T26442] device syzkaller0 entered promiscuous mode [ 367.650530][T26452] device pim6reg1 entered promiscuous mode [ 367.877894][T26475] device wg2 entered promiscuous mode [ 368.044219][T26491] device syzkaller0 entered promiscuous mode [ 370.016161][T26508] device syzkaller0 entered promiscuous mode [ 371.275215][T26567] device syzkaller0 entered promiscuous mode [ 371.328399][T26572] device syzkaller0 entered promiscuous mode [ 371.977736][T26607] device pim6reg1 entered promiscuous mode [ 372.101051][T26623] device wg2 left promiscuous mode [ 373.535776][T26656] device syzkaller0 entered promiscuous mode [ 373.920283][T26674] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 375.537757][T26711] device pim6reg1 entered promiscuous mode [ 376.208101][T26689] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.215404][T26689] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.223781][T26689] device bridge_slave_0 entered promiscuous mode [ 376.351614][T26689] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.358463][T26689] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.367906][T26689] device bridge_slave_1 entered promiscuous mode [ 376.407077][T26735] device syzkaller0 entered promiscuous mode [ 376.714706][T26735] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 376.761275][T26735] pim6reg0: linktype set to 769 [ 376.779453][ T24] audit: type=1400 audit(1720279798.899:183): avc: denied { write } for pid=26746 comm="syz.2.7436" name="net" dev="proc" ino=95881 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 376.806922][ T24] audit: type=1400 audit(1720279798.899:184): avc: denied { add_name } for pid=26746 comm="syz.2.7436" name="blkio.bfq.io_wait_time" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 376.828721][ T24] audit: type=1400 audit(1720279798.899:185): avc: denied { create } for pid=26746 comm="syz.2.7436" name="blkio.bfq.io_wait_time" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 376.850508][ T24] audit: type=1400 audit(1720279798.899:186): avc: denied { associate } for pid=26746 comm="syz.2.7436" name="blkio.bfq.io_wait_time" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 378.138620][T26781] device veth1_macvtap left promiscuous mode [ 378.165638][T26781] device macsec0 left promiscuous mode [ 378.384403][T26785] device veth1_macvtap entered promiscuous mode [ 378.400228][T26785] device macsec0 entered promiscuous mode [ 378.625011][ T354] device veth0_to_bridge left promiscuous mode [ 378.631332][ T354] bridge0: port 4(veth0_to_bridge) entered disabled state [ 378.638837][ T354] bridge0: port 3(veth0_vlan) entered disabled state [ 378.646228][ T354] device bridge_slave_1 left promiscuous mode [ 378.652504][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.660547][ T354] device bridge_slave_0 left promiscuous mode [ 378.666559][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.674685][ T354] device veth1_macvtap left promiscuous mode [ 378.681046][ T354] device veth0_vlan left promiscuous mode [ 378.839341][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 378.846759][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 378.895030][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 378.906409][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.931903][ T3798] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.938785][ T3798] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.948798][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 378.957362][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.965576][ T3798] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.972712][ T3798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.982051][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 378.990186][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.998603][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 379.008661][ T3798] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.022585][T26689] device veth0_vlan entered promiscuous mode [ 379.033703][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 379.041215][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 379.049588][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 379.057918][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 379.066319][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 379.079428][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.086689][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.094483][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.104296][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.121769][T26689] device veth1_macvtap entered promiscuous mode [ 379.138197][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 379.147251][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 379.162946][ T3796] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 379.181597][ T3776] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 379.199957][ T3776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 379.303773][T26841] device pim6reg1 entered promiscuous mode [ 379.884385][T26872] device syzkaller0 entered promiscuous mode [ 379.904701][T26872] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 65487 [ 380.132723][T26915] device syzkaller0 entered promiscuous mode [ 380.172376][T26921] device syzkaller0 entered promiscuous mode [ 380.316421][T26950] device syzkaller0 entered promiscuous mode [ 380.820543][T27041] device pim6reg1 entered promiscuous mode [ 381.027761][T27053] device veth0_vlan left promiscuous mode [ 381.035350][T27053] device veth0_vlan entered promiscuous mode [ 381.173810][T27070] syz.2.7519[27070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.173964][T27070] syz.2.7519[27070] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.330199][T27106] device syzkaller0 entered promiscuous mode [ 381.805612][T27141] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.820168][T27141] O3ãc¤±: renamed from bridge_slave_0 [ 381.934198][T27164] device veth1_macvtap entered promiscuous mode [ 381.940876][T27164] device macsec0 entered promiscuous mode [ 381.966487][ T3782] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 382.670040][T27212] tun0: tun_chr_ioctl cmd 1074025692 [ 382.776528][T27221] device syzkaller0 entered promiscuous mode [ 383.942778][T27310] device syzkaller0 entered promiscuous mode [ 384.026166][T27308] GPL: port 1(veth1) entered blocking state [ 384.031995][T27308] GPL: port 1(veth1) entered disabled state [ 384.038112][T27308] device veth1 entered promiscuous mode [ 384.144393][T27327] device syzkaller0 entered promiscuous mode [ 384.604633][T27345] device syzkaller0 entered promiscuous mode [ 384.630230][T27369] syz.1.7608[27369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.630283][T27369] syz.1.7608[27369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.824493][T27377] device syzkaller0 entered promiscuous mode [ 385.001592][T27384] device wg2 entered promiscuous mode [ 387.549478][T27613] device syzkaller0 entered promiscuous mode [ 387.688246][T27630] device syzkaller0 entered promiscuous mode [ 388.791169][T27682] device syzkaller0 entered promiscuous mode [ 388.848338][T27690] device pim6reg1 entered promiscuous mode [ 388.953132][T27723] device pim6reg1 entered promiscuous mode [ 389.086394][T27734] tap0: tun_chr_ioctl cmd 1074025677 [ 389.092118][T27734] tap0: linktype set to 805 [ 389.507259][T27749] tun0: tun_chr_ioctl cmd 1074025676 [ 389.548496][T27749] tun0: owner set to 0 [ 389.917715][T27771] device pim6reg1 entered promiscuous mode [ 390.227835][T27819] device pim6reg1 entered promiscuous mode [ 390.340563][T27830] syz.3.7760[27830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.340610][T27830] syz.3.7760[27830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.902147][T27866] device pim6reg1 entered promiscuous mode [ 391.537065][T27932] device syzkaller0 entered promiscuous mode [ 391.577758][T27918] device syzkaller0 entered promiscuous mode [ 392.040614][T27949] device veth0_vlan left promiscuous mode [ 392.099206][T27949] device veth0_vlan entered promiscuous mode [ 392.148078][T22383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.156470][T22383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.164232][T22383] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.194437][T27979] device sit0 left promiscuous mode [ 392.215663][T27980] device sit0 entered promiscuous mode [ 394.346351][T28054] device veth1_macvtap left promiscuous mode [ 394.373428][T28054] device macsec0 left promiscuous mode [ 394.788261][T28086] device syzkaller0 entered promiscuous mode [ 394.940191][T28105] device macsec0 entered promiscuous mode [ 394.946119][T28105] device veth1_macvtap entered promiscuous mode [ 395.600353][T12162] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 396.772632][T28184] device pim6reg1 entered promiscuous mode [ 397.176266][T28211] syz.3.7865[28211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.176326][T28211] syz.3.7865[28211] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.188293][T28210] syz.3.7865[28210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.236966][T28210] syz.3.7865[28210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.437020][T28237] syzkaller0: refused to change device tx_queue_len [ 397.672495][T28264] device pim6reg1 entered promiscuous mode [ 397.800865][T28280] device syzkaller0 entered promiscuous mode [ 399.048680][T28322] device syzkaller0 entered promiscuous mode [ 399.505242][T28336] device pim6reg1 entered promiscuous mode [ 400.285214][T28356] device syzkaller0 entered promiscuous mode [ 401.420457][T28392] syz.2.7918[28392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.420516][T28392] syz.2.7918[28392] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.471548][T28419] device syzkaller0 entered promiscuous mode [ 401.849396][T28429] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.856446][T28429] bridge0: port 1(bridge_slave_0) entered disabled state [ 402.521260][T28478] syz.1.7942[28478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.521310][T28478] syz.1.7942[28478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.580007][T28478] syz.1.7942[28478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.599789][T28477] syz.4.7941[28477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.620775][T28478] syz.1.7942[28478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.629358][T28477] syz.4.7941[28477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.525142][T28502] device syzkaller0 entered promiscuous mode [ 403.743381][T28525] device veth1_macvtap left promiscuous mode [ 403.749195][T28525] device macsec0 left promiscuous mode [ 404.179655][T28551] geneve1: tun_chr_ioctl cmd 2147767517 [ 404.357628][T28573] device syzkaller0 entered promiscuous mode [ 405.247638][T28640] device syzkaller0 entered promiscuous mode [ 406.324708][T28678] device pim6reg1 entered promiscuous mode [ 406.594957][T28704] device veth1_macvtap left promiscuous mode [ 407.727940][T28739] device syzkaller0 entered promiscuous mode [ 408.934057][T28780] device syzkaller0 entered promiscuous mode [ 409.135606][T28790] syz.2.8031[28790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.135663][T28790] syz.2.8031[28790] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.442462][ T24] audit: type=1400 audit(1720279831.589:187): avc: denied { create } for pid=28816 comm="syz.4.8039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 409.477190][T28822] device pim6reg1 entered promiscuous mode [ 410.006084][T28849] device veth1_macvtap left promiscuous mode [ 410.840584][T28856] device veth0_vlan left promiscuous mode [ 410.848207][T28856] device veth0_vlan entered promiscuous mode [ 411.856648][T28915] syz.2.8072[28915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.856703][T28915] syz.2.8072[28915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 411.917666][T28915] syz.2.8072[28915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.015799][T28915] syz.2.8072[28915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.101378][T28921] syz.3.8073[28921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.113143][T28921] syz.3.8073[28921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.232498][T28928] device pim6reg1 entered promiscuous mode [ 412.387569][T28936] device syzkaller0 entered promiscuous mode [ 413.314014][T28982] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.321048][T28982] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.328306][T28982] device bridge_slave_0 entered promiscuous mode [ 413.335496][T28982] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.343435][T28982] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.357928][T28982] device bridge_slave_1 entered promiscuous mode [ 413.387489][T28991] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.413788][T29001] device syzkaller0 entered promiscuous mode [ 413.426833][T28991] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.434116][T28991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.540938][T28982] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.547822][T28982] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.555066][T28982] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.561913][T28982] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.627657][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 413.646712][ T3786] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.668909][ T3786] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.957878][ T3781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 413.967506][ T3781] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.974387][ T3781] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.982896][ T3781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 413.991237][ T3781] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.998139][ T3781] bridge0: port 2(bridge_slave_1) entered forwarding state [ 414.005919][ T3781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 414.013977][T29033] tap0: tun_chr_ioctl cmd 1074025675 [ 414.019789][T29033] tap0: persist enabled [ 414.039812][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 414.052977][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 414.072487][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 414.082534][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 414.090992][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 414.098793][ T303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 414.107070][T28982] device veth0_vlan entered promiscuous mode [ 414.122706][T28982] device veth1_macvtap entered promiscuous mode [ 414.138679][ T895] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.193361][ T895] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.258253][ T895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 414.283430][ T895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.291667][ T895] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 414.299573][ T895] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 414.307693][ T895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.327328][T29046] device syzkaller0 entered promiscuous mode [ 414.774454][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 414.782869][ T3786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.841276][T29102] device syzkaller0 entered promiscuous mode [ 415.028650][T29125] device sit0 left promiscuous mode [ 415.387469][T29159] device veth1_macvtap left promiscuous mode [ 415.716074][T29177] device pim6reg1 entered promiscuous mode [ 415.728517][T29204] syz.2.8146[29204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.728562][T29204] syz.2.8146[29204] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.768506][T29200] device veth0_to_team entered promiscuous mode [ 415.768759][T29207] syz.2.8146[29207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.768802][T29207] syz.2.8146[29207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.673060][T29241] device syzkaller0 entered promiscuous mode [ 416.728469][T29267] device syzkaller0 entered promiscuous mode [ 417.108539][ T7] device bridge_slave_1 left promiscuous mode [ 417.114588][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.152579][ T7] device bridge_slave_0 left promiscuous mode [ 417.158547][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.166405][ T7] device veth0_vlan left promiscuous mode [ 417.603106][T29365] device pim6reg1 entered promiscuous mode [ 417.626651][T29368] device syzkaller0 entered promiscuous mode [ 417.900816][T29388] device veth1_macvtap entered promiscuous mode [ 417.908254][T29388] device macsec0 entered promiscuous mode [ 417.918306][ T924] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 418.103659][T29407] device lo entered promiscuous mode [ 418.623196][T29465] device pim6reg1 entered promiscuous mode [ 418.852038][T29483] device macsec0 left promiscuous mode [ 419.017479][T29502] device syzkaller0 entered promiscuous mode [ 419.178718][ T24] audit: type=1400 audit(1720279841.319:188): avc: denied { create } for pid=29532 comm="syz.2.8247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 419.362348][T29581] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 419.992402][T29653] syz.1.8282[29653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.992451][T29653] syz.1.8282[29653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.017186][T29653] syz.1.8282[29653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.034151][T29653] syz.1.8282[29653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.577832][T29680] cgroup: fork rejected by pids controller in /syz2 [ 420.960323][T29735] device syzkaller0 entered promiscuous mode [ 421.192093][T29794] device sit0 entered promiscuous mode [ 421.275540][T29792] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.287099][T29792] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.294805][T29792] device bridge_slave_0 entered promiscuous mode [ 421.305867][T29792] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.312843][T29792] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.320103][T29792] device bridge_slave_1 entered promiscuous mode [ 421.330777][T29803] ªªªªªª: renamed from vlan0 [ 421.437911][T29811] device syzkaller0 entered promiscuous mode [ 421.447451][T29792] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.454500][T29792] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.461680][T29792] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.468521][T29792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.526209][T29814] device syzkaller0 entered promiscuous mode [ 421.532975][ T3807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.546132][ T3807] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.553330][ T3807] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.610038][ T3785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.618019][ T3785] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.624881][ T3785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.632385][ T3785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.642672][ T3785] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.649565][ T3785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.655934][T29822] syz.3.8306[29822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.656712][ T3785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.656757][T29824] syz.3.8306[29824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.668413][ T3785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.694601][T29824] syz.3.8306[29824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.694821][T29822] syz.3.8306[29822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.751223][T29826] device syzkaller0 entered promiscuous mode [ 421.785891][ T872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 421.797870][T29792] device veth0_vlan entered promiscuous mode [ 421.883686][ T913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 421.891950][ T913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 421.903166][ T913] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.042143][ T913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 422.100872][T29792] device veth1_macvtap entered promiscuous mode [ 422.256987][ T3785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 422.265460][ T3785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 422.505009][T29869] bridge0: port 3(veth0_to_batadv) entered blocking state [ 422.580765][T29869] bridge0: port 3(veth0_to_batadv) entered disabled state [ 422.719920][T29869] device veth0_to_batadv entered promiscuous mode [ 422.726315][T29869] bridge0: port 3(veth0_to_batadv) entered blocking state [ 422.733278][T29869] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 422.954602][T29874] device veth0_to_batadv left promiscuous mode [ 422.979758][T29874] bridge0: port 3(veth0_to_batadv) entered disabled state [ 423.057704][ T7] device bridge_slave_1 left promiscuous mode [ 423.115814][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.163821][ T7] device bridge_slave_0 left promiscuous mode [ 423.173064][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.201882][ T7] device veth0_vlan left promiscuous mode [ 424.415422][T29991] device syzkaller0 entered promiscuous mode [ 426.941114][T30120] ªªªªªª: renamed from vlan0 [ 427.170638][T30141] device pim6reg1 entered promiscuous mode [ 427.261562][T30148] device wg2 entered promiscuous mode [ 428.567852][T30218] device syzkaller0 entered promiscuous mode [ 428.575107][T30219] ªªªªªª: renamed from vlan0 [ 428.886577][T30277] syz.4.8428[30277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.886629][T30277] syz.4.8428[30277] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.096822][T30363] device syzkaller0 entered promiscuous mode [ 430.144614][T30365] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.151636][T30365] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.314289][T30383] device wg2 left promiscuous mode [ 430.502676][T30389] device pim6reg1 entered promiscuous mode [ 430.729321][T30410] device pim6reg1 entered promiscuous mode [ 431.321183][T30462] device veth1_macvtap left promiscuous mode [ 431.639621][T30485] device sit0 entered promiscuous mode [ 432.040918][T30492] ªªªªªª: renamed from vlan0 [ 432.082675][T30477] device sit0 entered promiscuous mode [ 432.319744][T30491] device veth1_macvtap left promiscuous mode [ 432.335332][T30491] device macsec0 left promiscuous mode [ 432.648018][T30521] device pim6reg1 entered promiscuous mode [ 432.729872][T30541] geneve1: tun_chr_ioctl cmd 1074025698 [ 433.560322][T30585] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.568801][T30585] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.576097][T30585] device bridge_slave_0 entered promiscuous mode [ 433.609418][T30585] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.616575][T30585] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.624304][T30585] device bridge_slave_1 entered promiscuous mode [ 434.118320][T30627] device sit0 entered promiscuous mode [ 434.293153][T30633] device vxcan1 entered promiscuous mode [ 434.327992][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 434.337627][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.356045][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 434.375870][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.390682][ T920] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.397649][ T920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.407846][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 434.431482][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.448668][ T920] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.455589][ T920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.480589][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 434.517788][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 434.529124][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.538677][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 434.551538][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.565105][T30585] device veth0_vlan entered promiscuous mode [ 434.599027][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 434.612030][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 434.621812][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 434.630463][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.651630][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.659012][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.671970][T30585] device veth1_macvtap entered promiscuous mode [ 434.678736][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 434.687206][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 434.700641][ T873] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 434.716848][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 434.725929][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 434.734982][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 434.743755][ T901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 434.965161][ T7] device veth1 left promiscuous mode [ 434.977384][ T7] GPL: port 1(veth1) entered disabled state [ 435.046119][ T7] device bridge_slave_1 left promiscuous mode [ 435.064359][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.084025][ T7] device bridge_slave_0 left promiscuous mode [ 435.090225][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.098349][ T7] device veth1_macvtap left promiscuous mode [ 435.299897][T30727] device pim6reg1 entered promiscuous mode [ 437.093938][T30818] device pim6reg1 entered promiscuous mode [ 440.694872][T30972] device syzkaller0 entered promiscuous mode [ 442.127608][T31052] device wg2 entered promiscuous mode [ 443.750459][T31214] syz.4.8691[31214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.750504][T31214] syz.4.8691[31214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.782248][T31214] syz.4.8691[31214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.809350][T31214] syz.4.8691[31214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.080212][T31226] device syzkaller0 entered promiscuous mode [ 444.953478][T31265] device syzkaller0 entered promiscuous mode [ 447.120268][T31413] device syzkaller0 entered promiscuous mode [ 447.775753][T31489] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.782780][T31489] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.794694][T31489] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.801578][T31489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.808644][T31489] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.815456][T31489] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.822665][T31489] device bridge0 entered promiscuous mode [ 447.876720][T31502] device veth0_vlan left promiscuous mode [ 447.889877][T31502] device veth0_vlan entered promiscuous mode [ 447.896621][ T880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 447.909909][ T880] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 447.917293][ T880] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 448.029616][T31526] »»»»»»: renamed from pim6reg1 [ 448.396863][T31550] device syzkaller0 entered promiscuous mode [ 448.539140][T31556] device syzkaller0 entered promiscuous mode [ 448.851561][T31575] device pim6reg1 entered promiscuous mode [ 449.301311][T31659] device pim6reg1 entered promiscuous mode [ 449.588522][T31698] device syzkaller0 entered promiscuous mode [ 449.855983][T31756] syz.4.8847[31756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.856034][T31756] syz.4.8847[31756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.869505][T31756] syz.4.8847[31756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.881258][T31756] syz.4.8847[31756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 449.927932][T31761] device pim6reg1 entered promiscuous mode [ 450.538482][T31816] device syzkaller0 entered promiscuous mode [ 450.820623][T31875] device sit0 left promiscuous mode [ 450.869726][T31877] device syzkaller0 entered promiscuous mode [ 451.400811][T31926] device sit0 left promiscuous mode [ 451.736011][T31954] syzkaller0: tun_chr_ioctl cmd 1074025681 [ 455.660531][T32123] device pim6reg1 entered promiscuous mode [ 456.108941][T32141] bridge0: port 3(veth0_to_batadv) entered blocking state [ 456.116226][T32141] bridge0: port 3(veth0_to_batadv) entered disabled state [ 456.143020][T32141] device veth0_to_batadv entered promiscuous mode [ 456.170095][T32141] bridge0: port 3(veth0_to_batadv) entered blocking state [ 456.177092][T32141] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 456.415520][T32151] device veth0_to_batadv left promiscuous mode [ 456.422804][T32151] bridge0: port 3(veth0_to_batadv) entered disabled state [ 459.136162][T32222] geneve1: tun_chr_ioctl cmd 1074025681 [ 459.420158][T32241] device syzkaller0 entered promiscuous mode [ 460.743456][T32285] device syzkaller0 entered promiscuous mode [ 460.753648][ T890] syzkaller0: tun_net_xmit 48 [ 462.443581][T32347] device syzkaller0 entered promiscuous mode [ 462.891594][T32367] device pim6reg1 entered promiscuous mode [ 462.905765][T32365] device pim6reg1 entered promiscuous mode [ 463.803449][T32453] device pim6reg1 entered promiscuous mode [ 464.119688][T32459] device syzkaller0 entered promiscuous mode [ 465.717786][T32577] syz.1.9081[32577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.717822][T32577] syz.1.9081[32577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.736678][T32577] syz.1.9081[32577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.751574][T32577] syz.1.9081[32577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.770993][T32579] Â: renamed from pim6reg1 [ 466.016697][T32613] syz.1.9088[32613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.016751][T32613] syz.1.9088[32613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.082597][T32625] device syzkaller0 entered promiscuous mode [ 466.126521][T32630] device syzkaller0 entered promiscuous mode [ 466.306279][T32647] syz.3.9101[32647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.306315][T32648] syz.3.9101[32648] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.306321][T32647] syz.3.9101[32647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.357134][T32656] device macsec0 entered promiscuous mode [ 466.396176][T32663] syz.3.9106[32663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.757205][T32678] device syzkaller0 entered promiscuous mode [ 467.217104][T32698] tap1: tun_chr_ioctl cmd 1074025677 [ 467.223243][T32698] tap1: linktype set to 823 [ 467.383578][T32730] device pim6reg1 entered promiscuous mode [ 467.431529][T32745] device pim6reg1 entered promiscuous mode [ 469.796715][ T394] device syzkaller0 entered promiscuous mode [ 469.969644][ T448] device pim6reg1 entered promiscuous mode [ 470.061098][ T463] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.068527][ T463] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.075843][ T463] device bridge0 left promiscuous mode [ 470.179595][ T497] geneve1: tun_chr_ioctl cmd 1074025681 [ 470.211194][ T500] bridge0: port 3(ip6gretap0) entered blocking state [ 470.217773][ T500] bridge0: port 3(ip6gretap0) entered disabled state [ 470.224966][ T500] device ip6gretap0 entered promiscuous mode [ 470.231212][ T500] bridge0: port 3(ip6gretap0) entered blocking state [ 470.237696][ T500] bridge0: port 3(ip6gretap0) entered forwarding state [ 470.263652][ T510] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 470.271977][ T510] pim6reg0: linktype set to 769 [ 470.737985][ T589] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.749573][ T589] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.764454][ T589] device bridge_slave_0 entered promiscuous mode [ 470.771589][ T589] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.778775][ T589] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.786535][ T589] device bridge_slave_1 entered promiscuous mode [ 470.877102][ T589] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.884013][ T589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.891532][ T589] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.898282][ T589] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.969016][ T3783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 470.980391][ T3783] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.999355][ T3783] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.031678][ T1540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 471.043513][ T1540] bridge0: port 1(bridge_slave_0) entered blocking state [ 471.050420][ T1540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 471.069392][ T1540] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 471.077550][ T1540] bridge0: port 2(bridge_slave_1) entered blocking state [ 471.084497][ T1540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 471.134772][ T3783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 471.142855][ T3783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 471.157944][ T877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 471.187858][ T877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 471.196084][ T877] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 471.214046][ T877] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 471.229652][ T589] device veth0_vlan entered promiscuous mode [ 471.256538][ T877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 471.269162][ T589] device veth1_macvtap entered promiscuous mode [ 471.304676][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 471.321086][ T910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 471.387200][ T694] device sit0 left promiscuous mode [ 471.478047][ T700] device veth1_macvtap left promiscuous mode [ 471.484029][ T700] device macsec0 entered promiscuous mode [ 471.499010][ T703] device veth1_macvtap entered promiscuous mode [ 471.516505][ T694] device sit0 entered promiscuous mode [ 472.517358][ T743] bpf_get_probe_write_proto: 79 callbacks suppressed [ 472.517368][ T743] syz.0.9256[743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.525619][ T743] syz.0.9256[743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.575072][ T755] syz.2.9259[755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.586673][ T755] syz.2.9259[755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.612734][ T755] device pim6reg1 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 472.813188][ T774] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.820766][ T774] bridge0: port 1(bridge_slave_0) entered disabled state [ 472.828112][ T774] device bridge_slave_0 entered promiscuous mode [ 472.835326][ T774] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.842440][ T774] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.853815][ T774] device bridge_slave_1 entered promiscuous mode [ 472.907124][ T774] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.914134][ T774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 472.921254][ T774] bridge0: port 1(bridge_slave_0) entered blocking state [ 472.928091][ T774] bridge0: port 1(bridge_slave_0) entered forwarding state [ 472.957808][ T334] bridge0: port 3(ip6gretap0) entered disabled state [ 472.970053][ T334] device ip6gretap0 left promiscuous mode [ 472.975605][ T334] bridge0: port 3(ip6gretap0) entered disabled state [ 473.660558][ T3783] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.667637][ T3783] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.720181][ T334] device bridge_slave_1 left promiscuous mode [ 473.726117][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.733427][ T334] device O3ãc¤± left promiscuous mode [ 473.738645][ T334] bridge0: port 1(O3ãc¤±) entered disabled state [ 473.745692][ T334] device bridge_slave_1 left promiscuous mode [ 473.751677][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.758744][ T334] device bridge_slave_0 left promiscuous mode [ 473.764774][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.772411][ T334] device veth0_vlan left promiscuous mode [ 473.778041][ T334] device veth1_macvtap left promiscuous mode [ 473.783887][ T334] device veth0_vlan left promiscuous mode [ 475.710215][ T334] device bridge_slave_1 left promiscuous mode [ 475.716225][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.723528][ T334] device bridge_slave_0 left promiscuous mode [ 475.729571][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.737062][ T334] device bridge_slave_1 left promiscuous mode [ 475.743143][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.750398][ T334] device bridge_slave_0 left promiscuous mode [ 475.756358][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.764050][ T334] device bridge_slave_1 left promiscuous mode [ 475.770302][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.777466][ T334] device bridge_slave_0 left promiscuous mode [ 475.783777][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.791356][ T334] device bridge_slave_1 left promiscuous mode [ 475.797307][ T334] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.804568][ T334] device bridge_slave_0 left promiscuous mode [ 475.810866][ T334] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.818619][ T334] device veth1_macvtap left promiscuous mode [ 475.824497][ T334] device veth0_vlan left promiscuous mode