last executing test programs: 10.199842473s ago: executing program 4 (id=8293): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x84, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe, 0x4, 0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000100)=""/2, 0x5b, 0x2, 0x1, 0x7fffffff}, 0x20) syz_clone(0x800000, &(0x7f0000000180)="7e09d1d7cd7ec42c20e687cb12eb6bc7fc06bb5c7997a116428e40d7051e1b0ee2851c8e2c5b8555d7f091ff1827be5fe068956fa5d97ff779bc085145c23709a0490c1d8b77c60a44a6ee930c2fa9208192dee029639a5c77165b1ebf3c2348f3180ad68a778827445fc34e9f896008ed60256c618f8643f04b0c42458589cb60aa339fa24bac4e3a195dafb591679640e4e1055c5910c64455b56208c7a2a2d37c98738cbf707b526f5ed9ecec3b2fe87dd51c1ba97d36693d57bd3f7723093003c11049fa346a42f34bffba9505be80697fa133d5e3", 0xd7, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="1443836f8842a44307a35db04ab5c58b82cb10e9206824f028e7cf8f00c2438ee85752ed5ef6347f0098d3d423e7823411c96cd35db3a7d3629ba6ccdd208a184b2d4364d25246bc6402947415c5366e733e5b8412b490cf19c01d3f1a0b9cf5d5") r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0xfe, 0x3, 0xd9, 0x0, 0x3, 0x30000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xb}, 0x400, 0x9, 0xe1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0xea, 0x5, 0x27, 0xa, 0x0, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000400), 0x8}, 0x80, 0x400000000, 0x0, 0x0, 0x1, 0xe, 0x6, 0x0, 0x5, 0x0, 0xffffffffffff8001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@cgroup=0xffffffffffffffff, 0x2e, 0x1, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={@cgroup=r3, r4, 0x14, 0x20, 0x0, @prog_fd=r5, r7}, 0x20) openat$cgroup_procs(r6, &(0x7f0000000740)='tasks\x00', 0x2, 0x0) (async, rerun: 32) r8 = openat$cgroup_type(r6, &(0x7f0000000780), 0x2, 0x0) (rerun: 32) write$cgroup_type(r8, &(0x7f00000007c0), 0x9) (async) r9 = openat$cgroup_ro(r3, &(0x7f0000000800)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000840)=r9, 0x4) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000ac0)={&(0x7f0000000880)="f7743a822d6d6bc564386c3abaea98de2ad0a568b8124ca76a427123c24092bdcfe343dd15fa77d3abe5539bce4461227e740cb075339f7a64bed9c71f0730e5bc21c35c2a13926f7d2b908c29d409e4de00290c09ef2f49", &(0x7f0000000900)=""/121, &(0x7f0000000980)="ad4e102c07e238c073737726ac4e99afeb46f6e61636a9149ac227e05898830dd26e2010b08397025630ed4fda8ecd199264f8eb07105324e2fe5831df026c35d36af1faca7415bd0d481aeb5600661d430596acceecf32270ee23a60668e6d1c162c2e909c6a3f9ff48e9dfcb70a48e3289b803918262458f0bbca693a612c2553d86792a6d9abeb54c3d2a677819053591f5cd29bfcfe3cd5e2da527f0957a04155f00a4ea4a49597f3a37a4ea454be62d8a155fad90a9a48dcc7d72d9f0d0775c", &(0x7f0000000a80)="1e9d8d232b2ea4ecae3adbf843", 0x7f, r9}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r9, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e80)={r9, 0x20, &(0x7f0000001e40)={&(0x7f0000000d40)=""/208, 0xd0, 0x0, &(0x7f0000000e40)=""/4096, 0x1000}}, 0x10) (async, rerun: 64) r12 = openat$cgroup_ro(r3, &(0x7f0000001ec0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x14, 0x12, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x3, 0x0, 0x0, 0x4, 0x1, 0x20, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1f0e29a3}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7b9b}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xb}]}, 0x0, 0x3, 0x43, &(0x7f0000000bc0)=""/67, 0x41100, 0x20, '\x00', r10, 0xb, r9, 0x8, &(0x7f0000000d00)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r11, r4, 0x6, &(0x7f0000001f00)=[r9, r9, r0, r12], &(0x7f0000001f40)=[{0x4, 0x4, 0xd, 0x2}, {0x5, 0x4, 0x3, 0x6}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0xe}, {0x0, 0x2, 0x8, 0xc}, {0x2, 0x4, 0xd, 0x7}], 0x10, 0x93}, 0x90) write$cgroup_freezer_state(r9, &(0x7f0000002080)='THAWED\x00', 0x7) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r0, 0xffffffffffffffff}, &(0x7f00000020c0), &(0x7f0000002100)=r13}, 0x20) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r12, 0xffffffffffffffff}, &(0x7f0000002180), &(0x7f00000021c0)=r12}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000024c0)={r0, 0x58, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002500)=r11, 0x4) (async) r18 = bpf$ITER_CREATE(0x21, &(0x7f0000002540)={r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x17, 0x30, &(0x7f0000002240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}}, @map_val={0x18, 0x9, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @generic={0x1d, 0x8, 0x9, 0xa9, 0x8}, @exit, @call={0x85, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x0, 0x6, 0x2, 0x5, 0x8, 0x4}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000023c0)='syzkaller\x00', 0x0, 0x21, &(0x7f0000002400)=""/33, 0x0, 0x9, '\x00', r16, 0x1, r17, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r13, 0x4, &(0x7f0000002580)=[r18, r9, r12, r12], &(0x7f00000025c0)=[{0x3, 0x5, 0x7, 0x9}, {0x5, 0x2, 0xf, 0xa}, {0x3, 0x2, 0x3, 0x8}, {0x2, 0x2, 0xb, 0x6}], 0x10, 0xe}, 0x90) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000026c0)) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000029c0)={r13, 0xe0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000002740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xba, &(0x7f00000027c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002800), &(0x7f0000002840), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002880)}}, 0x10) 8.40832738s ago: executing program 4 (id=8293): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x84, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe, 0x4, 0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000100)=""/2, 0x5b, 0x2, 0x1, 0x7fffffff}, 0x20) syz_clone(0x800000, &(0x7f0000000180)="7e09d1d7cd7ec42c20e687cb12eb6bc7fc06bb5c7997a116428e40d7051e1b0ee2851c8e2c5b8555d7f091ff1827be5fe068956fa5d97ff779bc085145c23709a0490c1d8b77c60a44a6ee930c2fa9208192dee029639a5c77165b1ebf3c2348f3180ad68a778827445fc34e9f896008ed60256c618f8643f04b0c42458589cb60aa339fa24bac4e3a195dafb591679640e4e1055c5910c64455b56208c7a2a2d37c98738cbf707b526f5ed9ecec3b2fe87dd51c1ba97d36693d57bd3f7723093003c11049fa346a42f34bffba9505be80697fa133d5e3", 0xd7, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="1443836f8842a44307a35db04ab5c58b82cb10e9206824f028e7cf8f00c2438ee85752ed5ef6347f0098d3d423e7823411c96cd35db3a7d3629ba6ccdd208a184b2d4364d25246bc6402947415c5366e733e5b8412b490cf19c01d3f1a0b9cf5d5") r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0xfe, 0x3, 0xd9, 0x0, 0x3, 0x30000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xb}, 0x400, 0x9, 0xe1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0xea, 0x5, 0x27, 0xa, 0x0, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000400), 0x8}, 0x80, 0x400000000, 0x0, 0x0, 0x1, 0xe, 0x6, 0x0, 0x5, 0x0, 0xffffffffffff8001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@cgroup=0xffffffffffffffff, 0x2e, 0x1, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={@cgroup=r3, r4, 0x14, 0x20, 0x0, @prog_fd=r5, r7}, 0x20) openat$cgroup_procs(r6, &(0x7f0000000740)='tasks\x00', 0x2, 0x0) (async, rerun: 32) r8 = openat$cgroup_type(r6, &(0x7f0000000780), 0x2, 0x0) (rerun: 32) write$cgroup_type(r8, &(0x7f00000007c0), 0x9) (async) r9 = openat$cgroup_ro(r3, &(0x7f0000000800)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000840)=r9, 0x4) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000ac0)={&(0x7f0000000880)="f7743a822d6d6bc564386c3abaea98de2ad0a568b8124ca76a427123c24092bdcfe343dd15fa77d3abe5539bce4461227e740cb075339f7a64bed9c71f0730e5bc21c35c2a13926f7d2b908c29d409e4de00290c09ef2f49", &(0x7f0000000900)=""/121, &(0x7f0000000980)="ad4e102c07e238c073737726ac4e99afeb46f6e61636a9149ac227e05898830dd26e2010b08397025630ed4fda8ecd199264f8eb07105324e2fe5831df026c35d36af1faca7415bd0d481aeb5600661d430596acceecf32270ee23a60668e6d1c162c2e909c6a3f9ff48e9dfcb70a48e3289b803918262458f0bbca693a612c2553d86792a6d9abeb54c3d2a677819053591f5cd29bfcfe3cd5e2da527f0957a04155f00a4ea4a49597f3a37a4ea454be62d8a155fad90a9a48dcc7d72d9f0d0775c", &(0x7f0000000a80)="1e9d8d232b2ea4ecae3adbf843", 0x7f, r9}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r9, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e80)={r9, 0x20, &(0x7f0000001e40)={&(0x7f0000000d40)=""/208, 0xd0, 0x0, &(0x7f0000000e40)=""/4096, 0x1000}}, 0x10) (async, rerun: 64) r12 = openat$cgroup_ro(r3, &(0x7f0000001ec0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x14, 0x12, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x3, 0x0, 0x0, 0x4, 0x1, 0x20, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1f0e29a3}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7b9b}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xb}]}, 0x0, 0x3, 0x43, &(0x7f0000000bc0)=""/67, 0x41100, 0x20, '\x00', r10, 0xb, r9, 0x8, &(0x7f0000000d00)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r11, r4, 0x6, &(0x7f0000001f00)=[r9, r9, r0, r12], &(0x7f0000001f40)=[{0x4, 0x4, 0xd, 0x2}, {0x5, 0x4, 0x3, 0x6}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0xe}, {0x0, 0x2, 0x8, 0xc}, {0x2, 0x4, 0xd, 0x7}], 0x10, 0x93}, 0x90) write$cgroup_freezer_state(r9, &(0x7f0000002080)='THAWED\x00', 0x7) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r0, 0xffffffffffffffff}, &(0x7f00000020c0), &(0x7f0000002100)=r13}, 0x20) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r12, 0xffffffffffffffff}, &(0x7f0000002180), &(0x7f00000021c0)=r12}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000024c0)={r0, 0x58, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002500)=r11, 0x4) (async) r18 = bpf$ITER_CREATE(0x21, &(0x7f0000002540)={r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x17, 0x30, &(0x7f0000002240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}}, @map_val={0x18, 0x9, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @generic={0x1d, 0x8, 0x9, 0xa9, 0x8}, @exit, @call={0x85, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x0, 0x6, 0x2, 0x5, 0x8, 0x4}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000023c0)='syzkaller\x00', 0x0, 0x21, &(0x7f0000002400)=""/33, 0x0, 0x9, '\x00', r16, 0x1, r17, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r13, 0x4, &(0x7f0000002580)=[r18, r9, r12, r12], &(0x7f00000025c0)=[{0x3, 0x5, 0x7, 0x9}, {0x5, 0x2, 0xf, 0xa}, {0x3, 0x2, 0x3, 0x8}, {0x2, 0x2, 0xb, 0x6}], 0x10, 0xe}, 0x90) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000026c0)) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000029c0)={r13, 0xe0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000002740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xba, &(0x7f00000027c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002800), &(0x7f0000002840), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002880)}}, 0x10) 6.570170411s ago: executing program 0 (id=8432): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xade1}, 0x0, 0xc8, 0x5}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x0, 0x3, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000f00)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x2, 0x4, 0x0, 0x2, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x20001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x21}, 0x1d) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="2125225727bb18a99658d4416f5e8480e99cc9d1b0436be31c82785f0a516c8ba18fd8b6ec58ece77a4258f079262cb7ad3356be05c2af557e03de888b1263fe048a40e4781d8c853452e44974d539101db20d08566b3a97053d0c55018eb92350a415a9e28d4bf80704acf7fed0517fff0fbbe3ea44a77e08270d256a37582c1e85907a766e06a921c5ad75472e77a3059c1a8fd9551c9f336d4bc55efb5dee77039e2377020b18a3c091e12561edae20456d1844f469792905e3bb82e7edfa", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32=r3, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000005c0)='kfree_skb\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000440)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bd04000000000000009c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394b9ba1a836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429ba63903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f25005798ca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9958fad67ccaba76408da35c9f1534c8bd48bbdf9594e8b4ce73febaefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb3b379e221a5318849b6b0679b5d65ab855fc9f1d10022cc20603480ffb1e3392fad690ce56aaa717e56fd55aec3d9d6671f55d7bc33830a4095497586e8d15c2a32d3176d45b783cb27112a69c14134488b6dd302c3e92a7e659351b610ed5ba022f92d4bf26b0a5c10a3c8eb0fabdf0017995ea0c06b41fe6dda769729328d6ee80ab3b4aeeeee7926575d526431184b2034b5cdacc8eaab03cf45af6ec451f65705d8a4375d559e4c3ad80e942d237616d8f2fdd5afe4fdf21478228d9f6299bf67cf1e62fc11c285e18fb65eeb657bc7375401bb175f6d2625195ce8647945dbdfb7eacc06a24832d155059b0f0484d4d39f5f92e8bd49ad3df23b961fe7bf9e506c5098ca79deb7906257e4ce9035f3a6b29453ee41640ade8b5916f38d19ab6f2fd51a9fd9a2559411967460952acf5c549e5466ea2d8563397a5f028486220fae69611d9bc0f1a68d31ad1a4e387de687ab1537b8bf743a49ea7b7d22c04d738ca439343aaab682d45dc91187e9ff08005358e1f3d864f36ee590fb0da9c958f15f9105c41add43a7c28874e58c31a7acb0467e0bd97f2ccd78604b5144267772381e7498bb98d9e8a3f98b505e5c9645e19d011dd86a1dc134fa4b21ff8ec2d054ae7e0044b4700cd54ce392c2ee515"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x6b, 0x60000000}, 0x2c) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, 0x0) 6.567370981s ago: executing program 1 (id=8434): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x27, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1003}, 0x20) getpid() perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x99, 0x2, 0x0, 0x0, 0x0, 0x0, 0x340b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x8}, 0x1543, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6.464838749s ago: executing program 3 (id=8436): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x0, 0x8}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000008000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) (async) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) syz_clone(0x15000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f00000002c0)='GPL\x00') (async) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f0000000280)=r3, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x1}]}, {0x0, [0x5f, 0xca2ff20c77941e13]}}, &(0x7f00000004c0)=""/228, 0x28, 0xe4, 0x1}, 0x20) (async) setsockopt$sock_attach_bpf(r10, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8=r1, @ANYRES32, @ANYBLOB="1800000000000000000000000000000018110000"], 0x0, 0x0, 0xfffffffffffffc21, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6.463912199s ago: executing program 4 (id=8293): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x84, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe, 0x4, 0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000100)=""/2, 0x5b, 0x2, 0x1, 0x7fffffff}, 0x20) syz_clone(0x800000, &(0x7f0000000180)="7e09d1d7cd7ec42c20e687cb12eb6bc7fc06bb5c7997a116428e40d7051e1b0ee2851c8e2c5b8555d7f091ff1827be5fe068956fa5d97ff779bc085145c23709a0490c1d8b77c60a44a6ee930c2fa9208192dee029639a5c77165b1ebf3c2348f3180ad68a778827445fc34e9f896008ed60256c618f8643f04b0c42458589cb60aa339fa24bac4e3a195dafb591679640e4e1055c5910c64455b56208c7a2a2d37c98738cbf707b526f5ed9ecec3b2fe87dd51c1ba97d36693d57bd3f7723093003c11049fa346a42f34bffba9505be80697fa133d5e3", 0xd7, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="1443836f8842a44307a35db04ab5c58b82cb10e9206824f028e7cf8f00c2438ee85752ed5ef6347f0098d3d423e7823411c96cd35db3a7d3629ba6ccdd208a184b2d4364d25246bc6402947415c5366e733e5b8412b490cf19c01d3f1a0b9cf5d5") r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0xfe, 0x3, 0xd9, 0x0, 0x3, 0x30000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xb}, 0x400, 0x9, 0xe1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0xea, 0x5, 0x27, 0xa, 0x0, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000400), 0x8}, 0x80, 0x400000000, 0x0, 0x0, 0x1, 0xe, 0x6, 0x0, 0x5, 0x0, 0xffffffffffff8001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@cgroup=0xffffffffffffffff, 0x2e, 0x1, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={@cgroup=r3, r4, 0x14, 0x20, 0x0, @prog_fd=r5, r7}, 0x20) openat$cgroup_procs(r6, &(0x7f0000000740)='tasks\x00', 0x2, 0x0) (async, rerun: 32) r8 = openat$cgroup_type(r6, &(0x7f0000000780), 0x2, 0x0) (rerun: 32) write$cgroup_type(r8, &(0x7f00000007c0), 0x9) (async) r9 = openat$cgroup_ro(r3, &(0x7f0000000800)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000840)=r9, 0x4) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000ac0)={&(0x7f0000000880)="f7743a822d6d6bc564386c3abaea98de2ad0a568b8124ca76a427123c24092bdcfe343dd15fa77d3abe5539bce4461227e740cb075339f7a64bed9c71f0730e5bc21c35c2a13926f7d2b908c29d409e4de00290c09ef2f49", &(0x7f0000000900)=""/121, &(0x7f0000000980)="ad4e102c07e238c073737726ac4e99afeb46f6e61636a9149ac227e05898830dd26e2010b08397025630ed4fda8ecd199264f8eb07105324e2fe5831df026c35d36af1faca7415bd0d481aeb5600661d430596acceecf32270ee23a60668e6d1c162c2e909c6a3f9ff48e9dfcb70a48e3289b803918262458f0bbca693a612c2553d86792a6d9abeb54c3d2a677819053591f5cd29bfcfe3cd5e2da527f0957a04155f00a4ea4a49597f3a37a4ea454be62d8a155fad90a9a48dcc7d72d9f0d0775c", &(0x7f0000000a80)="1e9d8d232b2ea4ecae3adbf843", 0x7f, r9}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r9, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e80)={r9, 0x20, &(0x7f0000001e40)={&(0x7f0000000d40)=""/208, 0xd0, 0x0, &(0x7f0000000e40)=""/4096, 0x1000}}, 0x10) (async, rerun: 64) r12 = openat$cgroup_ro(r3, &(0x7f0000001ec0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x14, 0x12, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x3, 0x0, 0x0, 0x4, 0x1, 0x20, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1f0e29a3}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7b9b}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xb}]}, 0x0, 0x3, 0x43, &(0x7f0000000bc0)=""/67, 0x41100, 0x20, '\x00', r10, 0xb, r9, 0x8, &(0x7f0000000d00)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r11, r4, 0x6, &(0x7f0000001f00)=[r9, r9, r0, r12], &(0x7f0000001f40)=[{0x4, 0x4, 0xd, 0x2}, {0x5, 0x4, 0x3, 0x6}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0xe}, {0x0, 0x2, 0x8, 0xc}, {0x2, 0x4, 0xd, 0x7}], 0x10, 0x93}, 0x90) write$cgroup_freezer_state(r9, &(0x7f0000002080)='THAWED\x00', 0x7) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r0, 0xffffffffffffffff}, &(0x7f00000020c0), &(0x7f0000002100)=r13}, 0x20) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r12, 0xffffffffffffffff}, &(0x7f0000002180), &(0x7f00000021c0)=r12}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000024c0)={r0, 0x58, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002500)=r11, 0x4) (async) r18 = bpf$ITER_CREATE(0x21, &(0x7f0000002540)={r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x17, 0x30, &(0x7f0000002240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}}, @map_val={0x18, 0x9, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @generic={0x1d, 0x8, 0x9, 0xa9, 0x8}, @exit, @call={0x85, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x0, 0x6, 0x2, 0x5, 0x8, 0x4}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000023c0)='syzkaller\x00', 0x0, 0x21, &(0x7f0000002400)=""/33, 0x0, 0x9, '\x00', r16, 0x1, r17, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r13, 0x4, &(0x7f0000002580)=[r18, r9, r12, r12], &(0x7f00000025c0)=[{0x3, 0x5, 0x7, 0x9}, {0x5, 0x2, 0xf, 0xa}, {0x3, 0x2, 0x3, 0x8}, {0x2, 0x2, 0xb, 0x6}], 0x10, 0xe}, 0x90) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000026c0)) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000029c0)={r13, 0xe0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000002740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xba, &(0x7f00000027c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002800), &(0x7f0000002840), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002880)}}, 0x10) 4.552184476s ago: executing program 0 (id=8437): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c6a6700020006aa"], 0xfdef) (async) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) (rerun: 32) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x15, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000100008500000082000000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000280)='host1x_channel_submitted\x00', r1}, 0x10) (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)) (async) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r1, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x9a, &(0x7f0000000540)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe7, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) (async, rerun: 32) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r11) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (rerun: 64) sendmsg$tipc(r9, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000780)="9e5f8ab765f303c84966c692d7546e3b4ecd2d2560062f10216f31be580e78d87f7023974e4cd5", 0x27}, {&(0x7f00000007c0)="bd4055cf0538050b521769d798edaadaf04c25681e072cf531e9bf9a5f26ec45c67957ac2a5ec1b7474c149b0178375daa1fd8515858e4057c403b1fcf3dd3c14fe1bf3bffa770502823bba441a489a3367181916ccd3da606f453276a5fc8bd023169a5f4a3612b766d16af627ca558b29d577c37acf8f7c53f0fca7daa7ab761d6e1129a42f270f4c71c0f44035d933c65cd1da47c5e32f7ad77e707ab0f09ce48cc524c78c12aef357a48acf5fdecce3208480f8a", 0xb6}, {&(0x7f0000000880)="9fe9d91f584cdd57b752464f7c77198b8050971828b7db8ea52d3892dd0f77ed13fbb318b55ec1dcc62a6b471938cc772cf80ef9c104a9447e4de0ae9edd94debab5f7e1e99eb1b248b5a50e07f3e48a16e48b6cc030fc09a0f03fa38f6589125fb336af6197605c5f4e761db97c0e5a101d58fcddf7", 0x76}], 0x3, &(0x7f0000000a40)="65ddd75e599fd197d0ea7644444af9ca445220a243fa7ac3abf55e1216761c2d981631e66bafb705968295dfc0b224aab65e3f6cb06873d6e252588eef2c910d3311b416d98eb81795b585ae5aa0bad33c399e7b7868d235165638c96536d52ddba2314deddc709454bf1be9cf5afdb3eb84999e0a7f71a0f201554febb14093eceeb5d2367d41b8e7d8ef1d67374a4f0a2ccf5b6d6ce8be02798e9269fcee3f82dd99696485082bb10ca4618ff3af15f3c47873e01fd845c5d29d0e8621c8494e78bf138221f29775ec4f4439bb4236946b9ba54e85", 0xd6, 0x4000080}, 0x20004040) (async, rerun: 32) ioctl$SIOCSIFHWADDR(r11, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async, rerun: 32) close(r8) 4.551535696s ago: executing program 1 (id=8438): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000f80)="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", &(0x7f0000000300)=""/152}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x58, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000003c0), &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x61, &(0x7f00000003c0)=[{}, {}], 0x48, 0x10, &(0x7f00000008c0), &(0x7f00000007c0), 0x8, 0x1f, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) sendmsg$inet(r2, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000500)="e86b43346691cd3f34c67795273c51cf871d53de0b4a077e7a3c47e65afd5a9eb690f92573d59d03152d4e43e405e91b3f8f30dc6002ec961c98c25f956b6e94ba0bca11bbdbae729b3663a787e89005d1ed753437842e29047ec1dbf62ba9511c0841156e09b8df954def2bf7049177a17e3490dec3dca9aa5c88ece073ef7cd40d67dfc7cdc084283c462ccf83e70929f14669d9635225e0", 0x99}, {&(0x7f00000005c0)="2daea18b52b7932ca00469a06f6236681f72875c300ec7dca366d3e2ec877e9614dc66384f15f25682ee6939b82345a48bccfa92f7dfb0c8d67cb030240abc68e68b91c48c018903892894b7f7c0d936f6d72f4ff32f38901b854b81294b9679624cd202a52fabb22c8e2fb859ac53b0b5cc1ec7894d58fed932c3128a2435a0ca075085dbefa3c027696cc0ea974d1d8251d0ed4c2e11777f5dafd9bfee6f9ec68e28b082", 0xa5}, {&(0x7f0000000680)="9c4c1f3b41d2c952bca5460f0b6335e899c91e8f8bcdc6423dc5e543216d9625a80e4493c5b1016d20cc6b79b790515528bc9fe025e12c65db2f7e515f8bc70ac5f02e142758d9fb328ded82279046df48c266cc752cdc0c4115849359aa7c67f8c7e50002f7f6a5fb13f851806c676f7d7412e3fa29d0a1f0c0eabac0cb555a0fa1ce6be06d6fe0ae56b1c0b45926a5a7e822c7e5cc0cc70fe8e94e7813b0377a9816db4e4dfc1216cdd61e717b2d", 0xaf}], 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="1100000000000000000000000100000001000000000000001100000000000000000000000100000002000000000000004426405d1fc11b23b50000000700000001891be5ffffffffac14143964010101ffffffffac1414bb64010100831753ac1414bbe000000264050b000a01010264010100000000000014000000000000000000000001000000f7ffffff000000001c000000000000000000000008000000", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="7f000001e000000200000000"], 0x1c0}, 0x4010) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 4.549928866s ago: executing program 2 (id=8439): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8174f095f664b01000000000000000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r1, @ANYRESOCT=r1, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000001800000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000009800000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0xe, 0x0, &(0x7f0000000300)="14fd54ab72df97e6256c00000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000006fc6201a0000b8bd75c50000950000000000002300000000000001c42eb8a3bc41"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.net/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0xfc7d, 0x0, 0x0, &(0x7f0000000080)}, 0x40010100) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="df00119e33697c68fcf7010000000000953e75b720000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r8}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r9, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 4.544580947s ago: executing program 3 (id=8440): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, 0x0}, 0x20) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r0, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001780), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002900)={r1, 0x20, &(0x7f00000028c0)={&(0x7f00000017c0)=""/195, 0xc3, 0x0, &(0x7f00000018c0)=""/4096, 0x1000}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000029c0)={0x1a, 0x7, &(0x7f0000002940)=ANY=[@ANYBLOB="180000001f000000000000000700000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000185700000e000000000000000000000095000000000003009d5e"], &(0x7f0000000740)='syzkaller\x00', 0x40, 0x1000, &(0x7f0000000780)=""/4096, 0x41000, 0x28, '\x00', r2, 0x7, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000002a80)=[{0x4, 0x1, 0xd, 0xa}, {0x0, 0x5, 0x8, 0x2}, {0x0, 0x3, 0x1, 0xa}, {0x2, 0x2, 0x7, 0x7}, {0x3, 0x4, 0x0, 0xa}, {0x5, 0x2, 0xc, 0x2}, {0x3, 0x3, 0x0, 0x1}], 0x10, 0x8001}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r5, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r8) 4.459991714s ago: executing program 3 (id=8441): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0xffff, 0x2009, 0x14}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(0xffffffffffffffff) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000280)=r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x11, 0x1}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x11, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYRESDEC=r7, @ANYBLOB="18000000000000e96737000000000000000018"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x79ecfac6bea06dca}, 0xfffffffffffffed3) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2f, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r8}, &(0x7f00000005c0), &(0x7f0000000600)='%pI4 \x00'}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) 4.424626117s ago: executing program 0 (id=8442): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xd34d, 0x6, 0x9, 0x3040, r4, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xd34d, 0x6, 0x9, 0x3040, r4, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x4}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000000000000000010000009500"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x8}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x8}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 4.38282111s ago: executing program 1 (id=8443): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000001801b78c3dbd2d28ac1704347aa0e40000786c6c2500000000002020200029ad8bc4f1e4fd1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703ecff"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r2}, &(0x7f00000004c0), &(0x7f00000003c0)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x5d) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb", 0x1}], 0x1}, 0x0) recvmsg(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r7}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r8}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) 4.340481723s ago: executing program 4 (id=8293): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x84, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe, 0x4, 0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000100)=""/2, 0x5b, 0x2, 0x1, 0x7fffffff}, 0x20) syz_clone(0x800000, &(0x7f0000000180)="7e09d1d7cd7ec42c20e687cb12eb6bc7fc06bb5c7997a116428e40d7051e1b0ee2851c8e2c5b8555d7f091ff1827be5fe068956fa5d97ff779bc085145c23709a0490c1d8b77c60a44a6ee930c2fa9208192dee029639a5c77165b1ebf3c2348f3180ad68a778827445fc34e9f896008ed60256c618f8643f04b0c42458589cb60aa339fa24bac4e3a195dafb591679640e4e1055c5910c64455b56208c7a2a2d37c98738cbf707b526f5ed9ecec3b2fe87dd51c1ba97d36693d57bd3f7723093003c11049fa346a42f34bffba9505be80697fa133d5e3", 0xd7, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="1443836f8842a44307a35db04ab5c58b82cb10e9206824f028e7cf8f00c2438ee85752ed5ef6347f0098d3d423e7823411c96cd35db3a7d3629ba6ccdd208a184b2d4364d25246bc6402947415c5366e733e5b8412b490cf19c01d3f1a0b9cf5d5") r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0xfe, 0x3, 0xd9, 0x0, 0x3, 0x30000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xb}, 0x400, 0x9, 0xe1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0xea, 0x5, 0x27, 0xa, 0x0, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000400), 0x8}, 0x80, 0x400000000, 0x0, 0x0, 0x1, 0xe, 0x6, 0x0, 0x5, 0x0, 0xffffffffffff8001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@cgroup=0xffffffffffffffff, 0x2e, 0x1, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={@cgroup=r3, r4, 0x14, 0x20, 0x0, @prog_fd=r5, r7}, 0x20) openat$cgroup_procs(r6, &(0x7f0000000740)='tasks\x00', 0x2, 0x0) (async, rerun: 32) r8 = openat$cgroup_type(r6, &(0x7f0000000780), 0x2, 0x0) (rerun: 32) write$cgroup_type(r8, &(0x7f00000007c0), 0x9) (async) r9 = openat$cgroup_ro(r3, &(0x7f0000000800)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000840)=r9, 0x4) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000ac0)={&(0x7f0000000880)="f7743a822d6d6bc564386c3abaea98de2ad0a568b8124ca76a427123c24092bdcfe343dd15fa77d3abe5539bce4461227e740cb075339f7a64bed9c71f0730e5bc21c35c2a13926f7d2b908c29d409e4de00290c09ef2f49", &(0x7f0000000900)=""/121, &(0x7f0000000980)="ad4e102c07e238c073737726ac4e99afeb46f6e61636a9149ac227e05898830dd26e2010b08397025630ed4fda8ecd199264f8eb07105324e2fe5831df026c35d36af1faca7415bd0d481aeb5600661d430596acceecf32270ee23a60668e6d1c162c2e909c6a3f9ff48e9dfcb70a48e3289b803918262458f0bbca693a612c2553d86792a6d9abeb54c3d2a677819053591f5cd29bfcfe3cd5e2da527f0957a04155f00a4ea4a49597f3a37a4ea454be62d8a155fad90a9a48dcc7d72d9f0d0775c", &(0x7f0000000a80)="1e9d8d232b2ea4ecae3adbf843", 0x7f, r9}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r9, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e80)={r9, 0x20, &(0x7f0000001e40)={&(0x7f0000000d40)=""/208, 0xd0, 0x0, &(0x7f0000000e40)=""/4096, 0x1000}}, 0x10) (async, rerun: 64) r12 = openat$cgroup_ro(r3, &(0x7f0000001ec0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x14, 0x12, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x3, 0x0, 0x0, 0x4, 0x1, 0x20, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1f0e29a3}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7b9b}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xb}]}, 0x0, 0x3, 0x43, &(0x7f0000000bc0)=""/67, 0x41100, 0x20, '\x00', r10, 0xb, r9, 0x8, &(0x7f0000000d00)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r11, r4, 0x6, &(0x7f0000001f00)=[r9, r9, r0, r12], &(0x7f0000001f40)=[{0x4, 0x4, 0xd, 0x2}, {0x5, 0x4, 0x3, 0x6}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0xe}, {0x0, 0x2, 0x8, 0xc}, {0x2, 0x4, 0xd, 0x7}], 0x10, 0x93}, 0x90) write$cgroup_freezer_state(r9, &(0x7f0000002080)='THAWED\x00', 0x7) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r0, 0xffffffffffffffff}, &(0x7f00000020c0), &(0x7f0000002100)=r13}, 0x20) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r12, 0xffffffffffffffff}, &(0x7f0000002180), &(0x7f00000021c0)=r12}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000024c0)={r0, 0x58, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002500)=r11, 0x4) (async) r18 = bpf$ITER_CREATE(0x21, &(0x7f0000002540)={r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x17, 0x30, &(0x7f0000002240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}}, @map_val={0x18, 0x9, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @generic={0x1d, 0x8, 0x9, 0xa9, 0x8}, @exit, @call={0x85, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x0, 0x6, 0x2, 0x5, 0x8, 0x4}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000023c0)='syzkaller\x00', 0x0, 0x21, &(0x7f0000002400)=""/33, 0x0, 0x9, '\x00', r16, 0x1, r17, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r13, 0x4, &(0x7f0000002580)=[r18, r9, r12, r12], &(0x7f00000025c0)=[{0x3, 0x5, 0x7, 0x9}, {0x5, 0x2, 0xf, 0xa}, {0x3, 0x2, 0x3, 0x8}, {0x2, 0x2, 0xb, 0x6}], 0x10, 0xe}, 0x90) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000026c0)) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000029c0)={r13, 0xe0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000002740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xba, &(0x7f00000027c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002800), &(0x7f0000002840), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002880)}}, 0x10) 2.340513278s ago: executing program 0 (id=8444): r0 = syz_clone(0x42000000, &(0x7f0000000080)="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", 0x1000, &(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)="c28188209c627444b8") r1 = perf_event_open$cgroup(&(0x7f0000001140)={0x4, 0x80, 0x3, 0x5, 0x7, 0x24, 0x0, 0xffffffffffff7fff, 0x30, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5e0, 0x0, @perf_config_ext={0x6, 0x7}, 0xc05, 0xfffffffffffffffc, 0x3, 0x9, 0xff, 0x5, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x4) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x5, 0x4, 0x9, 0x0, 0x695, 0x4080, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x5}, 0x2070, 0x2, 0x2, 0x0, 0xf, 0x2, 0x200, 0x0, 0x2, 0x0, 0x4}, r0, 0x6, r1, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003300)={&(0x7f0000002240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x84, 0x84, 0x3, [@typedef={0x1, 0x0, 0x0, 0x8, 0x4}, @fwd={0x10}, @ptr={0x5, 0x0, 0x0, 0x2, 0x2}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x3e, 0x0, 0x3c, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0xd}}, @var={0x9, 0x0, 0x0, 0xe, 0x1}, @enum={0xc, 0x2, 0x0, 0x6, 0x4, [{0xe, 0x95c}, {0x9, 0x4}]}, @fwd={0x3}]}, {0x0, [0x5f]}}, &(0x7f0000002300)=""/4096, 0x9f, 0x1000, 0x0, 0x100}, 0x20) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000003400)=@o_path={&(0x7f00000033c0)='./file0\x00', 0x0, 0x10, r2}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000003500)={0xf, 0x5, &(0x7f00000011c0)=@raw=[@map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xd}, @ldst={0x3, 0x3, 0x6, 0x6, 0x4, 0x100}], &(0x7f0000001200)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000001240)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x2e, r3, 0x8, &(0x7f0000003340)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000003380)={0x1, 0xd, 0x8001, 0x7}, 0x10, 0x0, r4, 0x6, &(0x7f0000003440), &(0x7f0000003480)=[{0x0, 0x2, 0x5, 0x5}, {0x2, 0x4, 0xb, 0x3}, {0x0, 0x4, 0xa, 0x9}, {0x4, 0x4, 0x9, 0x4}, {0x5, 0x3, 0x3, 0x9}, {0x3, 0x4, 0x9, 0xb}], 0x10, 0x6}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000035c0), 0x400, 0x0) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f0000003680)={0x9, &(0x7f0000003600)=[{0xa, 0x2, 0x5, 0x7fff}, {0x1, 0x5, 0x6, 0xfffffffb}, {0x5, 0x3c, 0x9, 0x3}, {0x7, 0xc8, 0x71, 0xffff}, {0x1, 0x7, 0x6, 0x800}, {0xc3, 0x2, 0x3, 0x1}, {0x40, 0x40, 0xb}, {0x10, 0x9, 0x64, 0x8ee}, {0x7, 0x5, 0x6, 0x1}]}) r7 = perf_event_open$cgroup(&(0x7f0000003700)={0x0, 0x80, 0x9, 0x9, 0x1c, 0x4, 0x0, 0xb, 0x4, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9e5c, 0x4, @perf_bp={&(0x7f00000036c0), 0x9}, 0x88, 0xff, 0x8, 0x8, 0x401, 0x6, 0x40, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x2, r1, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r7) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000003780)={'macsec0\x00', 0x1000}) getpid() r8 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000037c0), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000003800)={[{0x2b, 'net'}, {0x2d, 'cpuacct'}, {0x2b, 'freezer'}, {0x2b, 'cpuset'}, {0x2b, 'net_prio'}, {0x2b, 'perf_event'}, {0x2d, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'net_prio'}]}, 0x4b) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003880)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r9, &(0x7f00000038c0)='syz1\x00', 0x1ff) r10 = openat$cgroup_int(r9, &(0x7f0000003900)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000003980)=@generic={&(0x7f0000003940)='./file0\x00', 0x0, 0x18}, 0x18) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000039c0)={0x1b, 0x0, 0x0, 0xf5c6, 0x0, r11, 0x3, '\x00', 0x0, r3, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003f00)={r5, 0xe0, &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000003c40)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000003c80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000003cc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd0, &(0x7f0000003d00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000003d40), &(0x7f0000003d80), 0x8, 0xa1, 0x8, 0x8, &(0x7f0000003dc0)}}, 0x10) r15 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000004000)={0x6, 0x12, &(0x7f0000003a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@map_idx_val={0x18, 0x8, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @alu={0x7, 0x1, 0x8, 0x3, 0x6, 0xffffffffffffffff, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000003b00)='syzkaller\x00', 0x4d0c, 0xe6, &(0x7f0000003b40)=""/230, 0x40f00, 0x0, '\x00', r13, 0x25, r3, 0x8, &(0x7f0000003f40)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000003f80)={0x4, 0x3, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000003fc0)=[r11]}, 0x90) mkdirat$cgroup(r9, &(0x7f00000040c0)='syz0\x00', 0x1ff) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000004100)={0x2, 0x4, 0x8, 0x1, 0x80, r11, 0x0, '\x00', r13, r6, 0x4, 0x5, 0x5}, 0x48) r17 = bpf$PROG_LOAD(0x5, &(0x7f00000043c0)={0x11, 0x1a, &(0x7f0000004180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xf}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@map_val={0x18, 0xb, 0x2, 0x0, r16, 0x0, 0x0, 0x0, 0x4}, @alu={0x4, 0x1, 0x9, 0x8, 0x6, 0x30, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8001}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @map_val={0x18, 0x7, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0xffffffff}, @ldst={0x3, 0x3, 0x3, 0xa, 0x5, 0x80, 0x8}, @generic={0x4, 0x3, 0x2, 0xfc82, 0x400}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000004280)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x42, '\x00', r13, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000042c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, r14, r15, 0x5, &(0x7f0000004300)=[r11, r11, 0x1], &(0x7f0000004340)=[{0x0, 0x2, 0x4, 0x1}, {0x3, 0x3, 0xd, 0x4}, {0x0, 0x2, 0x7, 0x4}, {0x3, 0x4, 0x4, 0x8}, {0x2, 0x4, 0xb, 0x7}], 0x10, 0xfffffeff}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000004580)={@map=r12, 0x2f, 0x0, 0x7, &(0x7f0000004480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f00000044c0)=[0x0, 0x0], &(0x7f0000004500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000004540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000045c0)={@map=r11, r17, 0x34, 0x10, 0x0, @prog_fd=r15, r18}, 0x20) socketpair(0x2, 0x1, 0x11, &(0x7f0000004600)={0xffffffffffffffff}) sendmsg$inet(r19, &(0x7f0000006b80)={&(0x7f0000004640)={0x2, 0x4e21, @rand_addr=0x64010102}, 0x10, &(0x7f0000006a40)=[{&(0x7f0000004680)="f5224068f63a8504f1fc9a23cc93f2e07444c899f92fe55afe6ed8a9b345bd53b52ce88615d2b4e7b9fb41464a0102641d7cdea7ffa1e09df3473c155211a00b5e7bfb90ad6c8c2e88190842447ae636cfe92fc9bb2aa559c4eff775451d3d0eb150d82d", 0x64}, {&(0x7f0000004700)="fa6c41d08c53869733174d52cf49286ad4d2717dc47bcd4900e1050b0df96b3152002240028874003d31d4427da767c259c52ff235af78f4d3a07b64621f783d0ebbf4059e91debfb1f297240b777586d34ffae7c30a1be707b6df6e545be36e7dbdf685ceee42afa8d32eb29fb645411500719cc8395ad84acc8682e39f48ebacf982c1ba", 0x85}, {&(0x7f00000047c0)="c9e3a60a0a6cd93f78de01907b28565a509fd1ab62609e140794084ce48adceaaa6a00048457b0c9ecf8f1566b979b2a520e24d97d0d1a4c9d8a5a35dbbfd39c30bb4ba574a12fba4367f12c2eafc58a8d794f19b36b184a6eaafb5e2f247b265a27a13886c18149997c2600a79ef822a521fa7d1bd1b49a53473dbe3662667b51", 0x81}, {&(0x7f0000004880)="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", 0x1000}, {&(0x7f0000005880)="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", 0xfa}, {&(0x7f0000005980)="30d8b56f1d8baccc034099f6fa6f8885e8e0b950be875dd8b871b205d2cae856b6ad5ccbb904ce6999da90efc400629016af2086c30dfca09cbe1c7f788c6faaa510b6c711b59fc1eaec499a4a25c7dd28ac71f3038f26c54fb2a3737fa4105d79e0c0f8c9e28f0ba87001345fd13f2bd43399c719460b5b3bcbab3d5c1aedf80720ce92833a17632a7c0563dc320395faedd84d47d92c93407094e06dbfddc3dbdfb4ac56f8b90c95f42797d7a458f513", 0xb1}, {&(0x7f0000005a40)="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", 0x1000}], 0x7, &(0x7f0000006ac0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @dev={0xac, 0x14, 0x14, 0x43}, @loopback}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @multicast1, @multicast1}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @empty, @empty}}}], 0x90}, 0x20008010) r20 = perf_event_open(&(0x7f0000006bc0)={0x4, 0x80, 0xf, 0xa3, 0x0, 0x9, 0x0, 0x0, 0x20000, 0xe, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_config_ext={0xffffffffffffffff, 0x8c7}, 0x400, 0xb, 0x31, 0x0, 0x7fffffff, 0x101, 0x1, 0x0, 0x8, 0x0, 0x9}, r0, 0xe, r10, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r20, 0x40082404, &(0x7f0000006c40)=0x97a) 2.339870658s ago: executing program 1 (id=8445): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000001f002000001811006a168ada00", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000980)={{r0, 0xffffffffffffffff}, &(0x7f0000000900), &(0x7f0000000940)='%+9llu \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRES16=r0], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, r2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001b40)={0x6, 0x1c, &(0x7f0000001c00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000018480000fcffffff00000000000000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x7ff, 0x1000, &(0x7f0000000b40)=""/4096, 0x41000, 0x21, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000600)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0x2, 0x3, 0xffffff01}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000a40)=[0xffffffffffffffff, r1, r0, r2, r4, r0, r0], &(0x7f0000000a80)=[{0x0, 0x2, 0x4, 0xc}, {0x3, 0x3, 0x5, 0x3}, {0x0, 0x2, 0x3, 0x3}, {0x4, 0x5, 0x5, 0x2}], 0x10, 0x611}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r7, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={r0, 0x58, &(0x7f0000000540)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000002040)=ANY=[@ANYRESHEX=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000400)=ANY=[@ANYRESOCT=r5], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='ext4_ext_convert_to_initialized_enter\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1888b3000000000000009500000000c702869d5a5239a4a5676fb7000000000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000340)='module_request\x00', r8}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) 2.338574518s ago: executing program 2 (id=8446): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x4, 0x4, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x1a, &(0x7f0000000000)=ANY=[@ANYRES16=r0, @ANYRES32=r0, @ANYRESHEX=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x42}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xdb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2531}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000180)=r6, 0x4) sendmsg$unix(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="8fcacb7907051175f37538e486dd"], 0xfdef) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='percpu_alloc_percpu\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8}, 0x48) r9 = syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0xc, 0x2, 0x4, 0xd, 0x0, 0x520, 0xc000, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000500), 0x4}, 0x2000, 0xfffffffffffffff9, 0x4096, 0x0, 0x7, 0xff, 0xa3cd, 0x0, 0x9, 0x0, 0x1}, r9, 0x1, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.336296498s ago: executing program 3 (id=8447): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5}, 0x48) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x13, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES8=r2, @ANYRESOCT=r1, @ANYBLOB="eaa57d88e97f729e9a5ba623e7f01d0190a1ab94824a7cf8f01e6159a9d54a1d3f840dcba0a9f6b72b2a4289b896d72ceeeaea16", @ANYRESHEX, @ANYRESOCT=r4, @ANYRES8=r3, @ANYRESOCT, @ANYRESOCT, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x3, 0x4, 0x0, r5, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)={0x1b, 0x0, 0x0, 0x6, 0x0, r3, 0x1, '\x00', 0x0, r7, 0x4, 0x2, 0x1}, 0x48) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, 0x0, 0x0) close(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETVNETLE(r11, 0x800454dd, &(0x7f0000000300)) 2.264616204s ago: executing program 2 (id=8448): bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0xfe3d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_request_inode\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000280)="55f4879b9a83a5bc30289fda9f17d4bcaac0de31b74332425fecd99323ca16564725204b1c6ef2e84f64304b03e9ca4590feecf70742c9c3b09082d8d3953a978ac0d138c0a68d1191610c79b42bda8d25e299fd5138de606db250d11a8d", &(0x7f00000005c0)=""/115}, 0x20) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xa}, 0x6423}, 0x0, 0xaffffffdfffffffd, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe4, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ad00000000008510000002000000850100008000000000000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@bloom_filter={0x1e, 0x7, 0x0, 0x10000, 0x1, 0xffffffffffffffff, 0x3, '\x00', 0x0, r4, 0x0, 0x8001, 0x3, 0x8}, 0x48) openat$cgroup_type(r3, &(0x7f0000000500), 0x2, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014001100b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x2d) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000900)='blkio.throttle.io_service_bytes_recursive\x00', 0x100002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x11, 0x4, 0x4, 0x5}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r7, &(0x7f0000000040), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.223195047s ago: executing program 2 (id=8449): bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x1, 0xa, 0x8}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000}, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe8, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f086dd47e0ffff00120600631177fbac141416e000030a44079f03fec0000000000000000000000000002e01050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3ac", 0x0, 0xfe, 0x60000000}, 0x50) perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0, 0xe}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x2000, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x3fe, 0x9, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x12, 0x4, &(0x7f0000000640)=ANY=[@ANYBLOB="18fb306b5b520f38877933e75e4133f2e7911f32cbdbf033beeca6b12e0efa79676fc24c2a3e09d59200"/66], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x79) close(0xffffffffffffffff) syz_open_procfs$namespace(0x0, &(0x7f0000000a40)='ns/uts\x00') perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 2.210456058s ago: executing program 4 (id=8293): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x84, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe, 0x4, 0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000100)=""/2, 0x5b, 0x2, 0x1, 0x7fffffff}, 0x20) syz_clone(0x800000, &(0x7f0000000180)="7e09d1d7cd7ec42c20e687cb12eb6bc7fc06bb5c7997a116428e40d7051e1b0ee2851c8e2c5b8555d7f091ff1827be5fe068956fa5d97ff779bc085145c23709a0490c1d8b77c60a44a6ee930c2fa9208192dee029639a5c77165b1ebf3c2348f3180ad68a778827445fc34e9f896008ed60256c618f8643f04b0c42458589cb60aa339fa24bac4e3a195dafb591679640e4e1055c5910c64455b56208c7a2a2d37c98738cbf707b526f5ed9ecec3b2fe87dd51c1ba97d36693d57bd3f7723093003c11049fa346a42f34bffba9505be80697fa133d5e3", 0xd7, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="1443836f8842a44307a35db04ab5c58b82cb10e9206824f028e7cf8f00c2438ee85752ed5ef6347f0098d3d423e7823411c96cd35db3a7d3629ba6ccdd208a184b2d4364d25246bc6402947415c5366e733e5b8412b490cf19c01d3f1a0b9cf5d5") r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0xfe, 0x3, 0xd9, 0x0, 0x3, 0x30000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xb}, 0x400, 0x9, 0xe1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0xea, 0x5, 0x27, 0xa, 0x0, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000400), 0x8}, 0x80, 0x400000000, 0x0, 0x0, 0x1, 0xe, 0x6, 0x0, 0x5, 0x0, 0xffffffffffff8001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@cgroup=0xffffffffffffffff, 0x2e, 0x1, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={@cgroup=r3, r4, 0x14, 0x20, 0x0, @prog_fd=r5, r7}, 0x20) openat$cgroup_procs(r6, &(0x7f0000000740)='tasks\x00', 0x2, 0x0) (async, rerun: 32) r8 = openat$cgroup_type(r6, &(0x7f0000000780), 0x2, 0x0) (rerun: 32) write$cgroup_type(r8, &(0x7f00000007c0), 0x9) (async) r9 = openat$cgroup_ro(r3, &(0x7f0000000800)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000840)=r9, 0x4) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000ac0)={&(0x7f0000000880)="f7743a822d6d6bc564386c3abaea98de2ad0a568b8124ca76a427123c24092bdcfe343dd15fa77d3abe5539bce4461227e740cb075339f7a64bed9c71f0730e5bc21c35c2a13926f7d2b908c29d409e4de00290c09ef2f49", &(0x7f0000000900)=""/121, &(0x7f0000000980)="ad4e102c07e238c073737726ac4e99afeb46f6e61636a9149ac227e05898830dd26e2010b08397025630ed4fda8ecd199264f8eb07105324e2fe5831df026c35d36af1faca7415bd0d481aeb5600661d430596acceecf32270ee23a60668e6d1c162c2e909c6a3f9ff48e9dfcb70a48e3289b803918262458f0bbca693a612c2553d86792a6d9abeb54c3d2a677819053591f5cd29bfcfe3cd5e2da527f0957a04155f00a4ea4a49597f3a37a4ea454be62d8a155fad90a9a48dcc7d72d9f0d0775c", &(0x7f0000000a80)="1e9d8d232b2ea4ecae3adbf843", 0x7f, r9}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r9, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e80)={r9, 0x20, &(0x7f0000001e40)={&(0x7f0000000d40)=""/208, 0xd0, 0x0, &(0x7f0000000e40)=""/4096, 0x1000}}, 0x10) (async, rerun: 64) r12 = openat$cgroup_ro(r3, &(0x7f0000001ec0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x14, 0x12, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x3, 0x0, 0x0, 0x4, 0x1, 0x20, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1f0e29a3}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7b9b}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xb}]}, 0x0, 0x3, 0x43, &(0x7f0000000bc0)=""/67, 0x41100, 0x20, '\x00', r10, 0xb, r9, 0x8, &(0x7f0000000d00)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r11, r4, 0x6, &(0x7f0000001f00)=[r9, r9, r0, r12], &(0x7f0000001f40)=[{0x4, 0x4, 0xd, 0x2}, {0x5, 0x4, 0x3, 0x6}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0xe}, {0x0, 0x2, 0x8, 0xc}, {0x2, 0x4, 0xd, 0x7}], 0x10, 0x93}, 0x90) write$cgroup_freezer_state(r9, &(0x7f0000002080)='THAWED\x00', 0x7) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r0, 0xffffffffffffffff}, &(0x7f00000020c0), &(0x7f0000002100)=r13}, 0x20) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r12, 0xffffffffffffffff}, &(0x7f0000002180), &(0x7f00000021c0)=r12}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000024c0)={r0, 0x58, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002500)=r11, 0x4) (async) r18 = bpf$ITER_CREATE(0x21, &(0x7f0000002540)={r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x17, 0x30, &(0x7f0000002240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}}, @map_val={0x18, 0x9, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @generic={0x1d, 0x8, 0x9, 0xa9, 0x8}, @exit, @call={0x85, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x0, 0x6, 0x2, 0x5, 0x8, 0x4}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000023c0)='syzkaller\x00', 0x0, 0x21, &(0x7f0000002400)=""/33, 0x0, 0x9, '\x00', r16, 0x1, r17, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r13, 0x4, &(0x7f0000002580)=[r18, r9, r12, r12], &(0x7f00000025c0)=[{0x3, 0x5, 0x7, 0x9}, {0x5, 0x2, 0xf, 0xa}, {0x3, 0x2, 0x3, 0x8}, {0x2, 0x2, 0xb, 0x6}], 0x10, 0xe}, 0x90) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000026c0)) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000029c0)={r13, 0xe0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000002740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xba, &(0x7f00000027c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002800), &(0x7f0000002840), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002880)}}, 0x10) 120.76375ms ago: executing program 0 (id=8450): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x0, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='ext4_es_find_extent_range_enter\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40001) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYBLOB='-rLimit +net '], 0xd) (async) write$cgroup_subtree(r5, &(0x7f0000000180)=ANY=[@ANYBLOB='-rLimit +net '], 0xd) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0xb11000, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r6, 0x400454c9, 0x3) ioctl$TUNSETOFFLOAD(r6, 0x400454dc, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00', r3}, 0x10) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) (async) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000002600)=ANY=[@ANYRES32=r2], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) r7 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xd6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x8040, 0xcb, 0x0, 0x5, 0x0, 0x0, 0x802}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 119.56904ms ago: executing program 1 (id=8451): socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffe5b702000008"], &(0x7f00000005c0)='syzkaller\x00', 0x7}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x8, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="000000000000000018200000", @ANYRES32, @ANYBLOB="000000feffffffffffffff00fcffff51"], 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89f1, &(0x7f0000000900)={'macvlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1e}}) 117.83717ms ago: executing program 2 (id=8452): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x203, 0x41020, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000940), 0xc}, 0x0, 0x0, 0xfffffffc, 0xf, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'dvmrp0\x00', @remote}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[], 0x0, 0x38, 0x36}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f00000003c0)=ANY=[@ANYRES64=r0], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a07, 0x1700) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYBLOB="a2d0b72fbfcc10fdf2e3a72223193d860f1edcfb4c2b35f9c9ab8c4cfa8aff5fed7e2b1206359c4812b7f62f676c5ee262ee5ff3c383272bda5a0697963e85d183306a538eb48548ea5f2e5ac1ff4199d6a3071b983610a83583cec00790f0c314041577e820480691c02378098aab92565b863c8a26e4085545c09e793a3d8af12f26c924c348ce90967598b6a23441959d", @ANYRESHEX=r0], &(0x7f0000000340)='GPL\x00', 0x42}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r7, 0xffff0000, 0xb00, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea49da2aa", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000008c0), 0x694501, 0x0) 117.05826ms ago: executing program 3 (id=8453): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x2, 0x2, 0xa, &(0x7f0000000000)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) perf_event_open(&(0x7f0000000ac0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000ac0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x100005, 0xb, 0x0, 0xffffffffffffffff, 0xfffffefd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x100005, 0xb, 0x0, 0xffffffffffffffff, 0xfffffefd, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x100000}, 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0xffffff75, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x100000000}, 0x403}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1000000, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x1000000, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) close(r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000facab2b3c1938ae60000009500000000000000cd923f6b3832484db52fe59c19ce63208f53f5be823ca58991bf927fb50e5c383aad0ca665508d93a2a05f2c65458125f00bdf888348e13c83499858c6ddfa7b252906181a1ca2e81c25fb33"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, &(0x7f0000000380)=""/207, 0x2f, 0xcf}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, &(0x7f0000000380)=""/207, 0x2f, 0xcf}, 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) 88.880112ms ago: executing program 0 (id=8454): bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) (async) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff], &(0x7f0000000580)}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x6, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0xffffffff, 0x1000}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7e}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x8, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) recvmsg$unix(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000001600)=""/18, 0x12}], 0x1, &(0x7f0000001880)}, 0x0) 85.219653ms ago: executing program 1 (id=8455): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x40000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000780)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) 4.173289ms ago: executing program 2 (id=8456): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='freezer.state\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r4 = getpid() sendmsg$unix(r1, &(0x7f0000002040)={&(0x7f0000001c40)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001f80)=[{&(0x7f00000000c0)="b4efe9c9015189ad6a05becc5f7e90bb7ab246835cb04b5f7e192d8dc80668e1f3f9c7", 0x23}, {&(0x7f0000001cc0)="6eb05f523774c891d815c3a798fd1c07640290cb61e5ca81b3cb494cc0aaf600ce8d0a771cf5004f39593df6e049194c3091a352c1514b760bbea51d02334437b31deb3bcbc36cb35783d35235908154ef366d93f3e9e80098d3dcb58783ed751bec3b059c952ba37b6a2a859c2f3bd835232a084913c1dcddd188a25b023be091455fe9897a4e5c6a2c11fda8154d8669f69cecb11911b7189e6c1e60643cab984553c152d0ae5a52c6e423f0a0370058992a5d19ed916d12fac081052655728f1f0457487a44de3a33d30f5aa96f372ff46ab7143cfec1d3348169", 0xdc}, {&(0x7f0000001dc0)="e628c8bf3ea881c2679390374a08e22f60243754574c91348c729455db65bf2744f745d25c23f8cd900fb31545132af5b2c71ff30d4b79317b5e2f5b9c4fe20ee00c3def3de752210e6dc7e9c7d6e247e54f428637f9cb96d16c53af74a9aad4279a93bd631637472a34b07c27e910ce9fee023c55543d4892aaf173d9ae0ba56b5ca68dcb45d12ab4a7d4bbcda846e2e2f31456d4224383b08a9b4b65eab801dc36650750137f7781eae45a85c11d18391851698b019ba14c3e81fd744d405fd55fb6e26af1423f08e0b844bf9a54163028d13cf1e77591ce38b1a238dc76cbd5628287f9e7ea223b774e4bc1a8cb51", 0xf0}, {&(0x7f0000001ec0)="21144773dec5f3289645293e5cf362e7195481f09745c037c9768649bfb2bbdf77a5e85bd604ad0cec145db30b136075cc9c1366fe38fb6fc36706d806906e66bddbea753e5c5fc6d1d7ad94d06b60c78915f4dc3888e6bae88704458a6129414fa3133018203222b7d390d833d092ba474404594a268de606", 0x79}, {&(0x7f0000001f40)="5b1f8618ac", 0x5}], 0x5, &(0x7f0000002000)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee00}}}], 0x20, 0x20004010}, 0x4c044) perf_event_open$cgroup(&(0x7f0000000280)={0x3, 0x80, 0x4, 0x40, 0x81, 0x80, 0x0, 0x20, 0x45100, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x40, 0x20000000000, 0x81, 0x3, 0xa80f, 0xffffffff, 0x9, 0x0, 0x5, 0x0, 0x7fffffff}, r3, 0x4, r2, 0xd) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r3, 0x58, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000940)={0xfff, 0x0}, 0x8) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000019c0)=@base={0xe, 0x0, 0xffffffff, 0x6, 0x812, r1, 0xfffffff7, '\x00', 0x0, r1, 0x3, 0x3, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x7, 0x22, &(0x7f0000001880)=ANY=[@ANYBLOB="180000000180ffff000000006c0700001840000003000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70200000000000085000000860000001800000004000000000000000300000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000183400000400000000000000000000001800000009000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000cd22546000000b7000000000000009500000000"], &(0x7f0000000500)='syzkaller\x00', 0x7eab, 0x96, &(0x7f0000000640)=""/150, 0x41100, 0x26, '\x00', r5, 0x27, r3, 0x8, &(0x7f0000000740)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x3, 0x1, 0x1f, 0x10000}, 0x10, r6, r1, 0x0, &(0x7f0000000980)=[r1, r1, r7, r3, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x8000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x3, 0x4, 0x4, 0x420, r0, 0xa, '\x00', r5, 0xffffffffffffffff, 0x1, 0x1, 0x2, 0x4}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xb568, 0xda9, 0x0, 0x124, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, 0x48) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x0, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001400)={{}, 0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000014c0)={r8, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x10, &(0x7f0000000440), &(0x7f0000000500), 0x8, 0x4b0, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x20, &(0x7f0000000800)={&(0x7f0000000100)=""/111, 0x6f, 0x0, &(0x7f0000000780)=""/78, 0x4e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x13, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x20, '\x00', r9, 0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x5, 0xfffffffa}, 0x10, 0x0, r8}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) gettid() perf_event_open(&(0x7f0000000940)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b420, 0xd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000001440)}, 0x775, 0x0, 0x4, 0x2, 0x1, 0x6}, 0x0, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x10) 2.303259ms ago: executing program 3 (id=8457): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f0000000140)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x66}, @exit], &(0x7f0000000200)='GPL\x00'}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x0, 0x0, 0x4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=@framed={{}, [@printk={@llx, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x101}, 0x44}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000bb7f1a00c600feff0046350a9500000000000001"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 4 (id=8293): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x84, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@var={0xd, 0x0, 0x0, 0xe, 0x1, 0x1}, @typedef={0x10, 0x0, 0x0, 0x8, 0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @union={0xd, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe, 0x4, 0x4}]}]}, {0x0, [0x0]}}, &(0x7f0000000100)=""/2, 0x5b, 0x2, 0x1, 0x7fffffff}, 0x20) syz_clone(0x800000, &(0x7f0000000180)="7e09d1d7cd7ec42c20e687cb12eb6bc7fc06bb5c7997a116428e40d7051e1b0ee2851c8e2c5b8555d7f091ff1827be5fe068956fa5d97ff779bc085145c23709a0490c1d8b77c60a44a6ee930c2fa9208192dee029639a5c77165b1ebf3c2348f3180ad68a778827445fc34e9f896008ed60256c618f8643f04b0c42458589cb60aa339fa24bac4e3a195dafb591679640e4e1055c5910c64455b56208c7a2a2d37c98738cbf707b526f5ed9ecec3b2fe87dd51c1ba97d36693d57bd3f7723093003c11049fa346a42f34bffba9505be80697fa133d5e3", 0xd7, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="1443836f8842a44307a35db04ab5c58b82cb10e9206824f028e7cf8f00c2438ee85752ed5ef6347f0098d3d423e7823411c96cd35db3a7d3629ba6ccdd208a184b2d4364d25246bc6402947415c5366e733e5b8412b490cf19c01d3f1a0b9cf5d5") r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0xfe, 0x3, 0xd9, 0x0, 0x3, 0x30000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xb}, 0x400, 0x9, 0xe1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0xea, 0x5, 0x27, 0xa, 0x0, 0x6, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xb, 0x2, @perf_bp={&(0x7f0000000400), 0x8}, 0x80, 0x400000000, 0x0, 0x0, 0x1, 0xe, 0x6, 0x0, 0x5, 0x0, 0xffffffffffff8001}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) (async) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) (async) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000006c0)={@cgroup=0xffffffffffffffff, 0x2e, 0x1, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={@cgroup=r3, r4, 0x14, 0x20, 0x0, @prog_fd=r5, r7}, 0x20) openat$cgroup_procs(r6, &(0x7f0000000740)='tasks\x00', 0x2, 0x0) (async, rerun: 32) r8 = openat$cgroup_type(r6, &(0x7f0000000780), 0x2, 0x0) (rerun: 32) write$cgroup_type(r8, &(0x7f00000007c0), 0x9) (async) r9 = openat$cgroup_ro(r3, &(0x7f0000000800)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000840)=r9, 0x4) (async) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000ac0)={&(0x7f0000000880)="f7743a822d6d6bc564386c3abaea98de2ad0a568b8124ca76a427123c24092bdcfe343dd15fa77d3abe5539bce4461227e740cb075339f7a64bed9c71f0730e5bc21c35c2a13926f7d2b908c29d409e4de00290c09ef2f49", &(0x7f0000000900)=""/121, &(0x7f0000000980)="ad4e102c07e238c073737726ac4e99afeb46f6e61636a9149ac227e05898830dd26e2010b08397025630ed4fda8ecd199264f8eb07105324e2fe5831df026c35d36af1faca7415bd0d481aeb5600661d430596acceecf32270ee23a60668e6d1c162c2e909c6a3f9ff48e9dfcb70a48e3289b803918262458f0bbca693a612c2553d86792a6d9abeb54c3d2a677819053591f5cd29bfcfe3cd5e2da527f0957a04155f00a4ea4a49597f3a37a4ea454be62d8a155fad90a9a48dcc7d72d9f0d0775c", &(0x7f0000000a80)="1e9d8d232b2ea4ecae3adbf843", 0x7f, r9}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r9, 0x58, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001e80)={r9, 0x20, &(0x7f0000001e40)={&(0x7f0000000d40)=""/208, 0xd0, 0x0, &(0x7f0000000e40)=""/4096, 0x1000}}, 0x10) (async, rerun: 64) r12 = openat$cgroup_ro(r3, &(0x7f0000001ec0)='cpuacct.usage_percpu\x00', 0x0, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x14, 0x12, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @ldst={0x3, 0x0, 0x0, 0x4, 0x1, 0x20, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x1f0e29a3}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7b9b}}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xb}]}, 0x0, 0x3, 0x43, &(0x7f0000000bc0)=""/67, 0x41100, 0x20, '\x00', r10, 0xb, r9, 0x8, &(0x7f0000000d00)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r11, r4, 0x6, &(0x7f0000001f00)=[r9, r9, r0, r12], &(0x7f0000001f40)=[{0x4, 0x4, 0xd, 0x2}, {0x5, 0x4, 0x3, 0x6}, {0x0, 0x1, 0x8, 0x2}, {0x5, 0x1, 0x2, 0xe}, {0x0, 0x2, 0x8, 0xc}, {0x2, 0x4, 0xd, 0x7}], 0x10, 0x93}, 0x90) write$cgroup_freezer_state(r9, &(0x7f0000002080)='THAWED\x00', 0x7) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002140)={{r0, 0xffffffffffffffff}, &(0x7f00000020c0), &(0x7f0000002100)=r13}, 0x20) (rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002200)={{r12, 0xffffffffffffffff}, &(0x7f0000002180), &(0x7f00000021c0)=r12}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000024c0)={r0, 0x58, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r17 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002500)=r11, 0x4) (async) r18 = bpf$ITER_CREATE(0x21, &(0x7f0000002540)={r9}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000002600)={0x17, 0x30, &(0x7f0000002240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r14}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}}, @map_val={0x18, 0x9, 0x2, 0x0, r15, 0x0, 0x0, 0x0, 0x101}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @generic={0x1d, 0x8, 0x9, 0xa9, 0x8}, @exit, @call={0x85, 0x0, 0x0, 0x7f}, @jmp={0x5, 0x0, 0x6, 0x2, 0x5, 0x8, 0x4}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000023c0)='syzkaller\x00', 0x0, 0x21, &(0x7f0000002400)=""/33, 0x0, 0x9, '\x00', r16, 0x1, r17, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r11, r13, 0x4, &(0x7f0000002580)=[r18, r9, r12, r12], &(0x7f00000025c0)=[{0x3, 0x5, 0x7, 0x9}, {0x5, 0x2, 0xf, 0xa}, {0x3, 0x2, 0x3, 0x8}, {0x2, 0x2, 0xb, 0x6}], 0x10, 0xe}, 0x90) (async, rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000026c0)) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000029c0)={r13, 0xe0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000002740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002780)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xba, &(0x7f00000027c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002800), &(0x7f0000002840), 0x8, 0xe3, 0x8, 0x8, &(0x7f0000002880)}}, 0x10) kernel console output (not intermixed with test programs): EV_CHANGE): veth1_to_batadv: link becomes ready [ 218.858743][ T3486] device veth0_vlan left promiscuous mode [ 220.195933][T12108] syz.0.3087[12108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.195991][T12108] syz.0.3087[12108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.398619][ T3486] device veth1_macvtap left promiscuous mode [ 220.707765][T12156] device veth0_vlan left promiscuous mode [ 220.739454][T12156] device veth0_vlan entered promiscuous mode [ 220.926723][T12155] device syzkaller0 entered promiscuous mode [ 222.741789][T12280] device pim6reg1 entered promiscuous mode [ 223.174892][T12311] device syzkaller0 entered promiscuous mode [ 223.252760][T12296] device syzkaller0 entered promiscuous mode [ 223.471557][T12334] device veth1_macvtap left promiscuous mode [ 223.970922][T12358] device pim6reg1 entered promiscuous mode [ 225.751903][T12502] device sit0 entered promiscuous mode [ 226.019896][T12512] device pim6reg1 entered promiscuous mode [ 226.184115][T12515] device sit0 entered promiscuous mode [ 226.369738][T12532] device pim6reg1 entered promiscuous mode [ 227.182597][T12574] device syzkaller0 entered promiscuous mode [ 227.303108][T12594] device vxcan1 entered promiscuous mode [ 227.393050][T12615] syz.0.3216[12615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.393108][T12615] syz.0.3216[12615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.674961][ T24] audit: type=1400 audit(1722810915.470:174): avc: denied { create } for pid=12652 comm="syz.1.3230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 227.724388][ T24] audit: type=1400 audit(1722810915.520:175): avc: denied { create } for pid=12649 comm="syz.2.3229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 227.915080][T12668] device pim6reg1 entered promiscuous mode [ 228.698879][T12697] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.748801][T12697] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.767115][T12697] device bridge_slave_0 entered promiscuous mode [ 228.920315][T12716] device syzkaller0 entered promiscuous mode [ 228.988369][T12697] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.995388][T12697] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.013553][T12697] device bridge_slave_1 entered promiscuous mode [ 229.077282][ T110] device veth1_macvtap left promiscuous mode [ 229.087647][ T110] device veth0_vlan left promiscuous mode [ 229.317555][T12697] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.324548][T12697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.331635][T12697] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.338389][T12697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.377487][T12756] device veth1_macvtap left promiscuous mode [ 229.409768][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.427892][ T6239] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.447045][ T6239] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.503008][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.555520][ T857] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.562503][ T857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.668966][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.677305][ T857] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.684180][ T857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.693216][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.710021][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.717921][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.741576][T12765] device wg2 entered promiscuous mode [ 229.799643][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.807824][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.899955][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.927267][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.959660][T12697] device veth0_vlan entered promiscuous mode [ 229.995235][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.017929][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.125342][T12697] device veth1_macvtap entered promiscuous mode [ 230.145400][ T855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.154275][ T855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.162807][ T855] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.216849][ T6236] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.234612][ T6236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.271031][T12805] cgroup: fork rejected by pids controller in /syz1 [ 230.278380][ T6236] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.324782][ T6236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.458570][T12939] device sit0 left promiscuous mode [ 230.861504][T12967] device syzkaller0 entered promiscuous mode [ 231.199644][T12962] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.206718][T12962] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.214425][T12962] device bridge_slave_0 entered promiscuous mode [ 231.221718][T12962] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.232081][T12962] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.239394][T12962] device bridge_slave_1 entered promiscuous mode [ 231.308743][ T322] bridge0: port 3(gretap0) entered disabled state [ 231.325137][ T322] device gretap0 left promiscuous mode [ 231.330667][ T322] bridge0: port 3(gretap0) entered disabled state [ 231.437413][T13000] device syzkaller0 entered promiscuous mode [ 231.546612][T13013] device syzkaller0 entered promiscuous mode [ 231.560314][T12962] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.567193][T12962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.574327][T12962] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.581277][T12962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.590659][ T857] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.597753][ T857] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.616241][ T322] device bridge_slave_1 left promiscuous mode [ 231.622548][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.630531][ T322] device bridge_slave_0 left promiscuous mode [ 231.636584][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.756748][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.765401][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.794472][T13018] device syzkaller0 entered promiscuous mode [ 231.810175][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 231.818474][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.826651][ T7823] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.833635][ T7823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.840872][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 231.849087][ T7823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.857499][ T7823] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.864384][ T7823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.926083][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.934746][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.950921][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.958886][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.973945][T12962] device veth0_vlan entered promiscuous mode [ 231.981308][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.989945][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.998220][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.006435][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.029276][T12962] device veth1_macvtap entered promiscuous mode [ 232.036975][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.044969][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.052693][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.061785][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.070401][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.148459][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.156952][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.165195][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.173821][ T9028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 233.918415][T13087] syzkaller0: tun_chr_ioctl cmd 1074812117 [ 233.984154][T13087] syz.3.3320[13087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.984214][T13087] syz.3.3320[13087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 234.087127][T13095] device sit0 entered promiscuous mode [ 234.200693][T13103] device lo entered promiscuous mode [ 235.897241][T13188] device pim6reg1 entered promiscuous mode [ 235.923674][T13190] device sit0 left promiscuous mode [ 235.971537][T13190] device sit0 entered promiscuous mode [ 236.458694][T13207] ªªªªªª: renamed from vlan0 [ 236.686910][T13236] device pim6reg1 entered promiscuous mode [ 236.695357][T13234] device macsec0 entered promiscuous mode [ 236.796433][T13243] device veth0_vlan left promiscuous mode [ 236.802847][T13243] device veth0_vlan entered promiscuous mode [ 237.027657][T13262] syz.4.3368[13262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.177196][T13281] device pim6reg1 entered promiscuous mode [ 237.255241][T13285] syz.0.3376[13285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.255309][T13285] syz.0.3376[13285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.549912][T13293] syz.0.3376[13293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.572338][T13293] syz.0.3376[13293] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.069296][T13324] device pim6reg1 entered promiscuous mode [ 238.358484][T13342] device syzkaller0 entered promiscuous mode [ 238.699538][T13375] device syzkaller0 entered promiscuous mode [ 238.724355][T13377] device pim6reg1 entered promiscuous mode [ 238.876139][T13400] syz.4.3409[13400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.876201][T13400] syz.4.3409[13400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.089861][T13412] device veth1_macvtap left promiscuous mode [ 239.209646][T13412] device macsec0 entered promiscuous mode [ 241.078614][ T24] audit: type=1400 audit(1722810928.870:176): avc: denied { write } for pid=13509 comm="syz.3.3437" name="net" dev="proc" ino=53455 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 241.134657][T13510] device pim6reg1 entered promiscuous mode [ 241.141566][ T24] audit: type=1400 audit(1722810928.920:177): avc: denied { add_name } for pid=13509 comm="syz.3.3437" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 241.162997][ T24] audit: type=1400 audit(1722810928.920:178): avc: denied { create } for pid=13509 comm="syz.3.3437" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 241.184077][ T24] audit: type=1400 audit(1722810928.920:179): avc: denied { associate } for pid=13509 comm="syz.3.3437" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 241.289886][T13531] device pim6reg1 entered promiscuous mode [ 241.480160][T13549] device sit0 entered promiscuous mode [ 242.588834][T13612] bridge0: port 3(vlan1) entered blocking state [ 242.630127][T13612] bridge0: port 3(vlan1) entered disabled state [ 242.636690][T13612] device vlan1 entered promiscuous mode [ 242.960455][T13631] syz.0.3474[13631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.960515][T13631] syz.0.3474[13631] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.043556][T13638] bridge_slave_0: mtu greater than device maximum [ 243.663838][T13690] device veth0_vlan left promiscuous mode [ 243.681872][T13690] device veth0_vlan entered promiscuous mode [ 243.700625][ T831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.709196][ T831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.717074][ T831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.106998][T13719] device syzkaller0 entered promiscuous mode [ 244.880976][T13792] syz.4.3517[13792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.881037][T13792] syz.4.3517[13792] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.346017][T13804] device syzkaller0 entered promiscuous mode [ 245.491199][T13830] device wg2 entered promiscuous mode [ 245.604686][T13836] device macsec0 left promiscuous mode [ 245.648774][T13836] device veth1_macvtap entered promiscuous mode [ 245.678966][T13836] device macsec0 entered promiscuous mode [ 245.719452][ T616] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 246.003803][T13867] device pim6reg1 entered promiscuous mode [ 247.159273][T13935] device pim6reg1 entered promiscuous mode [ 247.477831][T13950] device syzkaller0 entered promiscuous mode [ 247.509477][T13955] device sit0 left promiscuous mode [ 247.750228][T13956] device syzkaller0 entered promiscuous mode [ 248.093398][T13975] device sit0 entered promiscuous mode [ 248.579361][T14004] syz.4.3580[14004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.579422][T14004] syz.4.3580[14004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.690145][T14005] syz.4.3580[14005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.108970][T14029] device syzkaller0 entered promiscuous mode [ 251.907809][T14231] device pim6reg1 entered promiscuous mode [ 252.764593][T14271] syz.4.3654[14271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.764655][T14271] syz.4.3654[14271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.336630][T14321] device syzkaller0 entered promiscuous mode [ 256.196467][T14413] device syzkaller0 entered promiscuous mode [ 256.327974][T14413] device pim6reg1 entered promiscuous mode [ 256.745047][T14442] device syzkaller0 entered promiscuous mode [ 256.967740][T14480] device pim6reg1 entered promiscuous mode [ 257.702742][T14539] device syzkaller0 entered promiscuous mode [ 257.971603][T14545] device wg2 entered promiscuous mode [ 260.113913][T14756] device syzkaller0 entered promiscuous mode [ 260.160516][T14780] device sit0 left promiscuous mode [ 260.182449][T14781] device pim6reg1 entered promiscuous mode [ 261.189740][T14840] device syzkaller0 entered promiscuous mode [ 261.418616][T14867] device syzkaller0 entered promiscuous mode [ 261.838249][T14878] device syzkaller0 entered promiscuous mode [ 262.789703][T14906] device pim6reg1 entered promiscuous mode [ 263.743209][T14961] syz.4.3830[14961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.743266][T14961] syz.4.3830[14961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.880244][T14965] syz.4.3830[14965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.972754][T14965] syz.4.3830[14965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.539150][T15021] syz.2.3846[15021] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.595450][T15023] syz.2.3846[15023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.626663][T15023] syz.2.3846[15023] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.586153][T15129] device syzkaller0 entered promiscuous mode [ 267.259832][T15271] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 267.362603][T15271] device syzkaller0 entered promiscuous mode [ 267.508051][T15288] device sit0 left promiscuous mode [ 268.037148][T15348] syz.3.3933[15348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.037207][T15348] syz.3.3933[15348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.114106][T15348] syz.3.3933[15348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.201190][T15357] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.219398][T15357] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.388513][T15414] device sit0 entered promiscuous mode [ 269.777035][T15426] device sit0 left promiscuous mode [ 269.934854][T15441] device sit0 entered promiscuous mode [ 270.461777][T15461] device syzkaller0 entered promiscuous mode [ 270.546051][ T93] udevd[93]: worker [309] terminated by signal 33 (Unknown signal 33) [ 270.570250][ T93] udevd[93]: worker [309] failed while handling '/devices/virtual/block/loop2' [ 270.832898][ T93] udevd[93]: worker [362] terminated by signal 33 (Unknown signal 33) [ 270.842515][ T93] udevd[93]: worker [362] failed while handling '/devices/virtual/block/loop3' [ 272.273267][T15527] device syzkaller0 entered promiscuous mode [ 272.726819][T15576] device pim6reg1 entered promiscuous mode [ 272.878294][T15587] geneve1: tun_chr_ioctl cmd 1074025692 [ 272.915189][T15588] device pim6reg1 entered promiscuous mode [ 272.930193][T15589] geneve1: tun_chr_ioctl cmd 1074025692 [ 273.044405][T15611] device syz_tun entered promiscuous mode [ 273.058486][T15613] device pim6reg1 entered promiscuous mode [ 273.131914][T15622] device macsec0 entered promiscuous mode [ 273.153857][T15622] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.412477][T15644] device pim6reg1 entered promiscuous mode [ 274.176636][T15700] ¯Ê®¸}p: renamed from pim6reg1 [ 275.254760][T15769] bridge0: port 3(veth1_macvtap) entered blocking state [ 275.277786][T15769] bridge0: port 3(veth1_macvtap) entered disabled state [ 275.508043][T15804] device sit0 left promiscuous mode [ 275.739894][T15812] device sit0 entered promiscuous mode [ 275.874578][T15816] device veth0_vlan left promiscuous mode [ 275.891949][T15816] device veth0_vlan entered promiscuous mode [ 275.947206][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.961983][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.985704][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.061964][T15829] device syz_tun entered promiscuous mode [ 276.341602][T15850] device pim6reg1 entered promiscuous mode [ 277.276059][T15893] device syzkaller0 entered promiscuous mode [ 278.068150][T15928] device syzkaller0 entered promiscuous mode [ 278.508832][T15970] device pim6reg1 entered promiscuous mode [ 279.491064][T16013] bridge0: port 4(veth0_to_batadv) entered blocking state [ 279.520066][T16013] bridge0: port 4(veth0_to_batadv) entered disabled state [ 279.560203][T16013] device veth0_to_batadv entered promiscuous mode [ 279.566625][T16013] bridge0: port 4(veth0_to_batadv) entered blocking state [ 279.573589][T16013] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 280.628914][T16088] device syzkaller0 entered promiscuous mode [ 280.881634][T16099] bpf_get_probe_write_proto: 1 callbacks suppressed [ 280.881661][T16099] syz.0.4130[16099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.892880][T16099] syz.0.4130[16099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.924735][T16148] device syzkaller0 entered promiscuous mode [ 283.355840][T16179] syz.2.4150[16179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.355896][T16179] syz.2.4150[16179] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.861688][T16190] device syzkaller0 entered promiscuous mode [ 284.046408][T16223] syz.2.4163[16223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.046500][T16223] syz.2.4163[16223] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.186424][T16291] device syzkaller0 entered promiscuous mode [ 285.487456][T16312] device macsec0 entered promiscuous mode [ 286.474755][T16365] rose0: tun_chr_ioctl cmd 1074025673 [ 286.510106][T16361] rose0: tun_chr_ioctl cmd 1074025677 [ 286.528751][T16361] rose0: linktype set to 805 [ 287.269758][T16477] device sit0 left promiscuous mode [ 287.587490][T16484] device syzkaller0 entered promiscuous mode [ 287.878416][T16496] device syzkaller0 entered promiscuous mode [ 288.074840][T16524] device syzkaller0 entered promiscuous mode [ 289.063618][T16588] device sit0 entered promiscuous mode [ 290.099850][T16679] device pim6reg1 entered promiscuous mode [ 290.314011][T16681] syz.0.4278[16681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.314073][T16681] syz.0.4278[16681] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.562163][T16732] device syzkaller0 entered promiscuous mode [ 291.803167][T16770] syz.0.4303[16770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.803220][T16770] syz.0.4303[16770] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.150984][T16885] device bridge_slave_1 left promiscuous mode [ 293.239765][T16885] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.263508][T16885] device bridge_slave_0 left promiscuous mode [ 293.319600][T16885] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.408669][T16891] device sit0 entered promiscuous mode [ 294.404473][T16971] device pim6reg1 entered promiscuous mode [ 294.605853][T16983] device syzkaller0 entered promiscuous mode [ 298.215481][T17140] device syzkaller0 entered promiscuous mode [ 299.729247][T17224] device veth0_vlan left promiscuous mode [ 299.750159][T17224] device veth0_vlan entered promiscuous mode [ 299.767839][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 299.776334][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 299.784207][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.884505][T17227] device wg2 left promiscuous mode [ 300.872603][T17306] device veth1_macvtap left promiscuous mode [ 301.104278][T17304] device syzkaller0 entered promiscuous mode [ 301.285529][T17337] syz.0.4457[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.285580][T17337] syz.0.4457[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.308082][T17337] syz.0.4457[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.329061][T17337] syz.0.4457[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.350601][T17337] syz.0.4457[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.371729][T17337] syz.0.4457[17337] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.534813][T17341] bridge0: port 4(veth0_to_batadv) entered disabled state [ 301.555648][T17341] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.566273][T17341] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.199228][T17394] device syzkaller0 entered promiscuous mode [ 302.294583][T17418] device pim6reg1 entered promiscuous mode [ 303.361993][T17473] device syzkaller0 entered promiscuous mode [ 303.728868][T17547] device sit0 entered promiscuous mode [ 304.905066][T17607] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 306.104409][T17661] device veth1_macvtap left promiscuous mode [ 306.164064][T17667] device syzkaller0 entered promiscuous mode [ 306.226890][T17672] syz.2.4550[17672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.226949][T17672] syz.2.4550[17672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.379993][T17683] device macsec0 left promiscuous mode [ 306.661280][T17703] device veth0_vlan left promiscuous mode [ 306.667754][T17703] device veth0_vlan entered promiscuous mode [ 309.030452][T17799] device syzkaller0 entered promiscuous mode [ 309.636433][T17848] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.647515][T17848] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.225921][T17925] device pim6reg1 entered promiscuous mode [ 311.927313][T17986] device pim6reg1 entered promiscuous mode [ 312.304119][T18018] device syzkaller0 entered promiscuous mode [ 312.640888][T18050] ¯Ê®¸}p: renamed from pim6reg1 [ 313.216984][T18075] device vxcan1 entered promiscuous mode [ 313.391791][T18092] geneve1: tun_chr_ioctl cmd 1074025672 [ 313.429895][T18092] geneve1: ignored: set checksum enabled [ 313.899346][T18135] bridge0: port 3(veth0_to_batadv) entered blocking state [ 313.917750][T18135] bridge0: port 3(veth0_to_batadv) entered disabled state [ 313.934343][T18135] device veth0_to_batadv entered promiscuous mode [ 314.255735][T18156] device pim6reg1 entered promiscuous mode [ 314.522825][T18196] device bridge0 entered promiscuous mode [ 315.471216][T18248] device syzkaller0 entered promiscuous mode [ 315.716277][T18267] device wg2 left promiscuous mode [ 315.750002][T18267] device wg2 entered promiscuous mode [ 315.767246][T18273] ªªªªªª: renamed from vlan0 [ 315.874108][T18288] device pim6reg1 entered promiscuous mode [ 316.067468][T18312] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 316.199697][T18312] pim6reg0: linktype set to 769 [ 316.224311][T18327] tap0: tun_chr_ioctl cmd 1074025673 [ 316.307503][T18326] device syzkaller0 entered promiscuous mode [ 316.488274][T18346] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 316.509482][T18346] device syzkaller0 entered promiscuous mode [ 317.078218][T18372] syz.3.4739[18372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.081701][T18372] syz.3.4739[18372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.259837][T18392] device sit0 left promiscuous mode [ 317.380185][T18392] device sit0 entered promiscuous mode [ 317.751276][T18431] device wg2 left promiscuous mode [ 318.152981][T18466] device syzkaller0 entered promiscuous mode [ 318.276668][T18491] device veth0_vlan left promiscuous mode [ 318.300165][T18491] device veth0_vlan entered promiscuous mode [ 318.339392][ T818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 318.347653][ T818] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 318.355137][ T818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 318.362660][T18473] device pim6reg1 entered promiscuous mode [ 318.448063][T18494] device syzkaller0 entered promiscuous mode [ 318.455489][T18500] device sit0 left promiscuous mode [ 319.230919][T18537] syz.3.4784[18537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.230981][T18537] syz.3.4784[18537] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.776157][T18573] device pim6reg1 entered promiscuous mode [ 322.105727][T18601] device syzkaller0 entered promiscuous mode [ 322.299057][T18636] device pim6reg1 entered promiscuous mode [ 322.534348][T18647] ªªªªªª: renamed from vlan0 [ 322.579360][T18652] tap0: tun_chr_ioctl cmd 1074025677 [ 322.593420][T18652] tap0: linktype set to 776 [ 322.705851][T18665] device syzkaller0 entered promiscuous mode [ 322.723564][T18664] device veth1_macvtap left promiscuous mode [ 322.739618][T18664] device macsec0 entered promiscuous mode [ 323.388954][T18696] syz.2.4826[18696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.389005][T18696] syz.2.4826[18696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.562794][T18716] device sit0 entered promiscuous mode [ 323.812184][T18717] device macsec0 entered promiscuous mode [ 324.713359][T18763] device syzkaller0 entered promiscuous mode [ 325.712871][T18859] device sit0 left promiscuous mode [ 325.740614][T18865] device sit0 entered promiscuous mode [ 326.050597][T18872] device syzkaller0 entered promiscuous mode [ 327.573791][T18939] device sit0 entered promiscuous mode [ 327.801712][T18952] syz.0.4892[18952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.801809][T18952] syz.0.4892[18952] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.063990][T18956] device pim6reg1 entered promiscuous mode [ 328.107023][T18955] device pim6reg1 left promiscuous mode [ 328.225356][T18970] device pim6reg1 entered promiscuous mode [ 328.284256][T18982] device syzkaller0 entered promiscuous mode [ 328.306832][T18972] device sit0 left promiscuous mode [ 328.443745][T18999] device pim6reg1 entered promiscuous mode [ 329.230174][T19060] ¯Ê®¸}p: renamed from pim6reg1 [ 329.297915][T19058] device veth0_vlan left promiscuous mode [ 329.305297][T19058] device veth0_vlan entered promiscuous mode [ 329.485435][T19075] device syzkaller0 entered promiscuous mode [ 329.646638][T19083] device syzkaller0 entered promiscuous mode [ 330.226546][T19153] device syzkaller0 entered promiscuous mode [ 331.608168][T19260] device sit0 left promiscuous mode [ 331.690572][T19264] device sit0 entered promiscuous mode [ 334.054903][T19399] device syzkaller0 entered promiscuous mode [ 335.325404][T19454] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.332602][T19454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.342802][T19454] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.350262][T19454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.374695][T19454] device bridge0 entered promiscuous mode [ 336.134510][T19496] device pim6reg1 entered promiscuous mode [ 336.185654][T19502] ªªªªªª: renamed from vlan0 [ 336.237053][ T4719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.570969][T19519] syz.1.5038[19519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.571036][T19519] syz.1.5038[19519] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.683033][T19530] syz.1.5038[19530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.743743][T19530] syz.1.5038[19530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.970847][T19545] device syzkaller0 entered promiscuous mode [ 338.091003][T19617] device veth0_vlan left promiscuous mode [ 338.223769][T19617] device veth0_vlan entered promiscuous mode [ 338.360309][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.375289][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 338.396678][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.417275][T19625] rose0: tun_chr_ioctl cmd 1074025681 [ 338.442241][T19627] syz.4.5064[19627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.442294][T19627] syz.4.5064[19627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.742756][T19675] syz.0.5077[19675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.759095][T19675] syz.0.5077[19675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.791904][T19675] syz.0.5077[19675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.803529][T19675] syz.0.5077[19675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.537046][T19731] device wg2 left promiscuous mode [ 339.685214][T19731] device wg2 entered promiscuous mode [ 340.084890][T19777] device sit0 left promiscuous mode [ 340.287158][T19766] device syzkaller0 entered promiscuous mode [ 340.320946][T19765] device vxcan1 entered promiscuous mode [ 340.327028][T19780] device sit0 entered promiscuous mode [ 340.440090][T19808] device macsec0 left promiscuous mode [ 340.472763][T19808] device veth1_macvtap entered promiscuous mode [ 340.478979][T19808] device macsec0 entered promiscuous mode [ 340.486075][ T839] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.216410][T19850] device veth1_macvtap left promiscuous mode [ 341.231791][T19850] device macsec0 left promiscuous mode [ 341.322249][T19859] device veth1_macvtap left promiscuous mode [ 341.349940][T19867] device veth1_macvtap entered promiscuous mode [ 341.454677][T19874] device syzkaller0 entered promiscuous mode [ 342.882745][T19955] device syzkaller0 entered promiscuous mode [ 343.023508][T19971] bpf_get_probe_write_proto: 2 callbacks suppressed [ 343.023528][T19971] syz.4.5166[19971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.081389][T19971] syz.4.5166[19971] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 343.163361][T19986] device syzkaller0 entered promiscuous mode [ 343.314540][T20000] device pim6reg1 entered promiscuous mode [ 344.682981][T20086] device pim6reg1 entered promiscuous mode [ 345.417009][ T93] udevd[93]: worker [15486] terminated by signal 33 (Unknown signal 33) [ 345.436921][ T93] udevd[93]: worker [15486] failed while handling '/devices/virtual/block/loop0' [ 346.357675][T20253] syz.1.5248[20253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.358846][T20253] syz.1.5248[20253] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.388454][T20258] syz.1.5248[20258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.491661][T20258] syz.1.5248[20258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.775511][T20296] bridge0: port 4(veth0_to_batadv) entered blocking state [ 346.794459][T20296] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 346.802826][T20296] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.809916][T20296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.819188][T20296] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.826375][T20296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.881751][T20296] device bridge0 entered promiscuous mode [ 346.945284][ T844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 347.608952][T20348] device syzkaller0 entered promiscuous mode [ 349.466208][T20479] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.473183][T20479] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.482959][T20479] device bridge0 left promiscuous mode [ 352.034618][T20580] device syzkaller0 entered promiscuous mode [ 352.957910][T20640] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.965455][T20640] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.972988][T20640] device bridge_slave_0 entered promiscuous mode [ 352.980061][T20640] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.987394][T20640] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.994911][T20640] device bridge_slave_1 entered promiscuous mode [ 353.064034][T20640] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.070934][T20640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.078113][T20640] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.084899][T20640] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.110607][ T7815] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.118099][ T7815] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.134098][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.142351][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.150250][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.158524][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.167470][ T7815] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.174368][ T7815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.181864][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.190184][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.198364][ T7815] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.205350][ T7815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.220907][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.229246][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.237428][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.245974][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.267693][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 353.276612][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 353.291683][T20640] device veth0_vlan entered promiscuous mode [ 353.298078][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 353.307131][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.320395][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.327875][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.352013][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 353.361585][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 353.383592][T20640] device veth1_macvtap entered promiscuous mode [ 353.403178][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 353.412601][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 353.421430][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 353.445150][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 353.456801][ T4714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 354.268140][T20683] device syzkaller0 entered promiscuous mode [ 354.923966][T20716] device wg2 entered promiscuous mode [ 355.321005][T20726] syz.2.5384[20726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.321064][T20726] syz.2.5384[20726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.704461][T20746] device syzkaller0 entered promiscuous mode [ 355.881775][T20750] bridge0: port 5(veth0_vlan) entered blocking state [ 355.888409][T20750] bridge0: port 5(veth0_vlan) entered disabled state [ 356.971210][T20799] device veth1_macvtap entered promiscuous mode [ 356.977910][T20799] device macsec0 entered promiscuous mode [ 357.008643][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 357.199377][T20813] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.207253][T20813] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.215042][T20813] device bridge_slave_0 entered promiscuous mode [ 357.224899][T20813] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.232104][T20813] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.239482][T20813] device bridge_slave_1 entered promiscuous mode [ 357.347180][ T826] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 357.355350][ T826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.373654][ T818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.382425][ T818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.391578][ T818] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.398447][ T818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.406152][ T818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.414780][ T818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.423170][ T818] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.430076][ T818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.448556][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.456238][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 357.464667][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 357.484031][ T822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 357.495393][T20813] device veth0_vlan entered promiscuous mode [ 357.502333][ T822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 357.516772][ T822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 357.524539][ T822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 357.535097][T20813] device veth1_macvtap entered promiscuous mode [ 357.599737][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 357.608067][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 357.636107][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 357.669068][T20834] device syzkaller0 entered promiscuous mode [ 358.781052][T20929] device syzkaller0 entered promiscuous mode [ 358.792577][T20931] Â: renamed from pim6reg1 [ 359.098454][T20953] rose0: tun_chr_ioctl cmd 1074812118 [ 359.333800][T20967] device ip6gretap0 entered promiscuous mode [ 360.278262][ T822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.293049][ T822] bridge0: port 5(veth0_vlan) entered blocking state [ 360.299779][ T822] bridge0: port 5(veth0_vlan) entered forwarding state [ 360.307171][ T822] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 360.326820][ T822] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 360.371414][ T822] bridge0: port 3(vlan1) entered blocking state [ 360.377503][ T822] bridge0: port 3(vlan1) entered forwarding state [ 360.628693][T21046] device syzkaller0 entered promiscuous mode [ 361.667676][T21067] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.692354][T21067] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.700721][T21067] device bridge_slave_0 entered promiscuous mode [ 361.844051][T21067] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.853190][T21067] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.872176][T21067] device bridge_slave_1 entered promiscuous mode [ 362.536827][T21148] syz.3.5505[21148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.536914][T21148] syz.3.5505[21148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.552605][T21148] syz.3.5505[21148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.565905][T21148] syz.3.5505[21148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.594346][ T817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.649141][ T817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.709597][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.727979][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.778584][ T4712] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.785788][ T4712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.793381][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.803023][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.811904][ T4712] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.818784][ T4712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.867146][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.892092][ T9017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.903956][ T9017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.916641][ T9017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.925407][ T9017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.953456][ T4693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.018780][T21067] device veth0_vlan entered promiscuous mode [ 363.070664][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.090224][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.143557][ T4712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.199262][ T7815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.212874][T21067] device veth1_macvtap entered promiscuous mode [ 363.247683][ T4693] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.256709][ T4693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.318251][ T4699] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.333175][ T4699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 363.815794][T21203] syz.1.5520[21203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.815852][T21203] syz.1.5520[21203] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.037105][T21392] device syzkaller0 entered promiscuous mode [ 367.148942][T21397] Â: renamed from pim6reg1 [ 368.937199][T21446] syz.4.5591[21446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.937261][T21446] syz.4.5591[21446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.922446][T21550] device pim6reg1 entered promiscuous mode [ 371.238682][T21585] device syzkaller0 entered promiscuous mode [ 371.250874][T21584] device pim6reg1 entered promiscuous mode [ 371.971856][ T24] audit: type=1400 audit(1722811059.770:180): avc: denied { setattr } for pid=21627 comm="syz.2.5636" path="pipe:[73909]" dev="pipefs" ino=73909 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 372.090198][T21621] device syzkaller0 entered promiscuous mode [ 372.533748][T21668] device syzkaller0 entered promiscuous mode [ 372.719649][T21693] device syzkaller0 entered promiscuous mode [ 375.726470][T21880] device wg2 entered promiscuous mode [ 375.894170][T21901] device syzkaller0 entered promiscuous mode [ 376.096870][T21911] device syzkaller0 entered promiscuous mode [ 376.866872][T21960] syz.4.5728[21960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.866937][T21960] syz.4.5728[21960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.899900][T21961] syz.4.5728[21961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.531674][T21981] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.553092][T21981] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.210052][T22057] device pim6reg1 entered promiscuous mode [ 379.396172][T22077] device syzkaller0 entered promiscuous mode [ 380.665075][T22142] syz.3.5778[22142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.665136][T22142] syz.3.5778[22142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.740149][T22142] syz.3.5778[22142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.751582][T22142] syz.3.5778[22142] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.866570][T22158] device syzkaller0 entered promiscuous mode [ 381.647611][T22235] ªªªªªª: renamed from vlan0 [ 382.429848][T22276] device syzkaller0 entered promiscuous mode [ 382.733061][T22314] device pim6reg1 entered promiscuous mode [ 383.037610][T22323] device pim6reg1 entered promiscuous mode [ 383.045542][T22320] device pim6reg1 entered promiscuous mode [ 383.618201][ T24] audit: type=1400 audit(1722811071.410:181): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 384.216029][T22408] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.223067][T22408] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.461994][T22418] device syzkaller0 entered promiscuous mode [ 385.048990][T22450] device syzkaller0 entered promiscuous mode [ 385.361600][T22475] device wg2 left promiscuous mode [ 385.705282][T22495] syz.1.5882[22495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.705340][T22495] syz.1.5882[22495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.415095][T22545] device wg2 left promiscuous mode [ 388.575897][T22700] device veth0_vlan left promiscuous mode [ 388.608216][T22700] device veth0_vlan entered promiscuous mode [ 388.727826][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.750572][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.807421][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.996337][T22728] device veth0_vlan left promiscuous mode [ 389.027081][T22728] device veth0_vlan entered promiscuous mode [ 389.064674][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.082656][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.115284][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.268781][T22764] device syzkaller0 entered promiscuous mode [ 389.808707][T22801] device sit0 left promiscuous mode [ 390.056796][T22810] device bridge_slave_1 left promiscuous mode [ 390.072186][T22810] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.093306][T22810] device bridge_slave_0 left promiscuous mode [ 390.101735][T22810] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.156372][T22812] device syzkaller0 entered promiscuous mode [ 390.176622][T22817] device pim6reg1 entered promiscuous mode [ 390.286657][T22829] device pim6reg1 entered promiscuous mode [ 390.321599][T22844] syz.3.5969[22844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.321686][T22844] syz.3.5969[22844] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.286641][T22854] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.304939][T22854] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.313842][T22854] device bridge_slave_0 entered promiscuous mode [ 391.321333][T22881] device pim6reg1 entered promiscuous mode [ 391.329441][T22854] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.337566][T22854] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.344954][T22854] device bridge_slave_1 entered promiscuous mode [ 391.432797][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 391.441303][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 391.478297][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 391.497205][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 391.506222][ T823] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.513123][ T823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.521809][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 391.530575][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 391.538855][ T823] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.545830][ T823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.554349][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 391.567597][ T823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 391.600597][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 391.608290][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 391.632768][T22917] device pim6reg1 entered promiscuous mode [ 391.645886][T22854] device veth0_vlan entered promiscuous mode [ 391.660580][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 391.668776][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 391.690265][ T6246] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 391.732149][ T9024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 391.743123][T22854] device veth1_macvtap entered promiscuous mode [ 391.757143][ T9024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 391.767242][T22930] syz.3.5992[22930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.767304][T22930] syz.3.5992[22930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.786894][ T9024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.809916][T22930] syz.3.5992[22930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.809974][T22930] syz.3.5992[22930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.837415][T22930] syz.3.5992[22930] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.303488][T22953] device syzkaller0 entered promiscuous mode [ 392.575507][T22960] bridge0: port 1(bridge_slave_0) entered blocking state [ 392.591670][T22960] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.613745][T22960] device bridge_slave_0 entered promiscuous mode [ 392.853590][T22960] bridge0: port 2(bridge_slave_1) entered blocking state [ 392.871000][T22960] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.981894][T22960] device bridge_slave_1 entered promiscuous mode [ 393.188322][T22960] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.195208][T22960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.202346][T22960] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.209190][T22960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.411381][T23032] device pim6reg1 entered promiscuous mode [ 393.430956][ T9024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 393.442007][ T9024] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.476103][ T9024] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.555615][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 393.594568][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 393.645166][ T836] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.652063][ T836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.660660][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 393.668859][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 393.715310][ T836] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.722215][ T836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.730223][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 393.738180][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 393.746380][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 393.754349][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 393.762276][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 393.770560][ T836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 393.804192][T22960] device veth0_vlan entered promiscuous mode [ 393.820967][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 393.828736][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 393.842594][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 393.850855][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 393.869103][T23059] device veth0_vlan left promiscuous mode [ 393.897802][T23059] device veth0_vlan entered promiscuous mode [ 393.945068][ T1628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 393.953486][ T1628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 393.962733][ T3486] bridge0: port 5(veth0_vlan) entered disabled state [ 393.970540][ T3486] device veth0_to_batadv left promiscuous mode [ 393.976578][ T3486] bridge0: port 4(veth0_to_batadv) entered disabled state [ 393.985216][ T3486] device vlan1 left promiscuous mode [ 393.990786][ T3486] bridge0: port 3(vlan1) entered disabled state [ 394.004269][ T3486] device bridge_slave_1 left promiscuous mode [ 394.010507][ T3486] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.017865][ T3486] device bridge_slave_0 left promiscuous mode [ 394.024251][ T3486] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.032533][ T3486] device veth1_macvtap left promiscuous mode [ 394.038699][ T3486] device veth0_vlan left promiscuous mode [ 394.238467][T22960] device veth1_macvtap entered promiscuous mode [ 394.254279][ T1628] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 394.262537][ T1628] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 394.271191][ T1628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 394.297096][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 394.311682][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 394.990066][T23127] syz.0.6039[23127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.990128][T23127] syz.0.6039[23127] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.222861][T23159] device pim6reg1 entered promiscuous mode [ 396.328857][T23220] device syzkaller0 entered promiscuous mode [ 396.569377][T23252] device veth1_macvtap left promiscuous mode [ 396.575544][T23252] device macsec0 entered promiscuous mode [ 398.044500][T23366] device syzkaller0 entered promiscuous mode [ 398.623724][T23396] device syzkaller0 entered promiscuous mode [ 398.672651][T23409] device sit0 entered promiscuous mode [ 400.298881][T23455] device pim6reg1 entered promiscuous mode [ 400.597226][T23495] device syzkaller0 entered promiscuous mode [ 400.840347][T23522] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.847368][T23522] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.852780][T23565] device pim6reg1 entered promiscuous mode [ 402.202931][T23625] device syzkaller0 entered promiscuous mode [ 402.453009][T23645] device pim6reg1 entered promiscuous mode [ 402.857993][T23683] device syzkaller0 entered promiscuous mode [ 404.094012][T23771] device syzkaller0 entered promiscuous mode [ 404.117769][T23774] device syzkaller0 entered promiscuous mode [ 404.395352][T23784] device veth0_vlan left promiscuous mode [ 404.415919][T23784] device veth0_vlan entered promiscuous mode [ 404.506162][ T1631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 404.543511][ T1631] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 404.622585][ T1631] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 404.688796][T23791] bridge0: port 3(veth0_to_batadv) entered blocking state [ 404.696044][T23791] bridge0: port 3(veth0_to_batadv) entered disabled state [ 404.708803][T23791] device veth0_to_batadv entered promiscuous mode [ 404.763996][T23813] device pim6reg1 entered promiscuous mode [ 405.111918][T23857] device pim6reg1 entered promiscuous mode [ 405.654484][T23888] device syzkaller0 entered promiscuous mode [ 405.724451][T23902] syz.2.6248[23902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.724511][T23902] syz.2.6248[23902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.754498][T23902] syz.2.6248[23902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.768056][T23902] syz.2.6248[23902] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.189900][T23948] syz.3.6260[23948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.264464][T23948] syz.3.6260[23948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.268146][T23991] device syzkaller0 entered promiscuous mode [ 408.466606][T24181] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.502749][T24181] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.510204][T24181] device bridge_slave_0 entered promiscuous mode [ 408.523609][T24181] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.530782][T24181] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.538724][T24181] device bridge_slave_1 entered promiscuous mode [ 408.639121][T24200] sit0: mtu greater than device maximum [ 409.193835][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 409.213867][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 409.276503][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 409.286379][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 409.295849][ T9032] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.302920][ T9032] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.310558][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 409.319034][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 409.327277][ T9032] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.334143][ T9032] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.364972][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 409.411668][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 409.421009][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 409.489983][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 409.539344][T24181] device veth0_vlan entered promiscuous mode [ 409.549901][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 409.574520][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 409.588222][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 409.622793][T24181] device veth1_macvtap entered promiscuous mode [ 409.633207][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 409.745943][T24250] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.752959][T24250] bridge0: port 1(bridge_slave_0) entered disabled state [ 409.761045][T24250] device bridge_slave_0 entered promiscuous mode [ 409.767775][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 409.776875][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 409.785389][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 409.793716][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 409.815511][T24250] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.839706][T24250] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.847208][T24250] device bridge_slave_1 entered promiscuous mode [ 409.910313][T24250] bridge0: port 2(bridge_slave_1) entered blocking state [ 409.917173][T24250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 409.924323][T24250] bridge0: port 1(bridge_slave_0) entered blocking state [ 409.931192][T24250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 409.975316][ T7] device bridge_slave_1 left promiscuous mode [ 409.982095][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 409.999207][T24288] syz.2.6328[24288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.999269][T24288] syz.2.6328[24288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.013096][ T7] device bridge_slave_0 left promiscuous mode [ 410.056724][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.082819][ T7] device veth0_vlan left promiscuous mode [ 410.411673][T24300] syz.0.6333[24300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.411732][T24300] syz.0.6333[24300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.482008][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 410.600584][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 410.619357][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 410.629039][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 410.702759][ T550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 410.720121][ T550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 410.750313][ T550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 410.778570][ T550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 410.820077][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 410.828287][ T9032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 410.843215][T24250] device veth0_vlan entered promiscuous mode [ 410.851835][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 410.867786][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 410.903738][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 410.919251][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 410.951751][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 410.985146][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 411.003856][T24250] device veth1_macvtap entered promiscuous mode [ 411.052932][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 411.065101][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 411.098247][ T4706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 411.121822][T24322] bridge0: port 3(veth0_to_batadv) entered blocking state [ 411.129242][T24322] bridge0: port 3(veth0_to_batadv) entered disabled state [ 411.167389][T24322] device veth0_to_batadv entered promiscuous mode [ 411.193680][T24322] bridge0: port 3(veth0_to_batadv) entered blocking state [ 411.200939][T24322] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 411.234618][ T4719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 411.242899][ T4719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 411.624761][T24359] device syzkaller0 entered promiscuous mode [ 411.967553][T24383] device vxcan1 entered promiscuous mode [ 412.238386][T24393] device pim6reg1 entered promiscuous mode [ 412.580662][ T7] device veth1_macvtap left promiscuous mode [ 412.589745][ T7] device veth0_vlan left promiscuous mode [ 412.951380][T24429] device syzkaller0 entered promiscuous mode [ 412.982414][T24432] bpf_get_probe_write_proto: 2 callbacks suppressed [ 412.982424][T24432] syz.3.6371[24432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.989160][T24433] syz.3.6371[24433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.992110][T24432] syz.3.6371[24432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.012652][T24432] syz.3.6371[24432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.015288][T24433] syz.3.6371[24433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.028300][T24432] syz.3.6371[24432] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.393284][T24509] device team_slave_1 entered promiscuous mode [ 414.430031][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 414.438021][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 415.389644][T24582] device syzkaller0 entered promiscuous mode [ 416.163061][T24621] device pim6reg1 entered promiscuous mode [ 416.648584][T24653] device veth0_vlan left promiscuous mode [ 416.689373][T24653] device veth0_vlan entered promiscuous mode [ 416.911095][T24672] syz.1.6436[24672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.911145][T24672] syz.1.6436[24672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.939663][T24670] device veth1_macvtap left promiscuous mode [ 417.429080][T24692] device syzkaller0 entered promiscuous mode [ 417.642221][T24721] device sit0 entered promiscuous mode [ 418.287577][T24763] device syzkaller0 entered promiscuous mode [ 419.775488][T24902] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.785853][T24902] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.932744][T24915] device pim6reg1 entered promiscuous mode [ 419.997409][T24920] syz.3.6503[24920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.997510][T24920] syz.3.6503[24920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.093240][T24925] syz.0.6505[24925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.104788][T24925] syz.0.6505[24925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.117389][T24925] syz.0.6505[24925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.129184][T24925] syz.0.6505[24925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.148386][T24925] syz.0.6505[24925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.160171][T24925] syz.0.6505[24925] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.465026][T24923] device syzkaller0 entered promiscuous mode [ 420.624488][T24949] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.713478][T24949] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.733582][T24949] device bridge_slave_0 entered promiscuous mode [ 420.763672][T24949] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.790959][T24949] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.812089][T24949] device bridge_slave_1 entered promiscuous mode [ 420.919886][T24949] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.926921][T24949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.934000][T24949] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.940749][T24949] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.993358][T24992] device sit0 left promiscuous mode [ 421.087549][T24997] device syzkaller0 entered promiscuous mode [ 421.094759][T24992] device sit0 entered promiscuous mode [ 421.323793][T25008] device sit0 left promiscuous mode [ 421.567358][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.589186][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.637744][ T820] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.705312][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 421.781864][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.828117][ T820] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.835024][ T820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.883010][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 421.913911][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.954771][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 421.973970][ T843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 422.062766][T24949] device veth0_vlan entered promiscuous mode [ 422.158333][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 422.186097][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 422.227482][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 422.235889][ T820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.258082][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.271185][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.293733][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 422.301964][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 422.320379][T25045] device syzkaller0 entered promiscuous mode [ 422.328394][T24949] device veth1_macvtap entered promiscuous mode [ 422.352182][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 422.360884][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 422.369087][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 422.385664][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 422.396273][ T9013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 422.460796][T25066] device veth0_vlan left promiscuous mode [ 422.466874][T25066] device veth0_vlan entered promiscuous mode [ 422.638408][T25097] device syzkaller0 entered promiscuous mode [ 422.733125][T25104] device pim6reg1 entered promiscuous mode [ 422.825894][T25124] bridge0: port 3(veth0_to_batadv) entered disabled state [ 422.833003][T25124] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.840040][T25124] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.853483][T25124] device veth0_to_batadv left promiscuous mode [ 422.859641][T25124] bridge0: port 3(veth0_to_batadv) entered disabled state [ 422.867116][T25124] device bridge_slave_1 left promiscuous mode [ 422.873614][T25124] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.881170][T25124] device bridge_slave_0 left promiscuous mode [ 422.887120][T25124] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.932842][T25123] device veth0_vlan left promiscuous mode [ 422.942362][T25123] device veth0_vlan entered promiscuous mode [ 422.965199][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.977971][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.985661][ T6239] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 424.364609][T25225] device syzkaller0 entered promiscuous mode [ 425.040245][T25287] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 425.257569][T25303] device veth0_vlan left promiscuous mode [ 425.295888][T25303] device veth0_vlan entered promiscuous mode [ 425.587810][T25327] ªªªªªª: renamed from vlan0 [ 425.678788][T25334] bridge0: port 3(veth0_to_batadv) entered blocking state [ 425.685788][T25334] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 425.693020][T25334] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.699900][T25334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 425.706985][T25334] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.713848][T25334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 425.838167][T25334] device bridge0 entered promiscuous mode [ 426.315119][T25381] device syzkaller0 entered promiscuous mode [ 426.681916][T25414] device syzkaller0 entered promiscuous mode [ 426.710021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 427.301122][T25471] device syzkaller0 entered promiscuous mode [ 427.528629][T25498] device syzkaller0 entered promiscuous mode [ 428.492093][T25561] €Â: renamed from pim6reg1 [ 428.906064][T25593] device pim6reg1 entered promiscuous mode [ 429.133669][T25622] device syzkaller0 entered promiscuous mode [ 429.612905][T25647] device sit0 left promiscuous mode [ 430.121165][T25658] device syzkaller0 entered promiscuous mode [ 430.520889][T25671] device syzkaller0 entered promiscuous mode [ 431.172171][T25717] device veth1_macvtap left promiscuous mode [ 431.330847][T25717] device veth1_macvtap entered promiscuous mode [ 431.350763][T25717] device macsec0 entered promiscuous mode [ 431.457160][T25737] device syzkaller0 entered promiscuous mode [ 432.155739][T25773] device syzkaller0 entered promiscuous mode [ 432.202919][T25781] device syzkaller0 entered promiscuous mode [ 432.229918][T25781] device syzkaller0 left promiscuous mode [ 433.276172][T25841] device sit0 entered promiscuous mode [ 433.646724][T25843] device veth1_macvtap left promiscuous mode [ 433.742414][T25844] device veth1_macvtap entered promiscuous mode [ 433.778354][T25844] device macsec0 entered promiscuous mode [ 435.379892][T25982] device pim6reg1 entered promiscuous mode [ 435.389453][T25980] device pim6reg1 entered promiscuous mode [ 435.590142][T26018] device syzkaller0 entered promiscuous mode [ 436.183442][T26089] device veth1_macvtap left promiscuous mode [ 436.204466][T26089] device macsec0 left promiscuous mode [ 436.232895][T26087] device sit0 entered promiscuous mode [ 436.437369][T26106] bridge_slave_0: mtu greater than device maximum [ 436.513236][T26122] device sit0 left promiscuous mode [ 436.527250][T26122] device sit0 entered promiscuous mode [ 438.852114][ T24] audit: type=1400 audit(1722811126.650:182): avc: denied { create } for pid=26274 comm="syz.2.6891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 438.958959][T26285] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.995550][T26296] device sit0 entered promiscuous mode [ 439.439880][T26329] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 439.882678][T26342] device veth0_vlan left promiscuous mode [ 439.888810][T26342] device veth0_vlan entered promiscuous mode [ 439.916008][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 439.940491][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 439.947919][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.811444][T26411] syz.1.6929[26411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.811505][T26411] syz.1.6929[26411] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.943544][T26425] syz.4.6932[26425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.110216][T26425] syz.4.6932[26425] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.830642][T26455] device syzkaller0 entered promiscuous mode [ 441.941324][T26459] device veth0_vlan left promiscuous mode [ 441.959492][T26459] device veth0_vlan entered promiscuous mode [ 442.016323][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 442.034963][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 442.043379][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.238988][T26493] device sit0 left promiscuous mode [ 442.631466][T26515] device syzkaller0 entered promiscuous mode [ 442.719586][T26541] device pim6reg1 entered promiscuous mode [ 442.810324][T26548] device sit0 left promiscuous mode [ 442.970658][T26577] device syzkaller0 entered promiscuous mode [ 443.288084][T26581] device pim6reg1 entered promiscuous mode [ 443.380521][T26626] device veth0_vlan left promiscuous mode [ 443.386817][T26626] device veth0_vlan entered promiscuous mode [ 443.402067][T26627] device pim6reg1 entered promiscuous mode [ 445.252158][T26802] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.259111][T26802] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.266641][T26802] device bridge_slave_0 entered promiscuous mode [ 445.279118][T26802] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.289152][T26802] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.296834][T26802] device bridge_slave_1 entered promiscuous mode [ 445.380326][T26802] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.387406][T26802] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.394531][T26802] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.401402][T26802] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.534022][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 445.543112][ T2623] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.552026][ T2623] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.575212][ T831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 445.589917][ T831] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.596787][ T831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 445.604477][ T831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 445.613374][ T831] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.620268][ T831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 445.628075][ T831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 445.679960][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 445.688193][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 445.710538][T26824] device syzkaller0 entered promiscuous mode [ 445.832332][T26802] device veth0_vlan entered promiscuous mode [ 445.864328][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 445.873773][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 445.889490][T26802] device veth1_macvtap entered promiscuous mode [ 445.921116][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 445.931967][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 445.939380][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 445.948208][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 445.956919][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 446.127831][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 446.136550][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 446.145602][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 446.154284][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 446.940502][ T322] device bridge_slave_1 left promiscuous mode [ 446.983566][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.048232][ T322] device bridge_slave_0 left promiscuous mode [ 447.058800][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.068046][ T322] device veth1_macvtap left promiscuous mode [ 447.074184][ T322] device veth0_vlan left promiscuous mode [ 447.931742][T26898] device sit0 entered promiscuous mode [ 448.282179][T26920] bridge_slave_0: mtu greater than device maximum [ 448.491104][ T24] audit: type=1400 audit(1722811136.290:183): avc: denied { create } for pid=26936 comm="syz.0.7039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 451.131540][T27136] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.159536][T27136] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.237964][T27136] device bridge_slave_0 entered promiscuous mode [ 451.307582][T27136] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.373959][T27136] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.438432][T27136] device bridge_slave_1 entered promiscuous mode [ 451.692825][T27147] device syzkaller0 entered promiscuous mode [ 452.023751][T27136] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.030810][T27136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.037925][T27136] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.044722][T27136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.318975][ T851] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.329884][ T851] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.347405][ T851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 452.355215][ T851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 452.386687][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 452.405901][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 452.425874][ T1632] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.432826][ T1632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 452.440796][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 452.449093][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 452.457802][ T1632] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.464695][ T1632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 452.761059][T27197] device syzkaller0 entered promiscuous mode [ 452.870370][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 452.878536][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 452.887050][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 452.900216][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 452.919574][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 452.927802][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 452.936285][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.944394][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.954476][T27136] device veth0_vlan entered promiscuous mode [ 452.967138][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.986017][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 453.033615][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 453.070919][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 453.102514][T27136] device veth1_macvtap entered promiscuous mode [ 453.215627][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 453.228804][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 453.248274][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 453.256721][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 453.265434][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 453.308320][T27234] device sit0 left promiscuous mode [ 453.580462][T27257] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.587503][T27257] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.868006][T27270] : renamed from syzkaller1 [ 453.878536][T27273] device lo entered promiscuous mode [ 454.309748][T27317] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.316633][T27317] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.324154][T27317] device bridge_slave_0 entered promiscuous mode [ 454.331258][T27317] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.338092][T27317] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.345443][T27317] device bridge_slave_1 entered promiscuous mode [ 454.390155][T27317] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.396991][T27317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.404135][T27317] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.410893][T27317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.420368][ T9015] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.427386][ T9015] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.449733][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 454.457043][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 454.466606][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 454.474925][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 454.483047][ T852] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.489997][ T852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.509660][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 454.517835][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 454.525972][ T852] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.532823][ T852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.540490][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 454.548298][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 454.556187][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 454.564060][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 454.579620][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 454.587775][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 454.601534][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 454.609371][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 454.618504][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 454.626011][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 454.634000][T27317] device veth0_vlan entered promiscuous mode [ 454.648533][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 454.657130][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 454.666604][T27317] device veth1_macvtap entered promiscuous mode [ 454.676615][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 454.684637][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 454.693100][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 454.706420][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 454.714576][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 454.810864][T27322] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.817701][T27322] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.825298][T27322] device bridge_slave_0 entered promiscuous mode [ 454.835766][T27322] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.842626][T27322] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.850167][T27322] device bridge_slave_1 entered promiscuous mode [ 454.890250][T27322] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.897185][T27322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.904341][T27322] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.911278][T27322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.920187][ T322] device bridge_slave_1 left promiscuous mode [ 454.926120][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.933496][ T322] device bridge_slave_0 left promiscuous mode [ 454.939512][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.947429][ T322] device bridge_slave_1 left promiscuous mode [ 454.953642][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.961028][ T322] device bridge_slave_0 left promiscuous mode [ 454.966944][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.974975][ T322] device veth1_macvtap left promiscuous mode [ 454.980867][ T322] device veth0_vlan left promiscuous mode [ 455.181136][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 455.189443][ T605] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.201691][ T605] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.222310][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 455.230574][ T852] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.237444][ T852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.244792][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 455.253288][ T852] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.260241][ T852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.282105][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 455.290043][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.318367][T27333] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.325538][T27333] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.333023][T27333] device bridge_slave_0 entered promiscuous mode [ 455.340244][T27333] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.347171][T27333] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.354871][T27333] device bridge_slave_1 entered promiscuous mode [ 455.371128][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 455.395319][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.403412][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.410746][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 455.418653][T27322] device veth0_vlan entered promiscuous mode [ 455.447974][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 455.456437][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 455.466753][T27322] device veth1_macvtap entered promiscuous mode [ 455.486635][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 455.494559][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 455.502806][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 455.516653][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 455.525276][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 455.552973][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 455.560740][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 455.570983][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 455.579324][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 455.587545][ T605] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.594606][ T605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.602652][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 455.619927][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 455.628148][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 455.636528][ T9019] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.643650][ T9019] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.651869][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 455.660215][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 455.687182][T27333] device veth0_vlan entered promiscuous mode [ 455.694594][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 455.703209][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 455.711530][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 455.718714][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 455.737175][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 455.746566][T27333] device veth1_macvtap entered promiscuous mode [ 455.759261][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 455.769262][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 455.778314][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 455.810064][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 455.939738][T27343] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.946839][T27343] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.955346][T27343] device bridge_slave_0 entered promiscuous mode [ 455.962534][T27343] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.969543][T27343] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.976997][T27343] device bridge_slave_1 entered promiscuous mode [ 456.035837][T27359] device veth0_vlan left promiscuous mode [ 456.048569][T27359] device veth0_vlan entered promiscuous mode [ 456.136016][T27346] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.143344][T27346] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.151132][T27346] device bridge_slave_0 entered promiscuous mode [ 456.181318][T27346] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.188276][T27346] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.196470][T27346] device bridge_slave_1 entered promiscuous mode [ 456.354956][T27346] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.361840][T27346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.368942][T27346] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.375731][T27346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.459058][ T804] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.480294][ T804] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.544552][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 456.552785][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.577012][ T322] device bridge_slave_1 left promiscuous mode [ 456.625930][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.633947][ T322] device bridge_slave_0 left promiscuous mode [ 456.640118][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.648344][ T322] device bridge_slave_1 left promiscuous mode [ 456.654758][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.678801][ T322] device bridge_slave_0 left promiscuous mode [ 456.700632][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.734357][ T322] device veth1_macvtap left promiscuous mode [ 456.770783][ T322] device veth0_vlan left promiscuous mode [ 456.821494][ T322] device veth0_vlan left promiscuous mode [ 456.872768][ T322] device veth1_macvtap left promiscuous mode [ 456.878618][ T322] device veth0_vlan left promiscuous mode [ 457.460205][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 457.468339][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 457.477022][ T804] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.485776][ T804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.493403][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 457.501730][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 457.509974][ T804] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.517902][ T804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.525337][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 457.533502][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 457.541670][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 457.549639][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 457.557487][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 457.564845][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 457.572227][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 457.580455][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 457.588437][ T804] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.595401][ T804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.602886][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 457.611080][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 457.619050][ T804] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.625941][ T804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 457.653528][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 457.675229][T27343] device veth0_vlan entered promiscuous mode [ 457.698653][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 457.709062][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 457.732293][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 457.741857][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 457.761239][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 457.781366][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 457.793774][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 457.802818][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 457.812169][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 457.819955][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 457.833348][T27343] device veth1_macvtap entered promiscuous mode [ 457.874035][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 457.885201][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 457.896006][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 457.905521][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 457.970390][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 457.978699][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 458.057958][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 458.080190][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 458.088474][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 458.101250][T27346] device veth0_vlan entered promiscuous mode [ 458.142226][T27433] device syzkaller0 entered promiscuous mode [ 458.194132][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 458.202754][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 458.211122][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 458.219347][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 458.228917][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 458.236896][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 458.264778][T27346] device veth1_macvtap entered promiscuous mode [ 458.301477][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 458.309074][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 458.328796][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 458.361630][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 458.380143][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 458.625909][T27491] device syzkaller0 entered promiscuous mode [ 459.200909][T27510] device syzkaller0 entered promiscuous mode [ 459.457360][T27526] device veth0_vlan left promiscuous mode [ 459.463673][T27526] device veth0_vlan entered promiscuous mode [ 459.477725][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.487319][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 459.500085][ T605] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 459.726218][T27542] device syzkaller0 entered promiscuous mode [ 459.734925][T27539] device pim6reg1 entered promiscuous mode [ 460.017698][T27550] device syzkaller0 entered promiscuous mode [ 460.132323][T27580] tap0: tun_chr_ioctl cmd 1074025677 [ 460.199564][T27580] tap0: linktype set to 44775 [ 461.211200][T27646] ªªªªªª: renamed from vlan0 [ 461.248491][T27639] ¯Ê®¸}p: renamed from pim6reg1 [ 461.543364][T27664] device syzkaller0 entered promiscuous mode [ 462.434574][T27714] tap0: tun_chr_ioctl cmd 1074025675 [ 462.440116][T27714] tap0: persist enabled [ 463.772665][T27764] device vxcan1 entered promiscuous mode [ 463.869122][T27768] device veth1_macvtap left promiscuous mode [ 463.879257][T27768] device macsec0 entered promiscuous mode [ 464.001076][T27780] syz.1.7267[27780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.001136][T27780] syz.1.7267[27780] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.860582][T27857] device pim6reg1 entered promiscuous mode [ 465.073976][T27871] device pim6reg1 entered promiscuous mode [ 466.078213][T27932] device syzkaller0 entered promiscuous mode [ 468.473091][T28010] device syzkaller0 entered promiscuous mode [ 468.543427][T28036] bridge0: port 3(veth0_to_batadv) entered blocking state [ 468.562980][T28036] bridge0: port 3(veth0_to_batadv) entered disabled state [ 468.597353][T28036] device veth0_to_batadv entered promiscuous mode [ 468.613449][T28036] bridge0: port 3(veth0_to_batadv) entered blocking state [ 468.620505][T28036] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 468.727900][T28056] device sit0 entered promiscuous mode [ 469.609659][T28091] bridge_slave_0: mtu greater than device maximum [ 470.254569][T28155] device pim6reg1 entered promiscuous mode [ 470.722590][T28172] syz.3.7373[28172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.722649][T28172] syz.3.7373[28172] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.311576][T28337] device pim6reg1 entered promiscuous mode [ 473.664828][T28369] device pim6reg1 entered promiscuous mode [ 474.690380][T28424] syz.1.7439[28424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.690434][T28424] syz.1.7439[28424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.738351][T28433] device pim6reg1 entered promiscuous mode [ 474.871947][ T24] audit: type=1400 audit(1722811162.670:184): avc: denied { create } for pid=28458 comm="syz.1.7450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 475.320766][T28489] device pim6reg1 entered promiscuous mode [ 477.204764][T28560] syz.0.7483[28560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.204838][T28560] syz.0.7483[28560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.311534][T28560] syz.0.7483[28560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.339898][T28560] syz.0.7483[28560] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.815662][T28620] device veth1_macvtap left promiscuous mode [ 477.835016][T28620] device macsec0 entered promiscuous mode [ 477.888591][T28621] bridge0: port 1(bridge_slave_0) entered blocking state [ 477.895691][T28621] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.903652][T28621] device bridge_slave_0 entered promiscuous mode [ 477.910987][T28621] bridge0: port 2(bridge_slave_1) entered blocking state [ 477.918438][T28621] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.925942][T28621] device bridge_slave_1 entered promiscuous mode [ 478.071196][T28620] device veth1_macvtap entered promiscuous mode [ 478.096052][ T9009] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 478.248622][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 478.264470][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 478.295091][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 478.305890][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 478.321818][ T856] bridge0: port 1(bridge_slave_0) entered blocking state [ 478.328731][ T856] bridge0: port 1(bridge_slave_0) entered forwarding state [ 478.346124][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 478.354808][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 478.372889][ T856] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.379791][ T856] bridge0: port 2(bridge_slave_1) entered forwarding state [ 478.391526][ T856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 478.420322][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 478.430144][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 478.458421][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 478.500719][T28621] device veth0_vlan entered promiscuous mode [ 478.519337][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 478.528652][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 478.537070][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 478.567938][T28621] device veth1_macvtap entered promiscuous mode [ 478.589883][ T9019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 478.608686][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 478.617753][ T1632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 479.058770][T28684] device sit0 entered promiscuous mode [ 479.500848][T28686] device veth1_macvtap left promiscuous mode [ 480.094759][ T322] device bridge_slave_1 left promiscuous mode [ 480.111004][ T322] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.220015][ T322] device bridge_slave_0 left promiscuous mode [ 480.226102][ T322] bridge0: port 1(bridge_slave_0) entered disabled state [ 480.337431][ T322] device veth0_vlan left promiscuous mode [ 481.036353][T28735] syz.3.7533[28735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.036411][T28735] syz.3.7533[28735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.689683][T28778] device pim6reg1 entered promiscuous mode [ 481.805374][T28793] bridge0: port 3(veth0_to_batadv) entered blocking state [ 481.853354][T28793] bridge0: port 3(veth0_to_batadv) entered disabled state [ 481.919914][T28793] device veth0_to_batadv entered promiscuous mode [ 481.926418][T28793] bridge0: port 3(veth0_to_batadv) entered blocking state [ 481.933404][T28793] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 482.771853][T28836] device pim6reg1 entered promiscuous mode [ 482.823508][T28850] syz.4.7559[28850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.823567][T28850] syz.4.7559[28850] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.990897][T28863] bridge0: port 3(veth0_to_batadv) entered disabled state [ 483.009112][T28863] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.016053][T28863] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.065907][T28865] tap0: tun_chr_ioctl cmd 1074025677 [ 483.074434][T28865] tap0: linktype set to 821 [ 483.354846][T28873] device pim6reg1 entered promiscuous mode [ 483.486319][T28894] bridge0: port 3(veth0_to_batadv) entered blocking state [ 483.541339][T28894] bridge0: port 3(veth0_to_batadv) entered disabled state [ 483.580853][T28894] device veth0_to_batadv entered promiscuous mode [ 483.626874][T28894] bridge0: port 3(veth0_to_batadv) entered blocking state [ 483.633872][T28894] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 483.717854][T28893] device veth0_to_batadv left promiscuous mode [ 483.724267][T28893] bridge0: port 3(veth0_to_batadv) entered disabled state [ 483.786179][T28925] device veth0_vlan left promiscuous mode [ 483.799316][T28925] device veth0_vlan entered promiscuous mode [ 483.822066][T28927] syz.0.7579[28927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.822122][T28927] syz.0.7579[28927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.849289][T28923] device syzkaller0 entered promiscuous mode [ 483.893222][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 483.927941][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 483.946328][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 485.709386][T28981] syzkaller0: refused to change device tx_queue_len [ 485.891238][T28981] device syzkaller0 entered promiscuous mode [ 485.927666][T29002] syz.4.7600[29002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 485.933545][T29002] syz.4.7600[29002] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.395153][T29088] device pim6reg1 entered promiscuous mode [ 488.605794][T29105] device pim6reg1 entered promiscuous mode [ 489.242312][T29123] device syzkaller0 entered promiscuous mode [ 489.472243][T29137] syz.0.7638[29137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.472362][T29137] syz.0.7638[29137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 489.601036][T29137] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 489.653387][T29137] pim6reg0: linktype set to 0 [ 489.763613][T29137] device pim6reg1 entered promiscuous mode [ 490.009002][T29170] tap0: tun_chr_ioctl cmd 1074025677 [ 490.022898][T29170] tap0: linktype set to 804 [ 490.044229][T29193] device pim6reg1 entered promiscuous mode [ 490.092485][T29170] device sit0 entered promiscuous mode [ 490.606880][T29248] device vxcan1 entered promiscuous mode [ 490.617406][T29259] syz.3.7668[29259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.617470][T29259] syz.3.7668[29259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.725039][T29271] device sit0 left promiscuous mode [ 490.806304][T29271] device sit0 entered promiscuous mode [ 491.231374][T29272] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.262576][T29272] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.292803][T29272] device bridge_slave_0 entered promiscuous mode [ 491.412107][T29272] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.419114][T29272] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.427096][T29272] device bridge_slave_1 entered promiscuous mode [ 491.871005][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 491.878874][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 491.934156][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 491.955320][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 491.965136][ T852] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.972049][ T852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 491.979280][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 491.987688][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 491.995737][ T852] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.002586][ T852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.010332][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 492.018316][ T852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 492.058032][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 492.087022][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 492.103520][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 492.116763][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 492.124588][ T9015] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 492.133490][T29272] device veth0_vlan entered promiscuous mode [ 492.179861][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 492.190088][T29272] device veth1_macvtap entered promiscuous mode [ 492.204664][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 492.224503][ T857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 492.559401][T29414] device pim6reg1 entered promiscuous mode [ 492.831355][T29435] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 492.836675][T29435] dvmrp1: linktype set to 768 [ 492.960497][ T7] device veth0_to_batadv left promiscuous mode [ 492.981171][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 493.020739][ T7] device bridge_slave_1 left promiscuous mode [ 493.063414][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.076369][ T7] device bridge_slave_0 left promiscuous mode [ 493.091749][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.122497][ T7] device veth0_to_batadv left promiscuous mode [ 493.139173][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 493.161895][ T7] device bridge_slave_1 left promiscuous mode [ 493.169586][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.177062][ T7] device bridge_slave_0 left promiscuous mode [ 493.183372][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 493.201858][ T7] device veth1_macvtap left promiscuous mode [ 493.210086][ T7] device veth0_vlan left promiscuous mode [ 493.688946][T29487] device pim6reg1 entered promiscuous mode [ 493.742253][T29496] device pim6reg1 entered promiscuous mode [ 493.771098][T29503] syz.1.7734[29503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.771161][T29503] syz.1.7734[29503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.549116][T29556] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.568658][T29556] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.752300][T29567] device veth0_vlan left promiscuous mode [ 494.784223][T29567] device veth0_vlan entered promiscuous mode [ 495.263829][T29603] device syzkaller0 entered promiscuous mode [ 495.347920][T29602] device syzkaller0 entered promiscuous mode [ 495.714693][T29639] device sit0 left promiscuous mode [ 497.699760][T29760] device sit0 left promiscuous mode [ 498.240937][T29806] ªªªªªª: renamed from vlan0 [ 498.661662][T29843] syz.4.7833[29843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.661710][T29843] syz.4.7833[29843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.730259][T29959] bridge0: port 3(veth0_to_batadv) entered blocking state [ 499.810241][T29959] bridge0: port 3(veth0_to_batadv) entered disabled state [ 499.848694][T29959] device veth0_to_batadv entered promiscuous mode [ 499.890593][T29959] bridge0: port 3(veth0_to_batadv) entered blocking state [ 499.897558][T29959] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 500.042956][T29955] device veth0_to_batadv left promiscuous mode [ 500.103149][T29955] bridge0: port 3(veth0_to_batadv) entered disabled state [ 501.647142][T30174] syz.3.7913[30174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.647201][T30174] syz.3.7913[30174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.836612][T30388] device veth0_vlan left promiscuous mode [ 503.894744][T30388] device veth0_vlan entered promiscuous mode [ 504.018719][ T806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 504.027439][ T806] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 504.041515][ T806] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 507.792431][T30689] syz.3.8051[30689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 507.792481][T30689] syz.3.8051[30689] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 508.431889][T30718] device veth1_macvtap left promiscuous mode [ 508.449887][T30718] device macsec0 entered promiscuous mode [ 508.906322][T30784] bridge0: port 2(bridge_slave_1) entered disabled state [ 508.913389][T30784] bridge0: port 1(bridge_slave_0) entered disabled state [ 508.925617][T30784] bridge0: port 2(bridge_slave_1) entered blocking state [ 508.932532][T30784] bridge0: port 2(bridge_slave_1) entered forwarding state [ 508.939627][T30784] bridge0: port 1(bridge_slave_0) entered blocking state [ 508.946466][T30784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 508.968393][T30784] device bridge0 entered promiscuous mode [ 509.583694][T30815] device veth0_vlan left promiscuous mode [ 509.597098][T30815] device veth0_vlan entered promiscuous mode [ 509.735064][T30830] syz.1.8094[30830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.735133][T30830] syz.1.8094[30830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.796234][T30838] syz.4.8092[30838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 509.881417][T30838] syz.4.8092[30838] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 510.654648][T30867] device sit0 entered promiscuous mode [ 510.819469][T30872] ÿÿÿÿÿÿ: renamed from vlan0 [ 511.488080][T30950] bridge0: port 3(veth0_to_batadv) entered blocking state [ 511.495064][T30950] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 511.502383][T30950] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.509223][T30950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.516346][T30950] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.523158][T30950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.548075][T30950] device bridge0 entered promiscuous mode [ 511.829418][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 513.580612][T31061] device veth1_macvtap left promiscuous mode [ 513.596388][T31061] device macsec0 entered promiscuous mode [ 514.425311][T31109] device sit0 entered promiscuous mode [ 515.002191][T31174] device veth0_to_batadv left promiscuous mode [ 515.008368][T31174] bridge0: port 3(veth0_to_batadv) entered disabled state [ 515.099111][T31181] syz.3.8196[31181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.099162][T31181] syz.3.8196[31181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.130898][T31181] syz.3.8196[31181] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.272808][T31223] device veth0_vlan left promiscuous mode [ 516.301083][T31223] device veth0_vlan entered promiscuous mode [ 516.344533][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 516.355574][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 516.368526][ T7809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 518.180056][T31404] veth1_macvtap: mtu greater than device maximum [ 518.514538][T31451] syz.1.8273[31451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.514595][T31451] syz.1.8273[31451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 520.259376][T31551] device sit0 left promiscuous mode [ 520.804462][T31606] device veth0_vlan left promiscuous mode [ 520.858723][T31606] device veth0_vlan entered promiscuous mode [ 520.938377][ T844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 520.946657][ T844] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 520.956008][ T844] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 521.051236][T31619] syz.1.8316[31619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.051299][T31619] syz.1.8316[31619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.471609][T31923] device veth0_vlan left promiscuous mode [ 531.570120][T31923] device veth0_vlan entered promiscuous mode [ 531.627220][ T806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 531.700187][ T806] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 531.769902][ T806] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 533.379113][T31951] syz.1.8403[31951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.379178][T31951] syz.1.8403[31951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.455585][T31959] syz.3.8406[31959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.467463][T31959] syz.3.8406[31959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.482595][T31959] syz.3.8406[31959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.494382][T31959] syz.3.8406[31959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.039906][T31984] syz.1.8413[31984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.091761][T31984] syz.1.8413[31984] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 540.855857][T32081] syz.1.8438[32081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=8293 state=3 status=67 (errno 9: Bad file descriptor) [ 540.920967][T32081] syz.1.8438[32081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.030582][ T940] device bridge_slave_1 left promiscuous mode [ 547.048062][ T940] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.055486][ T940] device bridge_slave_0 left promiscuous mode [ 547.061471][ T940] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.069132][ T940] device bridge_slave_1 left promiscuous mode [ 547.075159][ T940] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.082712][ T940] device bridge_slave_0 left promiscuous mode [ 547.088780][ T940] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.096673][ T940] device bridge_slave_1 left promiscuous mode [ 547.102713][ T940] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.109928][ T940] device bridge_slave_0 left promiscuous mode [ 547.115839][ T940] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.124103][ T940] device veth0_vlan left promiscuous mode [ 547.129889][ T940] device veth1_macvtap left promiscuous mode [ 547.135700][ T940] device veth0_vlan left promiscuous mode