last executing test programs: 1.406852885s ago: executing program 1 (id=4062): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r0}, &(0x7f0000000380), &(0x7f0000000400)}, 0x20) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) close(0xffffffffffffffff) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r2, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, &(0x7f0000000340)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x10, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="7910480000000000790030000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x80) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) (async) r8 = perf_event_open$cgroup(&(0x7f00000006c0)={0x4, 0x80, 0x1, 0xc, 0xe, 0x2, 0x0, 0x7ff, 0x602, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000680), 0x1}, 0x8000, 0x4, 0x8774, 0x8, 0x0, 0x7ff, 0x4, 0x0, 0x7b1ac26d, 0x0, 0x9}, r6, 0xa, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x3, 0xf8, 0x72, 0x6, 0x0, 0x3, 0x29, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4ea, 0x0, @perf_config_ext={0x10, 0x9}, 0x8, 0x2, 0x5, 0x7, 0x7, 0x1, 0x9, 0x0, 0x7fff, 0x0, 0x400000}, 0x0, 0x2, r8, 0x3) r9 = openat$cgroup_procs(r6, 0x0, 0x2, 0x0) write$cgroup_pid(r9, 0x0, 0x0) write$cgroup_freezer_state(r7, &(0x7f0000000080)='THAWED\x00', 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.333973481s ago: executing program 1 (id=4065): ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000ff000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x48) (async) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0xffe6) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r2], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000160000000000000000002000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={0x0}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14a84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.199553462s ago: executing program 1 (id=4066): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x0, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[], 0x0, 0x0, 0xffffffffffffff32, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='net_prio.prioidx\x00', 0x0, 0x0) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0x0, 0x18}, 0x1f00) 1.057236814s ago: executing program 3 (id=4070): r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000040), 0x9) 990.518559ms ago: executing program 3 (id=4072): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2) sendmsg$unix(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)="5625a9d4893b", 0x6}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3, @ANYBLOB="000060b32e9e053500"/20], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000400000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x8000, 0x0, 0x0, 0x1, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x7}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x2000, 0x8002, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x8a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@rights={{0x14, 0x1, 0x1, [r6]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) close(r7) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0x4, 0xa, 0x4}, 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f", 0x1}], 0x1}, 0x0) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) 912.772575ms ago: executing program 2 (id=4010): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x1e, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x11, &(0x7f0000001b00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x5f8, 0x18}, 0xc) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000)="5db64eb647d6963f60f266c74bdf76", &(0x7f0000000880)=""/77}, 0x20) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000feffffff184b0000faffffff000000000000000018400000060000000000000000000000851000000300000018280000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x44, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xf, 0x2, 0x9}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r6, r7, r8, r9], &(0x7f0000000280)=[{0x0, 0x5, 0xc, 0x5}, {0x2, 0x4, 0x6, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x12, 0xc, &(0x7f0000001a40)=ANY=[@ANYRESOCT=r10, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r13, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008512000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='devlink_health_reporter_state_update\x00', r15}, 0x10) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095", @ANYBLOB="8aee21fd4d7a71e35c0bccc36a1350ee1d3c0cc08be231e69cdef588d4030733d3f207c670f756de4f3d12bad91ea23e355899992167bc5c7801528aa132b75c9e6c6dba9f082e67d5cb46088dd1b79b24c5d4f5e25abf194016b0073ae2092db97f3a4e9620b0def8979cda241abc09bfb66e9082466873e2bb82cd9cbabcd30678b1453aeeacc6225a67a3f32a8a0321b7f9c7845c96d4a0776441c3d70a85c2707b2e787cb24a023828d8bc127773a543393ed12b5e242defe6ffe17296e44992c43323b7b9ebe30e450bbd2745ffa5a53d097efff9b2d5037c4981a93be2a591c3517869592658c10279f486688a6424deaeb1b34aae0f37", @ANYRES16=r13, @ANYRESDEC=r12, @ANYRES8=r11], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r16}, 0x10) close(r15) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) 727.059131ms ago: executing program 4 (id=4058): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000950000000000000000e81010d17803db4151cec2c815cec9d717b717851dcf7ce509f3919560739e245c70c8391fd63fff42d4cbab6cb08feb41ad51e6b4c18b9f65929dc83cadb13ca4e58b37268e92769aacc51c02dc4da276"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000e7ffff17120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000740)='ext4_ext_remove_space\x00', r8}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffad, &(0x7f0000000000)='/proc/sys\x00\x00\x01\x00\x00\x00\x00\x00\xff\xbe\xcc\x9a\x18e\xf44.\xd4j\a\x1e\x01\xab%nN\xd4\xa2'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) 592.726571ms ago: executing program 2 (id=4010): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x1e, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x11, &(0x7f0000001b00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x5f8, 0x18}, 0xc) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000)="5db64eb647d6963f60f266c74bdf76", &(0x7f0000000880)=""/77}, 0x20) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000feffffff184b0000faffffff000000000000000018400000060000000000000000000000851000000300000018280000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x44, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xf, 0x2, 0x9}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r6, r7, r8, r9], &(0x7f0000000280)=[{0x0, 0x5, 0xc, 0x5}, {0x2, 0x4, 0x6, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x12, 0xc, &(0x7f0000001a40)=ANY=[@ANYRESOCT=r10, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r13, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008512000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='devlink_health_reporter_state_update\x00', r15}, 0x10) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095", @ANYBLOB="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", @ANYRES16=r13, @ANYRESDEC=r12, @ANYRES8=r11], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r16}, 0x10) close(r15) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) 536.809426ms ago: executing program 0 (id=4074): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f00000004c0), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000001000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91101000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 535.501366ms ago: executing program 3 (id=4075): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%pB \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000100)="986af04d02f8f3d913a75600075c58604f83027b97425c2e0c688a591a200460f6dc7c5c8289ae2637d69f4d15bcd59714a1f4c904dd0b4dbce353e777a7ed1eefa7349bda6f1f3251906abf4325a63e2977779683272ca92a5d9faa4b9ce8e526ab39249b8b6ae2db7eea2ebbd76b79cc2bb7a16e"}, 0x20) r1 = perf_event_open$cgroup(&(0x7f0000000280)={0x4, 0x80, 0x7f, 0x4, 0x2, 0x8, 0x0, 0x9, 0x4, 0xe, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000240), 0x1}, 0x8002, 0x0, 0x3, 0x2, 0x5, 0x6, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x3) r2 = perf_event_open(&(0x7f00000001c0)={0x7, 0x80, 0x0, 0xe, 0xfd, 0xde, 0x0, 0x100000001, 0x6, 0xa, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x10000, 0x2}, 0x80, 0x8, 0x81, 0x8, 0x0, 0x2, 0xc3c, 0x0, 0xe}, 0xffffffffffffffff, 0x7, r1, 0x2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)={0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r3, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000440)=r4}, 0x20) r6 = getpid() perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0xfb, 0x8, 0xb, 0x2, 0x0, 0xd9, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_config_ext={0x8, 0xffff}, 0x4402, 0x80, 0x5, 0x7, 0x2, 0x9, 0x4, 0x0, 0x4efb, 0x0, 0x4}, r6, 0x9, r2, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000680)={r5, &(0x7f0000000540)="ac2b94672faecb77c9da391c48cb84bdd38d70bbf669b50bdb73ff0542e5a0c650ef5931928bbdf7cf116be72475396e28d745fe5836840673255e38df75ffc9a99397b96497cac49698308660f3c6c7c637799c19a6626edf2d12daf758a01db2b47e5df66b7a2250235402ba13726c5ea5696b25e71d7bccfd2e889d3d5ad68b6791b91201430de6bde54dc7fa757b956d76c94047396b11faed581c0e8e98f4447e8e37fb7151cae036f51c8404db1b7be651cfff3ee4c9174b34954998f420a23192ef0b5a71ebc66170a6673aeb98b6ef6b164a5984549da78f42f3c57e01e8a5aaa3c439774b3c8b995c74b076581fec82f404742fa6", &(0x7f0000000640)}, 0x20) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.threads\x00', 0x2, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000700)=@abs, 0x6e, &(0x7f0000001780)=[{&(0x7f0000000780)=""/4096, 0x1000}], 0x1}, 0x2000) perf_event_open(&(0x7f0000001800)={0x1, 0x80, 0xb, 0x1e, 0x7, 0x4, 0x0, 0x7, 0x400, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0xfff, 0x31}, 0x4000, 0x200000000, 0x3b, 0x3, 0x1, 0x10, 0xfffa, 0x0, 0x7, 0x0, 0x180000000000000}, r6, 0xf, r2, 0x2) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001880)='blkio.bfq.empty_time\x00', 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000018c0), 0x40400, 0x0) ioctl$TUNSETQUEUE(r8, 0x400454d9, &(0x7f0000001900)={'wg1\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c00)={r7, 0xe0, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001940)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f0000001980)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000019c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x75, &(0x7f0000001a00)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000001a40), &(0x7f0000001a80), 0x8, 0x36, 0x8, 0x8, &(0x7f0000001ac0)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001c40)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x9, '\x00', r9, r7, 0x2, 0x1, 0x4}, 0x48) r10 = openat$cgroup_ro(r5, &(0x7f0000001cc0)='devices.list\x00', 0x0, 0x0) ioctl$TUNSETDEBUG(r8, 0x400454c9, &(0x7f0000001d00)=0x3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001ec0)={r0, 0x58, &(0x7f0000001e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001f40)={0x1b, 0x0, 0x0, 0x7fc0000, 0x0, r10, 0x7, '\x00', 0x0, r10, 0x3, 0x2, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002080)={0x6, 0x10, &(0x7f0000001d40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='GPL\x00', 0x9, 0x3, &(0x7f0000001e00)=""/3, 0x41100, 0x20, '\x00', r11, 0x25, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001f00)={0x2, 0xa, 0x5986}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000001fc0)=[r3, r12], &(0x7f0000002000)=[{0x4, 0x2, 0x10, 0xb}, {0x4, 0x5, 0x5, 0x2}, {0x3, 0x1, 0x9, 0x6}, {0x1, 0x5, 0x2, 0xf8ab80787f81aec3}, {0x2, 0x4, 0xf, 0x6}, {0x1, 0x1, 0x2}, {0x3, 0x4, 0x1, 0x7}], 0x10, 0x6}, 0x90) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000002400)={&(0x7f0000002140)="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", &(0x7f0000002240)=""/211, &(0x7f0000002340)="c0c27718efaeb85e926b3fcfcfb86b25d3a7519bc0512b33bf42da10be2cfd3840eecfbbbc2b98fe95ebb37c0f73b89d201466f35839a43272c48667e7e4d71a85c7a51933ea57ba5547171d31fea8808704e9034fb39a4ba77b81b0880c10e7eb7522fafb1b255fdfe6533decdcc60cb44d1a321080781bbc79a557d2", &(0x7f00000023c0)="3fc26685ac247946d85dc48f33500c9497669e9f18d84e6b3afc514ea427801b6b776a934d821b7c8efabaa2671fa2b611ed652603cc483435", 0x8000, r0}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000024c0)={{r10}, &(0x7f0000002440), &(0x7f0000002480)=r7}, 0x20) bpf$ENABLE_STATS(0x20, &(0x7f0000002500), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000002540)=@base={0x20, 0x7, 0xfcc, 0x1, 0x22, r7, 0x5, '\x00', r9, r10, 0x5, 0x0, 0x2}, 0x48) r13 = openat$tun(0xffffffffffffff9c, &(0x7f00000025c0), 0xa4000, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000002600)={'geneve0\x00', 0x10}) 532.088077ms ago: executing program 4 (id=4058): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000950000000000000000e81010d17803db4151cec2c815cec9d717b717851dcf7ce509f3919560739e245c70c8391fd63fff42d4cbab6cb08feb41ad51e6b4c18b9f65929dc83cadb13ca4e58b37268e92769aacc51c02dc4da276"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="180800000080ad00000000000000000018c3e20025b71d74a9088903e01ea2f980cc97fb5f46a83fb3db6d1524332e18eaa5daf449c4c3084a06d9c8259519af921b6e8d61ed546d32e2a4240ee803a25fa53a4f8fa2978aa8c9c4e610da176694c82da3abedd53b504e71d1f772959cad23768bb050901c9597ed96772a170f8594a163903ed4474b59a454a966be0a8040d0855ca54b88a37da72c20fde8545e2dc50f93204c958a5e5eef46e5302838a6606aece5147e93b9ff852c4ad9be3a40b13a72a915256939868d4d96fbc986e418547a39ef119ba096a34af765e52bfd4cfccf0d3fb0afda5034c5235f53671c0be877a40e6d0bd5e097098a54a77d865d8e6c05dec39ff2258e2182986e5607e873e2d6e1d94378c275f203c6ac1203902179f15bf37ae79aa47567c500723ed254bdb65fbcf1f5455e84fcba6285c0be1ce07807259ecbe53ccc79f4c25f99ebc7508d20407398fe6e8906210f515c6852eab7292abb429f07ce9a8666ae8defdbff62b286bc750c19e56b79e64799bc391a9bf8ce484f34e3863e898f0c187909e5268a01d1d0ed66a9365ab2d7ad9764f95418c6ba067923d33272eee3ab1ef5ec168880d2cd226def9255aa4498d5eceab5573dcb885fa70474b1c45c9ba04d2ca81bf83d57890d000000000000fd", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000e7ffff17120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000740)='ext4_ext_remove_space\x00', r8}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffad, &(0x7f0000000000)='/proc/sys\x00\x00\x01\x00\x00\x00\x00\x00\xff\xbe\xcc\x9a\x18e\xf44.\xd4j\a\x1e\x01\xab%nN\xd4\xa2'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) 484.93943ms ago: executing program 0 (id=4076): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r0}, &(0x7f0000000600), &(0x7f0000000640)}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0xf101}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000a50000002a00000095"], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000020000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1e030800dd5c980128856306008e024000"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_free_batched\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1, 0x0, 0x10004, 0xff, 0x0, 0x1, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r6, &(0x7f0000000200)='\x00\rKz\r', &(0x7f0000000b00)=""/4096, 0x4}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r9) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000001000000b7040000000000008500000033000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 484.59933ms ago: executing program 2 (id=4010): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x1e, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x11, &(0x7f0000001b00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x5f8, 0x18}, 0xc) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000)="5db64eb647d6963f60f266c74bdf76", &(0x7f0000000880)=""/77}, 0x20) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000feffffff184b0000faffffff000000000000000018400000060000000000000000000000851000000300000018280000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x44, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xf, 0x2, 0x9}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r6, r7, r8, r9], &(0x7f0000000280)=[{0x0, 0x5, 0xc, 0x5}, {0x2, 0x4, 0x6, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x12, 0xc, &(0x7f0000001a40)=ANY=[@ANYRESOCT=r10, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r13, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008512000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='devlink_health_reporter_state_update\x00', r15}, 0x10) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095", @ANYBLOB="8aee21fd4d7a71e35c0bccc36a1350ee1d3c0cc08be231e69cdef588d4030733d3f207c670f756de4f3d12bad91ea23e355899992167bc5c7801528aa132b75c9e6c6dba9f082e67d5cb46088dd1b79b24c5d4f5e25abf194016b0073ae2092db97f3a4e9620b0def8979cda241abc09bfb66e9082466873e2bb82cd9cbabcd30678b1453aeeacc6225a67a3f32a8a0321b7f9c7845c96d4a0776441c3d70a85c2707b2e787cb24a023828d8bc127773a543393ed12b5e242defe6ffe17296e44992c43323b7b9ebe30e450bbd2745ffa5a53d097efff9b2d5037c4981a93be2a591c3517869592658c10279f486688a6424deaeb1b34aae0f37", @ANYRES16=r13, @ANYRESDEC=r12, @ANYRES8=r11], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r16}, 0x10) close(r15) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) 393.676208ms ago: executing program 3 (id=4077): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x7, 0x6, 0xb, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0xb}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000200)=ANY=[@ANYRESDEC=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x20}, 0x90) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff], &(0x7f0000000580)}, 0x90) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x20264400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0xffffffff, 0x1000}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7e}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 392.840878ms ago: executing program 0 (id=4078): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000001c80)="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", 0xd4d}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) 392.250348ms ago: executing program 4 (id=4058): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000950000000000000000e81010d17803db4151cec2c815cec9d717b717851dcf7ce509f3919560739e245c70c8391fd63fff42d4cbab6cb08feb41ad51e6b4c18b9f65929dc83cadb13ca4e58b37268e92769aacc51c02dc4da276"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000e7ffff17120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000740)='ext4_ext_remove_space\x00', r8}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffad, &(0x7f0000000000)='/proc/sys\x00\x00\x01\x00\x00\x00\x00\x00\xff\xbe\xcc\x9a\x18e\xf44.\xd4j\a\x1e\x01\xab%nN\xd4\xa2'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) 381.753249ms ago: executing program 0 (id=4079): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r1, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x9, 0x9, 0x1, 0xb, 0x0, 0xfffffffffffffffb, 0x20880, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000300), 0x8}, 0x40, 0x7, 0x7, 0x0, 0x8bd7, 0xb9da, 0xfffc, 0x0, 0x75}, 0x0, 0x7, 0xffffffffffffffff, 0x8) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079102000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r4, 0x58, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[], 0x34100) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_ext={0x1c, 0x1f, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000001000000000000000200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018330000050000000000000000000000950000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000ffffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7060000010000008500000084000000b700"/64], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x37, &(0x7f0000000400)=""/55, 0x40f00, 0x4, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000700)={0x0, 0x9, 0x5a, 0x3f}, 0x10, 0x1df1, 0xffffffffffffffff, 0xa, &(0x7f0000000740)=[r4, r4, r6], &(0x7f0000000780)=[{0x0, 0x3, 0x9}, {0x5, 0x5, 0xa}, {0x1, 0x1, 0x5, 0x5}, {0x1, 0x5, 0x1, 0x6}, {0x0, 0x1, 0xd, 0x3}, {0x2, 0x1, 0x6, 0xb}, {0x0, 0x4, 0xb, 0x9}, {0x2, 0x5, 0xd, 0x4}, {0x4, 0x5, 0x3, 0x5}, {0x2, 0x4, 0x1, 0x7}], 0x10, 0x3}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000480000004800000008000000020000000100000d000000000000000004000000000000000000000300000000020000000500000000000000010000000000000700000000060000000000000e0400000000000000002e000000002e00"], 0x0, 0x68}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r7, 0x58, &(0x7f00000002c0)}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000b8e9850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 380.454979ms ago: executing program 2 (id=4010): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x1e, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x11, &(0x7f0000001b00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x5f8, 0x18}, 0xc) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000)="5db64eb647d6963f60f266c74bdf76", &(0x7f0000000880)=""/77}, 0x20) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000feffffff184b0000faffffff000000000000000018400000060000000000000000000000851000000300000018280000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x44, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xf, 0x2, 0x9}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r6, r7, r8, r9], &(0x7f0000000280)=[{0x0, 0x5, 0xc, 0x5}, {0x2, 0x4, 0x6, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x12, 0xc, &(0x7f0000001a40)=ANY=[@ANYRESOCT=r10, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r13, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008512000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='devlink_health_reporter_state_update\x00', r15}, 0x10) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095", @ANYBLOB="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", @ANYRES16=r13, @ANYRESDEC=r12, @ANYRES8=r11], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r16}, 0x10) close(r15) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) 317.497884ms ago: executing program 1 (id=4080): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'ip6tnl0\x00', @remote}) perf_event_open$cgroup(&(0x7f0000000600)={0x2, 0x80, 0x80, 0x9, 0xef, 0xff, 0x0, 0x4, 0x28000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000500), 0x3}, 0xa028, 0x8, 0x1, 0x8, 0xbcf, 0xfff, 0x1f9, 0x0, 0x4, 0x0, 0x7}, r0, 0xf, r1, 0xb) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x40, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x100}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x79, 0x0, 0x0, 0x8300}, @jmp={0x5, 0x0, 0xa, 0x1, 0x1, 0x4, 0xfffffffffffffffc}, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000880)="a1de5d926c9524a65dffaeac1d655b9de69f5ef0aa", 0x15}], 0x1}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000c000000040000000000000e040000000000000000"], 0x0, 0x58}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x3f, '\x00', r6, r7, 0x5, 0x1, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000001600)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf200000000000002600020007ffffffbd0310000000000095002000000000006916000000000000bf6700000000000004070000b964b01a4607feff00200000540700000ee61e00bf150000000000000f5700000000000065070000d23700002c030000000000001f75000000000000bf54000000000000070000000400f9ffad430100000000007c000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c4ed68ecf264e0f84f9f17d3c30e3c7bdd2d17f2f175455000078af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd390700000500000000f18c30907d7bee45a0100000fe9de56c9d05000000c6c60bef0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cac3f1d5af65727546e7c955ccefa1f6ab689ffffff7f63ede202fa4e0a2127b8b83c71a51445dc8dfd13ff15f852a39e5b2ab7bcb8f512036a5ba6d04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916fcecc8158f0200000000c8fb735fd552bdc268694aeb0743e326c819b6cf5c8ac86f8a297dff0445a13d0045fb3cda30a673a6037ed8c85f21ec2c081bdce431e56723888fb126a19bc1172b84b3ebe174aba210d739a018f9bbec63222d20cecac4d03723f1c921b5bbf7949632cacfdd32b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb400001e3738270b315d362ed834f2af97787f696649a462e7e090000000000000045eac1f2014f720e83b7838e3eede14308d582685e1becd6f35154bcb4000000000000000000000000000000bc3af2b170ad3e2b26539cebca8f4ddc211bc3ccf0bd9d42ca019dd5d022cf74686e9fbe2562979eaed840a7afaab43176e65ec1118d46d1e827f3472f4445d353887a5ad103649afa1769080584f800031e03a651bb04000000ab04871bc47287cd31cc43ea0ffb567b4040c1458d0320ce7d0000413a0000000000000000005f37983f84e98a523d80bd56a57fa82b82f639601ae899a559944cb9a62a29ab028acfc1cb26a0f6a5480a55d624a0c544ba0dc828c22fe30000aa391598000000437d57fcf8295f63a70837f5cd4e5e77964522dc7ca3aa3476b7f2d851d27fd4de6eabb43e0799dc8d9fb7dc6c523ffbd74a6a40e4acb1ac872ade9d1f2ab779b8dbe843aeeda0426c767c00327b8c95b2bb6ddb55117669d9598c0f3598073f3a921c76beceff7e4fbf909a2cabf5b8ea5011db9020823b83abe54346c7af0a99fa077ffe7000feb9e44023a1749eb1d0d572b77d6e0d0fcd74031c8ef2629f5ecff4626746d6abe98a255e92c3c4f79bfcd0d91741380000cfeb73dec68ed56b5d3dfdf0cb8b71ad79000000000000000000000000000000dd434a25e95d0ec29d3adaccf89d0888031ecdfdb4dfbe444673be099ece7e4009c76c7108ef0a7e59fd6d906fbc3c9b412e0478cfee4485f423c63f49db43833c92eeeb647cebd4d7a93a17bcbb6bae5ff876375d4fe39cc2d292691672cc18ca372104ceb83a35ecedd97fc191d8f64d2b1d60c6d12911aada66c26aa4802c3514c3d92ec905000000b13f4a2575fbe943a6c40000000000000000000000000000028026b80c3899543223a6079ee96198b9a326db3be3a48af415ca28ca68c502550044ed8e29af8d763ef9b1f31befcad2ce5394601c7cdc233bff7f0000000000009fb3ad650f77e339768924dfdbeead13b88371154d743544a6091ec93e0d3fd5b4dc42911c1ba322fd4d6fbf19e617d51f964727bfd5cc5ba15370f6e1141d2271eded0b15e4316a1e4623272beb249a0928c417720be14c898f397411c88a7bcf3df46ab3efe7cd5e160c2afd3cc945f75011a102d952c7ad17a58d9be691c334ea35bae71e76e160cc2260bd028162917807ce89e11b5f261052ee0dde18efa1d802af2b7bcf6f8af41933cea0d0343261bccf64ca1c81045153eafbefdb91fbdff9ee3307d4a1837963b2dc2a3698d90e7915b098f19392e792adaea86052f4e948184001b6494e906925a092483adc7e9c8f7a29d226763c100aecae7f00619c36bceb9fb6dd7e55487d8485e498fdfc377fd3d266d21d46ab2f6b2ce22cd0aebba9b0ffbfe8ec3143c3734967c90b16ebbeeae1ce2baaae05aed6bf0f40c8a323f9235dc99698bd0b800067a901a79daada03cc77e74feb98b1586946b452764ff917a8ecc10e529c5bea49cad70e22df522c2803b6ef65df70223c6e22c3433e322d8dbd6e9b040065a9d6b3d5ae276cffe935d559bea88e1aa36b4e6c19e78457904297e77370e013b705a96548d47c609a93c45f4d1382b39c05dcc07d5b49ad75ddb3ce5b5b9416e03995da04647aa5e6fc1a6f5d663380967ccef9de49a90ced031335e3219ebd9d06c257a50497ec523f5ff7361261ccfe239d603364a42e2e81fc068fcbb9792b673827fe7018a988fbce55bb74cdb327ced4b77b8743fb3cb72cc280b9f62e4f92f46a19600b802cba88b7d0a938d9e0e6cfe5d66b874c9a0c6c04b96360d6f499d004179e5b6025c0e1050faec7ecd9de190a975db2f8c06a551236278c4766d7e22e3b85168c9851de6266c791252f919b4f8b257b5a786734e5142e4666c67aef5b7b2f88c6640995434aa8636993089c73f196c54ae829ad4307132655b075ae534fa7f1ea9a17e62357b0bd2bd1d62d34bfc1364640250136729ba4f763ff25c33e8acc806611792add8254e705fefd2a44d5b15e3b36f6b75c97c9c04c511d8cf9e24c61c8284a913a381cb1a5628878040000000000000017b68afd95d4abf7920de9ebe1c89661f4adc3d83d72b1b778e30c2bf2efbbcd054cf51f4205ebf9a98a0d9f18135cb1d8d567c3436fa697b72c3b0200000000000079c0b3339debc78352b2e65299223d7ef2bd540e78167b3ac92a4c4f826f6d0e5c4ebf4f7a70c03e2f5ddbebf168586360c3663531eb5995d228f011a10ffc8b17d716b0c528dab6d0c4fe2ee402348104bc5d4012babedee898c6d3e1017be2e9bc759d3ab4d615f5000000000000000000000000000000000000000000007fff0000000000e693e314adf7dc9f517d04f1e6ca367d30d31d3647c6059db6e1e9529eb1623ef99e2d9ac2ab4872f8e784b07a31110bef6d000000a6f9e89e6d50ee06ce716f94da60f1f22d9669560d296287c13c92070000ee7553eb2df17839542fa88d09f000e88a90cf4406b9000000000000000000000000f441d6a6f516c235c6f5863e7f454ee0e16b9aa2593eb31fa3836703e7765aaeb77a8770e518efaa6d3dd85e03b3b133eb749057cea9af75a0e6f633532f2891b8e263cb6eecea691842827bc7c8c0130187081c8d320642389f5f0c42dba0ff68e84d7b130906f17f6aa075a257310f2d92cb1d1e16468949f5675262ee318e735930b01d8f586e34537bcff7d6196f494cdcf3a712078d745db0f5687a78ee6d000b3d171a0f08299b52d207f32e9da311ca090000003a42732808515eec574f892622c5be497fc3d9ca122d7c18b9e54637812c8debc61f0e42d838e44a819b74bce1a56108bb0fde97a02475920532309c55b2c9ae9f281391ec5cc72a5e94cca1cbf1ff01000000000000bdb537a0c52bd45a9f966c25616cec30c3ea3246cb8e6aac7cf273638e6656a3e4ccadc348f0172028c99cc5f6d5c6d09ed65aa54549e73c28b7c8ad06ad3c5e3c27eec0eff1a6c84f1189919eefcee807fc081e004ffb7d3104af00ac92f1080211c4bee74381a0e31021918f27863fdbafb50f70857d52a1f7df51935a80b1980a4778d35f183ea517f55a98095305701ab3f3ae43f06e91bc7d85e3800b46926944fba9805a985e63e53a62232fcd3f01dbe1728f300e247a7ebe344f9749818ff3961b2a42664ccd680a90bbb6ab400e286acc8f9febef64594777f848ed1cf980a3da2f0f7745760a05887d0c28060d613dd6539d392fc21fee0b5131609664b821d7a994e6c5965a4fa1ec1790c54e54586907dcc5e8bac16e79da9c2444420900000000000000f888a94365b99b72796fca1b922fc9aefaf1546c17cbb1d2d2fd12cb1a49cad501a3ca218c595b667b634606c57987ebfb0783a4948e4561d5cda158fe74453ff4a837beeedba483842c57d6005b544b4f80003386edfd3d4a88a667bd41eefe0d808abed08a29e6bc370a80cc0366fb4080bfbaaa946fd47ab662c794846e403950bbc3a48bb276cbb08a8eab145c06221ef16a238e3d50ad18aea9a2cec97d3c2d0569caabe2bffe02506bc9cb7294c5d020536dd5e7a6351642112df3b55d0215aaec7e45598995e79699e47567e353e68b03f82be860b188554b734e1192f9c1a867b815ef52cdc3307c0cc9be05a40fde69c350e59f11f1d26a4d04d8c8b2c4a4d23ec931d14bc7807db773a614b670acf46f83f7c65a0f8d43c5f64705f0d27c46d4b686e867e9b0be76a7978a8f962bb5a070df97f2bf7612115cfe5ebdc7ad0bc5a5f3ace25347d0e5c347279d55aa67a967380000000000000000000000000000000000000000000000ed0942d980c754c6c69ef65c375ad018824f78b260d5f51bc3feba504408a8c8141d84f3f417603b5081680f346ff0ffbe4ae19e936511966965ce268b6345a0001c0f26a32e0a999fc869292e939dcf89b9bfd794f9c12d41959a00688cca43015a9eec58f647796adea520cd2abeb0b55c22949d10e5a05fee4543fdc1e02554a55b5fef2427a6e5708edc38fac53c2f961945a3f83cdf01979939b49bc6b1aef8c733401bbe473de8d64efbe0d123739f387d1c0d9e74f2175c174ada1678c7db79492e8dd0f34e2ccf419cf7f14ffa408b50a52685b36aed14aa22ad928191d5a2697646edc52a1c0c5d720ae690add2b34aed161f51cc1cb424f76098e1e1921e5a405f9d298a8461f2da30e47b7c6ed7c95c84c745f58723e4cddffae3b53b5b947f9435e589f9ae55b30ecd3827b2de5df31976870823da8058c2538c04e397f3d0ef90c11c74da984fa558697ecb57224ce8fa6f79aadbd7dbf3678e74d790bc2ee72769a3ada1dd504f8e4133ce1effd446bc9a2f139e65cc4bd83912af3122352506c7c2191b3705116b2f4fc20d4e93882bdd6ccea97f3a08d3565b0000000000000000000000000000d35fb97c2d7a9374294dcec3da3df9a13c4fc63b00426682534d894caee0b963a3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe50}, 0x48) 316.970594ms ago: executing program 4 (id=4058): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000950000000000000000e81010d17803db4151cec2c815cec9d717b717851dcf7ce509f3919560739e245c70c8391fd63fff42d4cbab6cb08feb41ad51e6b4c18b9f65929dc83cadb13ca4e58b37268e92769aacc51c02dc4da276"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000e7ffff17120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000740)='ext4_ext_remove_space\x00', r8}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffad, &(0x7f0000000000)='/proc/sys\x00\x00\x01\x00\x00\x00\x00\x00\xff\xbe\xcc\x9a\x18e\xf44.\xd4j\a\x1e\x01\xab%nN\xd4\xa2'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) 249.93503ms ago: executing program 2 (id=4010): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x1e, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x11, &(0x7f0000001b00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x5f8, 0x18}, 0xc) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000)="5db64eb647d6963f60f266c74bdf76", &(0x7f0000000880)=""/77}, 0x20) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000feffffff184b0000faffffff000000000000000018400000060000000000000000000000851000000300000018280000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x44, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xf, 0x2, 0x9}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r6, r7, r8, r9], &(0x7f0000000280)=[{0x0, 0x5, 0xc, 0x5}, {0x2, 0x4, 0x6, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x12, 0xc, &(0x7f0000001a40)=ANY=[@ANYRESOCT=r10, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r13, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008512000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='devlink_health_reporter_state_update\x00', r15}, 0x10) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095", @ANYBLOB="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", @ANYRES16=r13, @ANYRESDEC=r12, @ANYRES8=r11], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r16}, 0x10) close(r15) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) 165.353856ms ago: executing program 0 (id=4081): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff97) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076003008cb89e08f086dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 164.746666ms ago: executing program 1 (id=4082): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async, rerun: 64) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x0, 0x5}, 0x48) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x58, &(0x7f0000000ac0)}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x8, 0x8}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async, rerun: 64) close(r5) (async, rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r4}, &(0x7f0000000240), &(0x7f0000000400)=r8}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES8=r8, @ANYRESOCT=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b706000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001000)={0xffffffffffffffff, 0x20, &(0x7f0000000fc0)={&(0x7f0000000e40)=""/248, 0xf8, 0x0, &(0x7f0000000f40)=""/126, 0x7e}}, 0x10) (rerun: 64) 163.154727ms ago: executing program 3 (id=4083): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x0, 0x89, &(0x7f00000002c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f0000000400), 0x8, 0x8a, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x59a45081a7db797a, '\x00', r2, 0x2, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xffffffffffffffff, 0xfffffffffffffe2f, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x40, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000780)="5d7e70487eef7d97c5c0d33aa5e4afa1718549dc21ad35f5669b8c3bbcb8d165ea609c24b55a9df18cd76ac07b38d6bea580fb2f3af321870b49b23de85a72904057e00426b7ab5b4722705b0b6adf7eaee358211dd50a16ad00dfb37f6afaa95f512ff05107935c645cc25da6ccf4c11a04961e116c5298644069a13a6e6f243d69bd12cb16d36a0cfb8b2242003251bde1caa3", &(0x7f0000000840)=""/220, &(0x7f0000000940)="6455400a816e79defabe1411b7ce10f0b03bd6f635ef15a38712aa7aa57fff5fe33ca8cfeb12a67cd9338b43d49d08b7f0c368f769c72933e18498f33d7b461715d50df18365113b268b9edd986021053e6152d7cc548621fafd3712ccdbcc05797c429ff469ac197e4911cf1bd09e154defd64c254a71765a47ef2990392e79171be126341b1926a094abe75d850634abc1295b3ad571fc0bfeb70087416d9d0532a9442aa8fe194a4742bd21f94c2d38b956156361110b70fa4e444f58f387ea4e4e59b476b5598685", &(0x7f0000000a40)="f521f0f1b98b354395cff5141e8f8768e94b5524b021a4fb9391f25dae2040567d763c72a0c9db1e952065cb2f22db5fc6c23c66aaa49bc7461a7705be7c241b620b313cd3a43c6737f423adf619b3aa7be90504a7ec95c38f061920573b03534fd55eb7f12f0de2c1a5b512a9d8e9c9ae8ee81378ba45b7bff32b2d727ae3ad21e9668141fc74dc3d3f12e18d134a4ac43497cc6c7fe2d29371fc3431", 0xaf, r0, 0x4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYRES16, @ANYRESHEX=r1, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x1f, 0x1, 0x2, &(0x7f0000000680)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) 162.584106ms ago: executing program 4 (id=4058): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000950000000000000000e81010d17803db4151cec2c815cec9d717b717851dcf7ce509f3919560739e245c70c8391fd63fff42d4cbab6cb08feb41ad51e6b4c18b9f65929dc83cadb13ca4e58b37268e92769aacc51c02dc4da276"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000e7ffff17120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000740)='ext4_ext_remove_space\x00', r8}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffad, &(0x7f0000000000)='/proc/sys\x00\x00\x01\x00\x00\x00\x00\x00\xff\xbe\xcc\x9a\x18e\xf44.\xd4j\a\x1e\x01\xab%nN\xd4\xa2'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) 76.863254ms ago: executing program 0 (id=4084): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c0000000300000008000000000000001b22fcba0100000d0000000000000000170000000000000800000005000000"], 0x0, 0x47, 0xfffffffffffffe7f}, 0x20) ioctl$TUNSETOFFLOAD(r4, 0x40047451, 0x2000000c) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000, r0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8940, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_UPDATE_BATCH(0x18, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x2, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x10, &(0x7f00000006c0)=@framed={{}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r2, @ANYBLOB="a40a34382083bb51c54e48dcfa3582e49c67101ed156ca9ac25e2e92a53f7bbd1fdc780b46c3af6beef642b5255ae28c448004c75e775f93282601b7765dfbbd10edef9a9f1d3af664abf4137c40f60ac47e2d7d1f54f92ea4363098c40becc9f35390be7c5988328c4fe784199fa31d2ceaeaf29f75f1b05e2e8b0ad6ff6d6ba9883568284ae973dddc117b3cc10000209bc52d90650b1ba8c0", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@typedef={0x4, 0x0, 0x0, 0x7}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0xe}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0xda]}}, &(0x7f0000000340)=""/142, 0x52, 0x35b, 0x1}, 0x20) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_int(r7, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000280)=ANY=[@ANYBLOB='1-2:5/', @ANYRESOCT, @ANYBLOB='E'], 0x31) socketpair(0x29, 0xa, 0x6f0015ad, &(0x7f0000000300)={0xffffffffffffffff}) close(r9) 76.051454ms ago: executing program 1 (id=4085): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x14, &(0x7f00000008c0)=ANY=[@ANYBLOB="18001811000077de6473935e2fa1e4e8d839de33f412bca1bd734988d441d2ccab268dd0bb0ab89ca7c07d59bdc4b634477f07daec06a3fa969785fb3d782463f2753e83a78ecadd14ad419aae4aa90b9cc9c75ba18a279198ce653658d626a26709b1ac6ac837854249f3013268fdc2f0baea1d625c24203a3bcbbb909a121ea55b54ffec480e20c7a3dff4037408732fa9a3685c470e4a6d24fec180a7be91a24048cb79d4294ebf4a33f85411201a00ef51be07d9718e5424938c7bb1ac4ba74aeded", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000852000000100000018140000", @ANYRES32, @ANYBLOB="000000000000000085000000d20000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1f, 0x5, 0x2, 0x1bc, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000fdf3ffff000000000000000095100000000000ff1f50f6b804b4f3f85b7b8c1e79bda8c069cdc3f64207d63bcc3eb6c1538daebf5b620712b1f8962b89872f375c8bf6da16f69545390d83d20386ad0c38592572a6c7b2f3c8a27169af929081c344af9b8096811224438f9fbb8da154ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0xda3bc70111eb96e0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1002}, 0x90) (async) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x18000) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff85000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_procs(r5, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r6, &(0x7f0000000140), 0x12) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) 74.600244ms ago: executing program 2 (id=4010): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000940)=[0x0], 0x0, 0x1e, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x11, &(0x7f0000001b00)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0xffffffffffffffff, 0x5f8, 0x18}, 0xc) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xff4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r8, &(0x7f0000000000)="5db64eb647d6963f60f266c74bdf76", &(0x7f0000000880)=""/77}, 0x20) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x10, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000feffffff184b0000faffffff000000000000000018400000060000000000000000000000851000000300000018280000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x44, '\x00', 0x0, 0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x1, 0xf, 0x2, 0x9}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000400)=[r6, r7, r8, r9], &(0x7f0000000280)=[{0x0, 0x5, 0xc, 0x5}, {0x2, 0x4, 0x6, 0x8}, {0x2, 0x5, 0x6, 0x4}], 0x10, 0x7}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x12, 0xc, &(0x7f0000001a40)=ANY=[@ANYRESOCT=r10, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x500, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r13, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008512000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='devlink_health_reporter_state_update\x00', r15}, 0x10) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095", @ANYBLOB="8aee21fd4d7a71e35c0bccc36a1350ee1d3c0cc08be231e69cdef588d4030733d3f207c670f756de4f3d12bad91ea23e355899992167bc5c7801528aa132b75c9e6c6dba9f082e67d5cb46088dd1b79b24c5d4f5e25abf194016b0073ae2092db97f3a4e9620b0def8979cda241abc09bfb66e9082466873e2bb82cd9cbabcd30678b1453aeeacc6225a67a3f32a8a0321b7f9c7845c96d4a0776441c3d70a85c2707b2e787cb24a023828d8bc127773a543393ed12b5e242defe6ffe17296e44992c43323b7b9ebe30e450bbd2745ffa5a53d097efff9b2d5037c4981a93be2a591c3517869592658c10279f486688a6424deaeb1b34aae0f37", @ANYRES16=r13, @ANYRESDEC=r12, @ANYRES8=r11], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r16}, 0x10) close(r15) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.53598ms ago: executing program 3 (id=4086): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f00000004c0), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000001000)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91101000000000b7020000000000008500000000000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 4 (id=4058): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000950000000000000000e81010d17803db4151cec2c815cec9d717b717851dcf7ce509f3919560739e245c70c8391fd63fff42d4cbab6cb08feb41ad51e6b4c18b9f65929dc83cadb13ca4e58b37268e92769aacc51c02dc4da276"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000005c0)={&(0x7f0000000340)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="180800000080ad00000000000000000018c3e20025b71d74a9088903e01ea2f980cc97fb5f46a83fb3db6d1524332e18eaa5daf449c4c3084a06d9c8259519af921b6e8d61ed546d32e2a4240ee803a25fa53a4f8fa2978aa8c9c4e610da176694c82da3abedd53b504e71d1f772959cad23768bb050901c9597ed96772a170f8594a163903ed4474b59a454a966be0a8040d0855ca54b88a37da72c20fde8545e2dc50f93204c958a5e5eef46e5302838a6606aece5147e93b9ff852c4ad9be3a40b13a72a915256939868d4d96fbc986e418547a39ef119ba096a34af765e52bfd4cfccf0d3fb0afda5034c5235f53671c0be877a40e6d0bd5e097098a54a77d865d8e6c05dec39ff2258e2182986e5607e873e2d6e1d94378c275f203c6ac1203902179f15bf37ae79aa47567c500723ed254bdb65fbcf1f5455e84fcba6285c0be1ce07807259ecbe53ccc79f4c25f99ebc7508d20407398fe6e8906210f515c6852eab7292abb429f07ce9a8666ae8defdbff62b286bc750c19e56b79e64799bc391a9bf8ce484f34e3863e898f0c187909e5268a01d1d0ed66a9365ab2d7ad9764f95418c6ba067923d33272eee3ab1ef5ec168880d2cd226def9255aa4498d5eceab5573dcb885fa70474b1c45c9ba04d2ca81bf83d57890d000000000000fd", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000e7ffff17120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000430000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000740)='ext4_ext_remove_space\x00', r8}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffad, &(0x7f0000000000)='/proc/sys\x00\x00\x01\x00\x00\x00\x00\x00\xff\xbe\xcc\x9a\x18e\xf44.\xd4j\a\x1e\x01\xab%nN\xd4\xa2'}, 0x30) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) kernel console output (not intermixed with test programs): eady [ 23.532277][ T283] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.550638][ T284] device veth1_macvtap entered promiscuous mode [ 23.570251][ T288] device veth1_macvtap entered promiscuous mode [ 23.612840][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.626039][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.649943][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.658426][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.681287][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.689588][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.698325][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.706685][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.714967][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.724419][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.732775][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.740900][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.779330][ T337] device pim6reg1 entered promiscuous mode [ 23.897808][ C1] hrtimer: interrupt took 27794 ns [ 24.017675][ T371] syz.1.17[371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 24.017725][ T371] syz.1.17[371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.059986][ T413] device wg2 entered promiscuous mode [ 25.560382][ T433] syz.3.30[433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.560434][ T433] syz.3.30[433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.600056][ T435] syz.2.31[435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.640731][ T435] syz.2.31[435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.699374][ T441] syz.1.33[441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.717181][ T441] syz.1.33[441] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.008031][ T454] device wg2 left promiscuous mode [ 26.467374][ T464] device wg2 entered promiscuous mode [ 26.503181][ T467] device veth1_macvtap left promiscuous mode [ 26.532781][ T467] device macsec0 entered promiscuous mode [ 26.608826][ T467] device veth1_macvtap entered promiscuous mode [ 26.667995][ T479] syz.2.45[479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.668047][ T479] syz.2.45[479] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.804991][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 26.805001][ T24] audit: type=1400 audit(1722552529.140:118): avc: denied { create } for pid=487 comm="syz.3.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 26.845198][ T490] device pim6reg1 entered promiscuous mode [ 26.851868][ T24] audit: type=1400 audit(1722552529.190:119): avc: denied { write } for pid=483 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.977269][ T24] audit: type=1400 audit(1722552529.320:120): avc: denied { create } for pid=494 comm="syz.4.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.011123][ T24] audit: type=1400 audit(1722552529.340:121): avc: denied { write } for pid=494 comm="syz.4.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.219051][ T505] cgroup: syz.1.55 (505) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 27.220459][ T499] device wg2 entered promiscuous mode [ 27.240538][ T505] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 27.241184][ T24] audit: type=1400 audit(1722552529.580:122): avc: denied { create } for pid=509 comm="syz.2.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 27.356947][ T24] audit: type=1400 audit(1722552529.580:123): avc: denied { create } for pid=509 comm="syz.2.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 27.445202][ T24] audit: type=1400 audit(1722552529.750:124): avc: denied { create } for pid=521 comm="syz.3.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.638196][ T24] audit: type=1400 audit(1722552529.750:125): avc: denied { write } for pid=521 comm="syz.3.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.731318][ T24] audit: type=1400 audit(1722552529.830:126): avc: denied { write } for pid=537 comm="syz.0.65" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.866184][ T24] audit: type=1400 audit(1722552529.940:127): avc: denied { setopt } for pid=525 comm="syz.4.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 27.940414][ T543] device pim6reg1 entered promiscuous mode [ 28.488881][ T560] device wg2 entered promiscuous mode [ 29.085019][ T614] syz.0.83 (614) used obsolete PPPIOCDETACH ioctl [ 29.154327][ T633] bpf_get_probe_write_proto: 8 callbacks suppressed [ 29.154336][ T633] syz.4.91[633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.161131][ T633] syz.4.91[633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.268900][ T643] device syzkaller0 entered promiscuous mode [ 29.660473][ T669] device syzkaller0 entered promiscuous mode [ 29.729078][ T701] syz.4.109[701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.729126][ T701] syz.4.109[701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 29.809035][ T706] device pim6reg1 entered promiscuous mode [ 30.048882][ T723] device pim6reg1 entered promiscuous mode [ 30.458315][ T735] syz.4.119[735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.458365][ T735] syz.4.119[735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.959637][ T766] syz.2.126[766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 30.970731][ T766] syz.2.126[766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.197237][ T826] syz.1.142[826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.375919][ T826] syz.1.142[826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.595267][ T934] device veth0_vlan left promiscuous mode [ 35.039238][ T934] device veth0_vlan entered promiscuous mode [ 35.506435][ T963] bpf_get_probe_write_proto: 2 callbacks suppressed [ 35.506444][ T963] syz.2.174[963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.586023][ T963] syz.2.174[963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.148161][ T24] kauditd_printk_skb: 5 callbacks suppressed [ 36.148172][ T24] audit: type=1400 audit(1722552538.490:133): avc: denied { create } for pid=993 comm="syz.0.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.338573][ T24] audit: type=1400 audit(1722552538.680:134): avc: denied { create } for pid=1008 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 36.978166][ T1058] syz.2.205[1058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.978237][ T1058] syz.2.205[1058] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.080311][ T1059] syz.2.205[1059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.091677][ T1059] syz.2.205[1059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.992671][ T1121] device veth0_to_team entered promiscuous mode [ 38.013628][ T1122] device sit0 entered promiscuous mode [ 38.103256][ T24] audit: type=1400 audit(1722552540.440:135): avc: denied { create } for pid=1126 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 38.864200][ T1157] syz.4.230[1157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.864253][ T1157] syz.4.230[1157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.877910][ T1161] syz.2.231[1161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.895835][ T1161] syz.2.231[1161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.938740][ T1154] device veth0_vlan left promiscuous mode [ 39.111489][ T1154] device veth0_vlan entered promiscuous mode [ 39.263479][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.277819][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.285360][ T920] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 39.301702][ T1173] device veth0_to_team entered promiscuous mode [ 39.361775][ T24] audit: type=1400 audit(1722552541.700:136): avc: denied { create } for pid=1183 comm="syz.2.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 39.659888][ T1220] device veth0_vlan left promiscuous mode [ 39.940366][ T1220] device veth0_vlan entered promiscuous mode [ 40.131157][ T1230] device veth1_macvtap left promiscuous mode [ 40.137420][ T1230] device macsec0 entered promiscuous mode [ 40.208217][ T1230] device veth1_macvtap entered promiscuous mode [ 40.790887][ T24] audit: type=1400 audit(1722552543.130:137): avc: denied { create } for pid=1279 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 41.553414][ T1334] bridge0: port 2(bridge_slave_1) entered disabled state [ 41.560460][ T1334] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.702877][ T1402] device syzkaller0 entered promiscuous mode [ 43.510555][ T1438] ------------[ cut here ]------------ [ 43.557495][ T1438] trace type BPF program uses run-time allocation [ 43.594504][ T1438] WARNING: CPU: 1 PID: 1438 at kernel/bpf/verifier.c:10493 check_map_prog_compatibility+0x65b/0x7c0 [ 43.607975][ T1438] Modules linked in: [ 43.611791][ T1438] CPU: 0 PID: 1438 Comm: syz.0.309 Not tainted 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 43.621511][ T1438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 43.643511][ T1438] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 43.650832][ T1438] Code: c8 e9 84 fe ff ff e8 24 f5 ee ff 31 db e9 85 fe ff ff e8 18 f5 ee ff c6 05 2e 13 65 05 01 48 c7 c7 40 73 45 85 e8 d5 7b c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 43.795999][ T1438] RSP: 0018:ffffc90000f56f90 EFLAGS: 00010246 [ 43.815034][ T1438] RAX: ea4eee77da224d00 RBX: ffff88811153d000 RCX: 0000000000040000 [ 43.824810][ T1438] RDX: ffffc9000112b000 RSI: 00000000000008a7 RDI: 00000000000008a8 [ 43.833269][ T1438] RBP: ffffc90000f56fd0 R08: ffffffff81521b78 R09: ffffed103ee2a5f8 [ 43.841328][ T1438] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 43.858716][ T1438] R13: 1ffff92000019c04 R14: ffff888114fcc000 R15: ffffc900000ce020 [ 43.866988][ T1438] FS: 00007ff3c4f976c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 43.895158][ T1438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 43.913025][ T1438] CR2: 0000000000000000 CR3: 0000000106985000 CR4: 00000000003506b0 [ 43.934814][ T1438] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 43.961960][ T1438] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 43.982940][ T1438] Call Trace: [ 43.983565][ T1425] device syzkaller0 entered promiscuous mode [ 43.991590][ T1438] ? show_regs+0x58/0x60 [ 44.003794][ T1438] ? __warn+0x160/0x2f0 [ 44.014587][ T1438] ? check_map_prog_compatibility+0x65b/0x7c0 [ 44.030716][ T1438] ? report_bug+0x3d9/0x5b0 [ 44.165751][ T1438] ? check_map_prog_compatibility+0x65b/0x7c0 [ 44.185710][ T1438] ? handle_bug+0x41/0x70 [ 44.189881][ T1438] ? exc_invalid_op+0x1b/0x50 [ 44.205764][ T1438] ? asm_exc_invalid_op+0x12/0x20 [ 44.212076][ T1438] ? wake_up_klogd+0xb8/0xf0 [ 44.225173][ T1438] ? check_map_prog_compatibility+0x65b/0x7c0 [ 44.242428][ T1438] ? __fdget+0x1bc/0x240 [ 44.246559][ T1438] resolve_pseudo_ldimm64+0x586/0x1020 [ 44.251908][ T1438] ? bpf_check+0xf2b0/0xf2b0 [ 44.261845][ T1438] ? kvmalloc_node+0x82/0x130 [ 44.270611][ T1438] bpf_check+0xaf21/0xf2b0 [ 44.274856][ T1438] ? stack_depot_save+0xe/0x10 [ 44.279515][ T1438] ? __se_sys_bpf+0x9856/0x11cb0 [ 44.287758][ T1438] ? sched_clock+0x3a/0x40 [ 44.299314][ T1438] ? 0xffffffffa0026000 [ 44.303383][ T1438] ? bpf_get_btf_vmlinux+0x60/0x60 [ 44.320798][ T1438] ? __kernel_text_address+0x9b/0x110 [ 44.326233][ T1438] ? unwind_get_return_address+0x4d/0x90 [ 44.332035][ T1438] ? arch_stack_walk+0xf3/0x140 [ 44.337026][ T1438] ? stack_trace_save+0x113/0x1c0 [ 44.342054][ T1438] ? stack_trace_snprint+0xf0/0xf0 [ 44.347396][ T1438] ? stack_trace_snprint+0xf0/0xf0 [ 44.352515][ T1438] ? selinux_bpf_prog_alloc+0x51/0x140 [ 44.367577][ T1438] ? selinux_bpf_prog_alloc+0x51/0x140 [ 44.372923][ T1438] ? ____kasan_kmalloc+0xed/0x110 [ 44.378016][ T1438] ? ____kasan_kmalloc+0xdb/0x110 [ 44.382894][ T1438] ? __kasan_kmalloc+0x9/0x10 [ 44.387678][ T1438] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 44.393069][ T1438] ? selinux_bpf_prog_alloc+0x51/0x140 [ 44.398638][ T1438] ? security_bpf_prog_alloc+0x62/0x90 [ 44.404112][ T1438] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 44.409284][ T1438] ? __x64_sys_bpf+0x7b/0x90 [ 44.413739][ T1438] ? do_syscall_64+0x34/0x70 [ 44.419514][ T1438] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.425414][ T1438] ? __kasan_kmalloc+0x9/0x10 [ 44.433772][ T1438] __se_sys_bpf+0x107a2/0x11cb0 [ 44.446474][ T1438] ? __kasan_check_write+0x14/0x20 [ 44.460187][ T1438] ? __x64_sys_bpf+0x90/0x90 [ 44.470371][ T1438] ? futex_wake+0x630/0x790 [ 44.474706][ T1438] ? do_futex+0x13c5/0x17b0 [ 44.489251][ T1438] ? fsnotify_grab_connector+0xda/0x120 [ 44.494618][ T1438] ? rcu_gp_kthread_wake+0x90/0x90 [ 44.515659][ T1438] ? fsnotify_destroy_marks+0x1ee/0x5b0 [ 44.526447][ T1438] ? selinux_inode_free_security+0x1f4/0x200 [ 44.542436][ T1438] ? futex_exit_release+0x1e0/0x1e0 [ 44.552514][ T1438] ? __destroy_inode+0x35f/0x4e0 [ 44.562598][ T1438] ? clear_inode+0x13b/0x190 [ 44.570200][ T1438] ? sock_alloc_inode+0xb0/0xb0 [ 44.586459][ T1438] ? __kasan_check_write+0x14/0x20 [ 44.591394][ T1438] ? _raw_spin_lock+0xa4/0x1b0 [ 44.612282][ T1438] ? _raw_spin_trylock_bh+0x190/0x190 [ 44.626227][ T1438] ? iput+0x632/0x7e0 [ 44.636636][ T1438] ? __se_sys_futex+0x355/0x470 [ 44.648904][ T1438] ? fpu__clear_all+0x20/0x20 [ 44.660807][ T1438] ? __kasan_check_read+0x11/0x20 [ 44.673570][ T1438] __x64_sys_bpf+0x7b/0x90 [ 44.678095][ T1438] do_syscall_64+0x34/0x70 [ 44.682322][ T1438] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.688445][ T1438] RIP: 0033:0x7ff3c63173b9 [ 44.692687][ T1438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.712418][ T1438] RSP: 002b:00007ff3c4f97048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 44.720940][ T1438] RAX: ffffffffffffffda RBX: 00007ff3c64a5f80 RCX: 00007ff3c63173b9 [ 44.730610][ T1438] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 44.738611][ T1438] RBP: 00007ff3c63848e6 R08: 0000000000000000 R09: 0000000000000000 [ 44.746633][ T1438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.754447][ T1438] R13: 000000000000000b R14: 00007ff3c64a5f80 R15: 00007ffe90507708 [ 44.773397][ T1438] ---[ end trace 6c25ad569d4e992b ]--- [ 44.784058][ T1468] bpf_get_probe_write_proto: 2 callbacks suppressed [ 44.784067][ T1468] syz.2.316[1468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.798046][ T1468] syz.2.316[1468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.588291][ T24] audit: type=1400 audit(1722552547.930:138): avc: denied { create } for pid=1524 comm="syz.2.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 45.650310][ T1534] syz.2.332[1534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.650356][ T1534] syz.2.332[1534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 45.812260][ T1551] device sit0 left promiscuous mode [ 45.985371][ T1553] device sit0 entered promiscuous mode [ 47.505209][ T1619] device syz_tun entered promiscuous mode [ 47.648945][ T24] audit: type=1400 audit(1722552549.990:139): avc: denied { ioctl } for pid=1627 comm="syz.3.360" path="uts:[4026532284]" dev="nsfs" ino=4026532284 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 48.542515][ T1654] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.549478][ T1654] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.557881][ T1655] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.564750][ T1655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.571876][ T1655] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.578634][ T1655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.586026][ T1655] device bridge0 entered promiscuous mode [ 48.746435][ T1660] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.753439][ T1660] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.762446][ T1660] device bridge0 left promiscuous mode [ 48.774487][ T1661] device bridge_slave_1 left promiscuous mode [ 48.833262][ T1661] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.883318][ T1661] device bridge_slave_0 left promiscuous mode [ 48.891512][ T1661] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.519311][ T1690] device syzkaller0 entered promiscuous mode [ 49.620828][ T1701] device pim6reg1 entered promiscuous mode [ 49.888683][ T1720] device sit0 left promiscuous mode [ 49.919154][ T1722] device sit0 entered promiscuous mode [ 52.004189][ T1775] bridge_slave_0: mtu greater than device maximum [ 53.646176][ T1804] syz.2.404[1804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 53.646229][ T1804] syz.2.404[1804] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.560932][ T24] audit: type=1400 audit(1722552556.900:140): avc: denied { create } for pid=1829 comm="syz.4.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 54.648898][ T1837] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 54.654373][ T1837] pim6reg0: linktype set to 769 [ 55.529980][ T1863] syz.2.419[1863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 55.530021][ T1863] syz.2.419[1863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 56.850616][ T1916] syz.1.434[1916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.074295][ T1916] syz.1.434[1916] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.440984][ T1918] device pim6reg1 entered promiscuous mode [ 58.431486][ T1956] syz.1.446[1956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 58.431526][ T1956] syz.1.446[1956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.119737][ T1990] device pim6reg1 entered promiscuous mode [ 59.850465][ T2004] syz.0.458[2004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.850506][ T2004] syz.0.458[2004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.297162][ T2023] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.315150][ T2023] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.325976][ T2023] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.332838][ T2023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.339943][ T2023] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.346729][ T2023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.424294][ T2023] device bridge0 entered promiscuous mode [ 61.006862][ T2043] syz.2.471[2043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.006910][ T2043] syz.2.471[2043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.135808][ T2052] device pim6reg1 entered promiscuous mode [ 61.346638][ T2076] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.354808][ T2076] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.366195][ T2076] device bridge0 left promiscuous mode [ 61.564881][ T2091] device syzkaller0 entered promiscuous mode [ 62.360303][ T2114] syz.3.491[2114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.360353][ T2114] syz.3.491[2114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.717601][ T24] audit: type=1400 audit(1722552565.050:141): avc: denied { create } for pid=2125 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 62.824691][ T2137] device sit0 entered promiscuous mode [ 63.144191][ T2165] device pim6reg1 entered promiscuous mode [ 63.533712][ T2180] syz.1.507[2180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.533760][ T2180] syz.1.507[2180] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.918524][ T2192] bridge_slave_0: mtu greater than device maximum [ 64.339482][ T2214] syz.0.520[2214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.339535][ T2214] syz.0.520[2214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.408977][ T2224] bridge_slave_0: mtu greater than device maximum [ 64.856712][ T2255] syz.0.535[2255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 64.856761][ T2255] syz.0.535[2255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.131534][ T2270] device vxcan1 entered promiscuous mode [ 65.162917][ T2256] bridge0: port 3(veth0_to_batadv) entered blocking state [ 65.175787][ T2256] bridge0: port 3(veth0_to_batadv) entered disabled state [ 65.243567][ T2256] device veth0_to_batadv entered promiscuous mode [ 65.277736][ T2274] device veth0_to_batadv left promiscuous mode [ 65.283871][ T2274] bridge0: port 3(veth0_to_batadv) entered disabled state [ 65.371685][ T2284] device pim6reg1 entered promiscuous mode [ 65.676977][ T2304] syz.2.547[2304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.677027][ T2304] syz.2.547[2304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.089908][ T2325] bridge0: port 3(veth0_to_batadv) entered blocking state [ 66.125390][ T2325] bridge0: port 3(veth0_to_batadv) entered disabled state [ 66.132903][ T2325] device veth0_to_batadv entered promiscuous mode [ 66.152982][ T2325] bridge0: port 3(veth0_to_batadv) entered blocking state [ 66.159945][ T2325] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 66.183393][ T2322] device veth0_to_batadv left promiscuous mode [ 66.196360][ T2322] bridge0: port 3(veth0_to_batadv) entered disabled state [ 66.329215][ T24] audit: type=1400 audit(1722552568.670:142): avc: denied { create } for pid=2333 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 66.619902][ T2350] syz.1.561[2350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.619951][ T2350] syz.1.561[2350] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.821313][ T2358] syz.1.563[2358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.945948][ T2358] syz.1.563[2358] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.429206][ T2461] syz.3.592[2461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.523601][ T2461] syz.3.592[2461] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.838798][ T24] audit: type=1400 audit(1722552572.180:143): avc: denied { create } for pid=2491 comm="syz.2.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 69.978730][ T2514] syz.0.608[2514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.978779][ T2514] syz.0.608[2514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.990296][ T24] audit: type=1400 audit(1722552572.300:144): avc: denied { create } for pid=2507 comm="syz.2.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 70.069343][ T2512] device syzkaller0 entered promiscuous mode [ 71.419636][ T2557] device pim6reg1 entered promiscuous mode [ 71.590618][ T2598] syz.3.626[2598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 71.590672][ T2598] syz.3.626[2598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.545265][ T24] audit: type=1400 audit(1722552574.880:145): avc: denied { ioctl } for pid=2640 comm="syz.0.638" path="socket:[20835]" dev="sockfs" ino=20835 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 72.716212][ T2650] syz.1.640[2650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 72.716264][ T2650] syz.1.640[2650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.323585][ T2700] device syzkaller0 entered promiscuous mode [ 73.864880][ T2709] syz.2.655[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 73.864929][ T2709] syz.2.655[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 75.898775][ T2819] device syzkaller0 entered promiscuous mode [ 76.021149][ T2846] syz.0.692[2846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.021226][ T2846] syz.0.692[2846] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.541366][ T2889] device veth0_vlan left promiscuous mode [ 76.805736][ T2889] device veth0_vlan entered promiscuous mode [ 76.989154][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 77.029999][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 77.080202][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.615321][ T2954] device syzkaller0 entered promiscuous mode [ 79.356061][ T3005] syz.1.742[3005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.356112][ T3005] syz.1.742[3005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.237332][ T3087] syz.2.761[3087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.325845][ T3087] syz.2.761[3087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.026451][ T24] audit: type=1400 audit(1722552586.370:146): avc: denied { create } for pid=3095 comm="syz.1.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 84.333313][ T24] audit: type=1400 audit(1722552586.670:147): avc: denied { create } for pid=3104 comm="syz.3.768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 84.432992][ T3139] syz.1.772[3139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.433045][ T3139] syz.1.772[3139] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 85.328619][ T3171] device sit0 left promiscuous mode [ 85.368097][ T3175] lo: mtu less than device minimum [ 85.378510][ T3176] device sit0 entered promiscuous mode [ 86.144597][ T3188] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.149230][ T3194] syz.2.785[3194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.151572][ T3194] syz.2.785[3194] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.151579][ T3188] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.486040][ T3203] device pim6reg1 entered promiscuous mode [ 86.494177][ T24] audit: type=1400 audit(1722552588.830:148): avc: denied { create } for pid=3233 comm="syz.2.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 86.622952][ T24] audit: type=1400 audit(1722552588.960:149): avc: denied { create } for pid=3245 comm="syz.0.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 86.651264][ T24] audit: type=1400 audit(1722552588.990:150): avc: denied { append } for pid=3245 comm="syz.0.796" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 86.679352][ T3254] syz.0.799[3254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.679395][ T3254] syz.0.799[3254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.776069][ T3266] ʮ}p: renamed from pim6reg1 [ 86.983923][ T3298] syz.2.814[3298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.983967][ T3298] syz.2.814[3298] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.123261][ T3303] device veth0_vlan left promiscuous mode [ 87.141987][ T3303] device veth0_vlan entered promiscuous mode [ 87.152328][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 87.164547][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 87.180297][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 87.352599][ T3316] : renamed from vlan1 [ 88.024894][ T3335] device veth0_vlan left promiscuous mode [ 88.031138][ T3335] device veth0_vlan entered promiscuous mode [ 88.105501][ T3339] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.112497][ T3339] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.120470][ T3339] device bridge_slave_0 entered promiscuous mode [ 88.136825][ T3339] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.153376][ T3339] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.160907][ T3339] device bridge_slave_1 entered promiscuous mode [ 88.208889][ T24] audit: type=1400 audit(1722552590.550:151): avc: denied { create } for pid=3339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.247061][ T24] audit: type=1400 audit(1722552590.570:152): avc: denied { write } for pid=3339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.268965][ T1765] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.276901][ T1765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 88.295298][ T24] audit: type=1400 audit(1722552590.570:153): avc: denied { read } for pid=3339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.346313][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 88.359818][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 88.375838][ T1767] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.382684][ T1767] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.400182][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 88.415404][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.423967][ T1767] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.430823][ T1767] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.438533][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 88.446392][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 88.472551][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 88.500671][ T3339] device veth0_vlan entered promiscuous mode [ 88.515950][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 88.524161][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 88.550798][ T3381] bpf_get_probe_write_proto: 2 callbacks suppressed [ 88.550806][ T3381] syz.0.838[3381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.557774][ T3381] syz.0.838[3381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.585936][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 88.604251][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 88.621038][ T3339] device veth1_macvtap entered promiscuous mode [ 88.629402][ T1765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 88.675345][ T3129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 88.700014][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 88.734928][ T24] audit: type=1400 audit(1722552591.070:154): avc: denied { mounton } for pid=3339 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.928213][ T24] audit: type=1400 audit(1722552591.250:155): avc: denied { create } for pid=3386 comm="syz.0.840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 89.643048][ T3408] device vxcan1 entered promiscuous mode [ 89.707675][ T3417] syz.3.848[3417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.707719][ T3417] syz.3.848[3417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.748426][ T3428] syz.0.852[3428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.759858][ T3428] syz.0.852[3428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.271093][ T3470] syz.3.864[3470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.308889][ T3470] syz.3.864[3470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.441434][ T436] device bridge_slave_1 left promiscuous mode [ 90.481108][ T436] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.498882][ T436] device bridge_slave_0 left promiscuous mode [ 90.506243][ T436] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.526288][ T436] device veth1_macvtap left promiscuous mode [ 90.532170][ T436] device veth0_vlan left promiscuous mode [ 91.239048][ T3516] tap0: tun_chr_ioctl cmd 1074025677 [ 91.244178][ T3516] tap0: linktype set to 776 [ 91.275010][ T3518] syz.3.878[3518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 91.275062][ T3518] syz.3.878[3518] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 92.528635][ T3569] device sit0 left promiscuous mode [ 92.575333][ T3569] device sit0 entered promiscuous mode [ 93.050233][ T3593] device veth1_macvtap left promiscuous mode [ 93.061620][ T3593] device macsec0 left promiscuous mode [ 93.094353][ T3593] device veth1_macvtap entered promiscuous mode [ 93.124873][ T3593] device macsec0 entered promiscuous mode [ 93.502265][ T3603] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.531295][ T3603] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.613287][ T3603] device bridge_slave_0 entered promiscuous mode [ 93.722072][ T3617] device syzkaller0 entered promiscuous mode [ 93.728482][ T3603] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.767227][ T3603] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.787338][ T3603] device bridge_slave_1 entered promiscuous mode [ 93.809868][ T3633] bpf_get_probe_write_proto: 4 callbacks suppressed [ 93.809877][ T3633] syz.3.916[3633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.826139][ T3633] syz.3.916[3633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.990544][ T3603] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.008447][ T3603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 94.015648][ T3603] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.022399][ T3603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.315745][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 94.323937][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 94.334843][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 94.342302][ T3124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 94.372370][ T3123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 94.386578][ T3123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.484349][ T3662] syz.0.924[3662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.484400][ T3662] syz.0.924[3662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.510261][ T3603] device veth0_vlan entered promiscuous mode [ 94.528007][ T3122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.537329][ T3122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.545076][ T3122] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.553018][ T3122] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.582479][ T3122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.590798][ T3122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.602260][ T3603] device veth1_macvtap entered promiscuous mode [ 94.613200][ T898] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.623820][ T898] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.633706][ T898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.650513][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.659189][ T1767] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.669742][ T3670] syz.3.927[3670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.669806][ T3670] syz.3.927[3670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.696719][ T3666] device sit0 entered promiscuous mode [ 95.828203][ T3716] device veth0_vlan left promiscuous mode [ 96.016062][ T3716] device veth0_vlan entered promiscuous mode [ 96.559953][ T3745] syz.4.944[3745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.560005][ T3745] syz.4.944[3745] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 96.918658][ T3771] device veth1_macvtap left promiscuous mode [ 97.091375][ T3782] bridge0: port 3(veth0_to_batadv) entered blocking state [ 97.120129][ T3782] bridge0: port 3(veth0_to_batadv) entered disabled state [ 97.156333][ T3782] device veth0_to_batadv entered promiscuous mode [ 97.244797][ T3782] bridge0: port 3(veth0_to_batadv) entered blocking state [ 97.251779][ T3782] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 97.446260][ T3784] device veth0_to_batadv left promiscuous mode [ 97.475122][ T3784] bridge0: port 3(veth0_to_batadv) entered disabled state [ 97.484633][ T3796] syz.3.962[3796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.484678][ T3796] syz.3.962[3796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.530486][ T3804] device pim6reg1 entered promiscuous mode [ 97.841818][ T3810] device syzkaller0 entered promiscuous mode [ 97.885387][ T3845] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 97.894903][ T3845] device syzkaller0 entered promiscuous mode [ 97.959216][ T3861] device syzkaller0 entered promiscuous mode [ 98.509404][ T3905] device pim6reg1 entered promiscuous mode [ 98.617381][ T3931] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.624361][ T3931] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.678892][ T3935] device wg2 left promiscuous mode [ 99.104636][ T3963] device syzkaller0 entered promiscuous mode [ 100.618683][ T3995] device syzkaller0 entered promiscuous mode [ 101.100560][ T4009] device syzkaller0 entered promiscuous mode [ 101.502267][ T4034] bpf_get_probe_write_proto: 4 callbacks suppressed [ 101.502275][ T4034] syz.1.1027[4034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.508976][ T4034] syz.1.1027[4034] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.548862][ T4037] syz.3.1029 uses obsolete (PF_INET,SOCK_PACKET) [ 101.770433][ T4042] tap0: tun_chr_ioctl cmd 1074025678 [ 101.782351][ T4042] tap0: group set to 0 [ 101.791068][ T4058] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.797955][ T4058] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.805030][ T4058] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.811826][ T4058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.820151][ T4058] device bridge0 entered promiscuous mode [ 102.500923][ T4091] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 102.537520][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 103.515105][ T4117] tap0: tun_chr_ioctl cmd 1074025678 [ 103.520352][ T4117] tap0: group set to 0 [ 104.076042][ T4161] tap0: tun_chr_ioctl cmd 1074025678 [ 104.081765][ T4161] tap0: group set to 0 [ 105.793682][ T4235] device veth0_vlan left promiscuous mode [ 105.824728][ T4235] device veth0_vlan entered promiscuous mode [ 105.934509][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.953353][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.994880][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.236198][ T4345] syz.4.1109[4345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.236248][ T4345] syz.4.1109[4345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.236699][ T4346] syz.4.1109[4346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.251744][ T4348] syz.1.1110[4348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.279134][ T4348] syz.1.1110[4348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.290681][ T4346] syz.4.1109[4346] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.529210][ T4359] device pim6reg1 entered promiscuous mode [ 107.720838][ T4373] syz.3.1117[4373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.720949][ T4373] syz.3.1117[4373] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.805050][ T4373] device syzkaller0 entered promiscuous mode [ 108.281415][ T24] audit: type=1400 audit(1722552610.620:156): avc: denied { create } for pid=4405 comm="syz.1.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 108.990522][ T4459] device veth0_vlan left promiscuous mode [ 108.997558][ T4459] device veth0_vlan entered promiscuous mode [ 109.270400][ T4476] device veth0_vlan left promiscuous mode [ 109.329040][ T4476] device veth0_vlan entered promiscuous mode [ 109.496400][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.504488][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.512214][ T3131] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 111.673200][ T4533] device veth0_vlan left promiscuous mode [ 111.680525][ T4533] device veth0_vlan entered promiscuous mode [ 111.697426][ T4547] device veth0_vlan left promiscuous mode [ 111.812111][ T4547] device veth0_vlan entered promiscuous mode [ 112.124321][ T4553] device veth0_vlan left promiscuous mode [ 112.130349][ T4553] device veth0_vlan entered promiscuous mode [ 112.222862][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 112.230990][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 112.238664][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 112.716076][ T4597] device veth0_vlan left promiscuous mode [ 112.749127][ T4597] device veth0_vlan entered promiscuous mode [ 113.463079][ T4639] device syzkaller0 entered promiscuous mode [ 114.296636][ T4659] bridge0: port 3(veth0_to_batadv) entered blocking state [ 114.303957][ T4659] bridge0: port 3(veth0_to_batadv) entered disabled state [ 114.312044][ T4659] device veth0_to_batadv entered promiscuous mode [ 114.319822][ T4659] bridge0: port 3(veth0_to_batadv) entered blocking state [ 114.326791][ T4659] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 114.534095][ T4659] device veth0_to_batadv left promiscuous mode [ 114.545867][ T4659] bridge0: port 3(veth0_to_batadv) entered disabled state [ 114.659310][ T4678] device veth0_vlan left promiscuous mode [ 114.670236][ T4678] device veth0_vlan entered promiscuous mode [ 114.740726][ T4683] device syzkaller0 entered promiscuous mode [ 115.887325][ T4763] device syzkaller0 entered promiscuous mode [ 115.935879][ T4766] device sit0 entered promiscuous mode [ 116.118612][ T4778] device syzkaller0 entered promiscuous mode [ 116.175298][ T4797] device syzkaller0 entered promiscuous mode [ 116.377665][ T4804] device syzkaller0 entered promiscuous mode [ 117.112214][ T4817] device syzkaller0 entered promiscuous mode [ 117.127773][ T4298] syzkaller0: tun_net_xmit 48 [ 117.133104][ T4817] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 117.140477][ T4817] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 117.146608][ T4817] syzkaller0: Linktype set failed because interface is up [ 117.159685][ T4817] syzkaller0: tun_net_xmit 1280 [ 117.164613][ T4817] syzkaller0: create flow: hash 1173251405 index 2 [ 117.180285][ T4816] syzkaller0: delete flow: hash 1173251405 index 2 [ 117.303322][ T4837] device veth0_vlan left promiscuous mode [ 117.313669][ T4837] device veth0_vlan entered promiscuous mode [ 117.327189][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.334753][ T24] audit: type=1400 audit(1722552619.670:157): avc: denied { create } for pid=4826 comm="syz.2.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 117.354772][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.362217][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.377448][ T24] audit: type=1400 audit(1722552619.710:158): avc: denied { remove_name } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 117.407987][ T24] audit: type=1400 audit(1722552619.710:159): avc: denied { rename } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 117.440429][ T24] audit: type=1400 audit(1722552619.710:160): avc: denied { create } for pid=76 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 117.462021][ T24] audit: type=1400 audit(1722552619.710:161): avc: denied { append open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 117.686523][ T24] audit: type=1400 audit(1722552619.710:162): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 118.576768][ T4883] geneve1: tun_chr_ioctl cmd 1074025698 [ 118.811866][ T4911] device sit0 left promiscuous mode [ 118.833062][ T4946] bridge0: port 3(syz_tun) entered blocking state [ 118.840173][ T4946] bridge0: port 3(syz_tun) entered disabled state [ 121.090386][ T5004] device veth0_vlan left promiscuous mode [ 121.101848][ T5004] device veth0_vlan entered promiscuous mode [ 121.281345][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.610627][ T5021] device syzkaller0 entered promiscuous mode [ 122.698627][ T5075] device syzkaller0 entered promiscuous mode [ 123.626129][ T5138] device syzkaller0 entered promiscuous mode [ 123.642087][ T5147] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.649096][ T5147] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.666947][ T5147] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.674759][ T5147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.685895][ T5147] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.692766][ T5147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.730049][ T5147] device bridge0 entered promiscuous mode [ 125.694869][ T5204] device veth1_macvtap left promiscuous mode [ 129.242846][ T5322] device veth1_macvtap left promiscuous mode [ 129.285369][ T5322] device veth1_macvtap entered promiscuous mode [ 129.380455][ T24] audit: type=1400 audit(1722552631.720:163): avc: denied { create } for pid=5328 comm="syz.4.1370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 130.929375][ T5443] device sit0 entered promiscuous mode [ 131.727989][ T5444] device veth1_macvtap left promiscuous mode [ 131.961540][ T5466] device vxcan1 entered promiscuous mode [ 132.008675][ T5473] syz.4.1406[5473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.008744][ T5473] syz.4.1406[5473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.459096][ T5522] device syzkaller0 entered promiscuous mode [ 132.696032][ T5552] device syzkaller0 entered promiscuous mode [ 133.253088][ T5567] device sit0 left promiscuous mode [ 133.304639][ T5567] device sit0 entered promiscuous mode [ 133.733587][ T5590] device pim6reg1 entered promiscuous mode [ 134.254579][ T5640] device syzkaller0 entered promiscuous mode [ 135.940675][ T24] audit: type=1400 audit(1722552638.270:164): avc: denied { create } for pid=5762 comm="syz.4.1486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 137.372384][ T5815] device pim6reg1 entered promiscuous mode [ 138.483494][ T5870] device veth0_vlan left promiscuous mode [ 138.489394][ T5870] device veth0_vlan entered promiscuous mode [ 138.504274][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.512458][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.528157][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.358387][ T5948] device veth0_vlan left promiscuous mode [ 139.433721][ T5948] device veth0_vlan entered promiscuous mode [ 139.748597][ T5961] device syzkaller0 entered promiscuous mode [ 139.850097][ T5973] device syzkaller0 entered promiscuous mode [ 139.914413][ T5978] device syzkaller0 entered promiscuous mode [ 140.432350][ T6001] device sit0 left promiscuous mode [ 141.156032][ T6015] device veth0_vlan left promiscuous mode [ 141.162462][ T6015] device veth0_vlan entered promiscuous mode [ 141.171439][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.179440][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.186795][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.383552][ T6023] device syzkaller0 entered promiscuous mode [ 141.672255][ T6022] device syzkaller0 entered promiscuous mode [ 142.018210][ T6071] device veth0_vlan left promiscuous mode [ 142.034795][ T6071] device veth0_vlan entered promiscuous mode [ 143.228681][ T6154] : renamed from vlan0 [ 143.324283][ T6163] syz.0.1587[6163] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.740056][ T6173] device syzkaller0 entered promiscuous mode [ 144.347245][ T6196] device pim6reg1 entered promiscuous mode [ 144.493108][ T6198] device veth0_vlan left promiscuous mode [ 144.515266][ T6198] device veth0_vlan entered promiscuous mode [ 144.564994][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.576277][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 144.599246][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.071841][ T6222] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.087836][ T6222] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.164881][ T6222] device bridge0 left promiscuous mode [ 146.014177][ T6242] : renamed from vlan0 [ 146.087626][ T6249] device veth1_macvtap entered promiscuous mode [ 146.096272][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 146.231940][ T6289] syz.3.1616[6289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.231994][ T6289] syz.3.1616[6289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 147.357352][ T6334] device pim6reg1 entered promiscuous mode [ 148.007240][ T6361] device veth1_macvtap entered promiscuous mode [ 148.020450][ T6361] device macsec0 entered promiscuous mode [ 148.028289][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 148.278622][ T6388] device pim6reg1 entered promiscuous mode [ 148.413757][ T6394] device syzkaller0 entered promiscuous mode [ 150.053795][ T6470] syz.2.1667[6470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.053845][ T6470] syz.2.1667[6470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.811767][ T6512] device syzkaller0 entered promiscuous mode [ 151.998829][ T6546] device syzkaller0 entered promiscuous mode [ 153.490250][ T6644] bridge_slave_0: mtu greater than device maximum [ 154.376692][ T6683] device pim6reg1 entered promiscuous mode [ 154.559838][ T24] audit: type=1400 audit(1722552656.900:165): avc: denied { create } for pid=6716 comm="syz.0.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 155.008746][ T6786] device sit0 left promiscuous mode [ 155.172210][ T6786] device sit0 entered promiscuous mode [ 155.351697][ T6815] syz.2.1758[6815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.351806][ T6815] syz.2.1758[6815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.554972][ T6826] device syzkaller0 entered promiscuous mode [ 157.192600][ T6975] device syzkaller0 entered promiscuous mode [ 157.368253][ T6986] device syzkaller0 entered promiscuous mode [ 157.597766][ T6985] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.604622][ T6985] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.739732][ T6985] device bridge_slave_0 entered promiscuous mode [ 157.961739][ T6985] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.969926][ T6985] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.977161][ T6985] device bridge_slave_1 entered promiscuous mode [ 158.095260][ T6985] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.102142][ T6985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.109230][ T6985] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.116023][ T6985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.275009][ T3127] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.284958][ T3127] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.354986][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.362964][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.376101][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.384503][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.393028][ T4298] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.399889][ T4298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.422377][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.440070][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.458266][ T4298] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.465119][ T4298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.545768][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 158.553737][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 158.591850][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 158.636020][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 158.666357][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 158.674535][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 158.743657][ T6985] device veth0_vlan entered promiscuous mode [ 158.761849][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 158.776057][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 158.813055][ T6985] device veth1_macvtap entered promiscuous mode [ 158.842408][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 158.854109][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 158.885211][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 158.918240][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 158.952138][ T1766] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 158.992816][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 159.008541][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 159.045951][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 159.054008][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 159.091689][ T7054] device sit0 left promiscuous mode [ 159.103845][ T7054] device sit0 entered promiscuous mode [ 160.214898][ T48] device bridge_slave_1 left promiscuous mode [ 160.224685][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 160.276651][ T48] device bridge_slave_0 left promiscuous mode [ 160.284788][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 160.303851][ T48] device veth1_macvtap left promiscuous mode [ 160.760458][ T24] audit: type=1400 audit(1722552663.100:166): avc: denied { attach_queue } for pid=7103 comm="syz.4.1829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 161.259671][ T7113] syz.3.1831[7113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.259722][ T7113] syz.3.1831[7113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.407013][ T7118] device veth0_vlan left promiscuous mode [ 161.440422][ T7118] device veth0_vlan entered promiscuous mode [ 161.552863][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 161.564195][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 161.571875][ T1809] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 161.690722][ T7169] syz.1.1844[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.690776][ T7169] syz.1.1844[7169] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.015496][ T7185] device pimreg0 entered promiscuous mode [ 162.825143][ T7210] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.832254][ T7210] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.186159][ T7221] syz.2.1856[7221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.186210][ T7221] syz.2.1856[7221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.071669][ T7249] bridge0: port 3(veth0_to_batadv) entered blocking state [ 164.089919][ T7249] bridge0: port 3(veth0_to_batadv) entered disabled state [ 164.097767][ T7249] device veth0_to_batadv entered promiscuous mode [ 164.253894][ T7274] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.260875][ T7274] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.290369][ T7274] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.297375][ T7274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.304961][ T7274] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.312030][ T7274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.322662][ T7274] device bridge0 entered promiscuous mode [ 164.355365][ T7283] device sit0 entered promiscuous mode [ 164.852508][ T7319] syz.4.1888[7319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.852564][ T7319] syz.4.1888[7319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.327202][ T7377] device syzkaller0 entered promiscuous mode [ 167.411443][ T7476] device sit0 left promiscuous mode [ 168.474649][ T7505] device syzkaller0 entered promiscuous mode [ 172.250599][ T24] audit: type=1400 audit(1722552674.590:167): avc: denied { write } for pid=7593 comm="syz.3.1966" name="task" dev="proc" ino=35915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 172.380971][ T7604] syz.1.1969[7604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.381024][ T7604] syz.1.1969[7604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.392622][ T24] audit: type=1400 audit(1722552674.630:168): avc: denied { add_name } for pid=7593 comm="syz.3.1966" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 172.465709][ T24] audit: type=1400 audit(1722552674.630:169): avc: denied { create } for pid=7593 comm="syz.3.1966" name="cgroup.stat" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 172.575692][ T24] audit: type=1400 audit(1722552674.630:170): avc: denied { associate } for pid=7593 comm="syz.3.1966" name="cgroup.stat" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 174.869905][ T3339] cgroup: fork rejected by pids controller in /syz2 [ 174.922527][ T7680] device syzkaller0 entered promiscuous mode [ 174.933376][ T7680] geneve1: tun_chr_ioctl cmd 1074025672 [ 174.939261][ T7680] geneve1: ignored: set checksum enabled [ 175.037041][ T7686] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.043894][ T7686] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.054428][ T7686] device bridge_slave_0 entered promiscuous mode [ 175.085288][ T7686] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.094103][ T7686] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.101336][ T7686] device bridge_slave_1 entered promiscuous mode [ 175.238557][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.246646][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.267012][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.395497][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.495241][ T3115] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.502137][ T3115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.674243][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.707448][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.715387][ T3115] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.722243][ T3115] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.729486][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.737358][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.745030][ T3115] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.766059][ T915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.774290][ T915] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.782519][ T915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.789838][ T915] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 175.797205][ T915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.805005][ T7686] device veth0_vlan entered promiscuous mode [ 175.823728][ T917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.833050][ T7686] device veth1_macvtap entered promiscuous mode [ 175.844577][ T917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 175.852852][ T917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 175.869105][ T915] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 175.877263][ T915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 175.952759][ T7721] geneve1: tun_chr_ioctl cmd 1074025698 [ 176.057160][ T24] audit: type=1400 audit(1722552678.400:171): avc: denied { setattr } for pid=7733 comm="syz.0.2007" path="/dev/ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 177.007545][ T48] device bridge_slave_1 left promiscuous mode [ 177.013703][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.064626][ T48] device bridge_slave_0 left promiscuous mode [ 177.086113][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.126110][ T48] device veth1_macvtap left promiscuous mode [ 177.533807][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.568155][ T7763] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.575374][ T7763] device bridge_slave_0 entered promiscuous mode [ 177.727503][ T7763] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.736568][ T7763] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.751365][ T7763] device bridge_slave_1 entered promiscuous mode [ 177.855576][ T7763] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.862470][ T7763] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.869560][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.876342][ T7763] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.235023][ T4298] bridge0: port 1(bridge_slave_0) entered disabled state [ 178.249689][ T4298] bridge0: port 2(bridge_slave_1) entered disabled state [ 178.259270][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.266930][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.427545][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.435977][ T1309] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.442842][ T1309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.450494][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.460056][ T1309] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.467011][ T1309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.478038][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.486131][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.500809][ T7763] device veth0_vlan entered promiscuous mode [ 178.512187][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 178.544421][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.554526][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 178.574707][ T1309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.805840][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.813318][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.824463][ T7763] device veth1_macvtap entered promiscuous mode [ 178.875801][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 178.886764][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.903541][ T4298] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.968552][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.058452][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.075557][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.088684][ T1307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.287924][ T7871] device pim6reg1 entered promiscuous mode [ 181.692044][ T7973] device syzkaller0 entered promiscuous mode [ 182.753507][ T8035] device lo entered promiscuous mode [ 183.517874][ T8097] device pim6reg1 entered promiscuous mode [ 184.537422][ T8162] device pim6reg1 entered promiscuous mode [ 184.854423][ T8179] device veth0_vlan left promiscuous mode [ 184.937437][ T8179] device veth0_vlan entered promiscuous mode [ 185.078419][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.094132][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 185.102419][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.391764][ T8301] device syzkaller0 entered promiscuous mode [ 186.910771][ T283] bridge0: port 3(syz_tun) entered disabled state [ 187.158903][ T8342] device syzkaller0 entered promiscuous mode [ 187.237251][ T8345] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.244164][ T8345] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.253128][ T8345] device bridge_slave_0 entered promiscuous mode [ 187.260998][ T8345] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.267897][ T8345] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.275115][ T8345] device bridge_slave_1 entered promiscuous mode [ 187.336251][ T8345] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.343111][ T8345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.350240][ T8345] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.357012][ T8345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.485435][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.497626][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.506513][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.567921][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.576028][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.594405][ T8345] device veth0_vlan entered promiscuous mode [ 187.604666][ T1764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 187.615493][ T1764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 187.624131][ T1764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 187.634500][ T1764] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 187.661400][ T8345] device veth1_macvtap entered promiscuous mode [ 187.683786][ T1764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 187.716571][ T1764] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 187.724800][ T1764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.779051][ T8397] device bridge0 entered promiscuous mode [ 187.849765][ T8400] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.856799][ T8400] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.019586][ T8412] device syzkaller0 entered promiscuous mode [ 188.118737][ T8439] : renamed from vlan0 [ 188.133990][ T48] device bridge_slave_1 left promiscuous mode [ 188.140166][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.149554][ T48] device bridge_slave_0 left promiscuous mode [ 188.155508][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.164318][ T48] device veth1_macvtap left promiscuous mode [ 188.173768][ T48] device veth0_vlan left promiscuous mode [ 188.197639][ T8453] syz.4.2194[8453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.197733][ T8453] syz.4.2194[8453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.315134][ T8453] device syzkaller0 entered promiscuous mode [ 188.439565][ T8460] device syzkaller0 entered promiscuous mode [ 188.581641][ T8475] device veth0_vlan left promiscuous mode [ 188.589725][ T8475] device veth0_vlan entered promiscuous mode [ 188.641826][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.649953][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 188.657417][ T308] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.664940][ T8479] device sit0 entered promiscuous mode [ 190.021389][ T8540] device syzkaller0 entered promiscuous mode [ 190.683199][ T8594] device pim6reg1 entered promiscuous mode [ 191.068340][ T8597] device pim6reg1 entered promiscuous mode [ 191.418429][ T24] audit: type=1400 audit(1722552693.760:172): avc: denied { create } for pid=8626 comm="syz.4.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 191.650174][ T8674] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 191.655982][ T8674] pim6reg0: linktype set to 769 [ 192.114701][ T8716] device veth1_macvtap entered promiscuous mode [ 192.121638][ T8716] device macsec0 entered promiscuous mode [ 192.128601][ T3122] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 192.329513][ T8758] device veth0_vlan left promiscuous mode [ 192.378030][ T24] audit: type=1400 audit(1722552694.720:173): avc: denied { create } for pid=8757 comm="syz.3.2277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 192.391509][ T8758] device veth0_vlan entered promiscuous mode [ 192.413579][ T8762] device pim6reg1 entered promiscuous mode [ 195.272482][ T8918] bridge_slave_0: mtu greater than device maximum [ 195.799816][ T8946] device pim6reg1 entered promiscuous mode [ 198.493754][ T24] audit: type=1400 audit(1722552700.830:174): avc: denied { create } for pid=9015 comm="syz.2.2348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 200.004231][ T9067] device pim6reg1 entered promiscuous mode [ 200.809265][ T9115] device syzkaller0 entered promiscuous mode [ 200.985818][ T9122] device pim6reg1 entered promiscuous mode [ 202.637661][ T9180] device pim6reg1 entered promiscuous mode [ 204.005779][ T9238] device pim6reg1 entered promiscuous mode [ 206.801644][ T9362] device syzkaller0 entered promiscuous mode [ 208.526677][ T9403] device syzkaller0 entered promiscuous mode [ 208.881725][ T9430] device veth0_vlan left promiscuous mode [ 208.891905][ T9430] device veth0_vlan entered promiscuous mode [ 208.914707][ T4313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 208.933155][ T4313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 208.973954][ T4313] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 209.732174][ T9436] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.739565][ T9436] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.748267][ T9436] device bridge_slave_0 entered promiscuous mode [ 209.755079][ T9436] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.763549][ T9436] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.778309][ T9436] device bridge_slave_1 entered promiscuous mode [ 210.091868][ T9480] tap0: tun_chr_ioctl cmd 1074025677 [ 210.097169][ T9480] tap0: linktype set to 65534 [ 210.465202][ T9436] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.472113][ T9436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.479191][ T9436] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.485963][ T9436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.967731][ T3134] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.990090][ T3134] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.370023][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.387542][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.498966][ T9549] device wg2 entered promiscuous mode [ 211.543466][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.584519][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.635053][ T1311] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.641947][ T1311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.822793][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.846387][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.856197][ T1311] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.863043][ T1311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.905350][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.921916][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.942314][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.950537][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.968992][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 211.987269][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 211.999599][ T9436] device veth0_vlan entered promiscuous mode [ 212.012379][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 212.020636][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 212.034470][ T9436] device veth1_macvtap entered promiscuous mode [ 212.224091][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 212.231514][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.238969][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 212.247167][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 212.255087][ T4291] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 212.271090][ T9593] device veth0_vlan left promiscuous mode [ 212.277246][ T9593] device veth0_vlan entered promiscuous mode [ 212.291314][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 212.299616][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 212.308148][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 212.316765][ T1311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 212.647427][ T9615] device syzkaller0 entered promiscuous mode [ 212.822544][ T5523] device veth1_macvtap left promiscuous mode [ 212.992848][ T9635] device sit0 entered promiscuous mode [ 213.957530][ T9692] device pim6reg1 entered promiscuous mode [ 214.365548][ T9711] device sit0 entered promiscuous mode [ 214.390108][ T9711] syz.4.2543[9711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.390161][ T9711] syz.4.2543[9711] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.448924][ T9764] device veth0_vlan left promiscuous mode [ 215.523400][ T9764] device veth0_vlan entered promiscuous mode [ 215.704054][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.720626][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.738681][ T54] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 216.244483][ T9786] device syzkaller0 entered promiscuous mode [ 216.730350][ T9805] device syzkaller0 entered promiscuous mode [ 216.741200][ T9801] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 216.784170][ T9820] device veth0_vlan left promiscuous mode [ 216.838019][ T9820] device veth0_vlan entered promiscuous mode [ 217.666712][ T9853] device pim6reg1 entered promiscuous mode [ 217.966627][ T9881] syz.2.2592[9881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.966678][ T9881] syz.2.2592[9881] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.050438][ T9877] device veth0_vlan left promiscuous mode [ 218.157682][ T9885] syz.2.2592[9885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.157733][ T9885] syz.2.2592[9885] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.178179][ T9877] device veth0_vlan entered promiscuous mode [ 218.508380][ T24] audit: type=1400 audit(1722552720.840:175): avc: denied { create } for pid=9899 comm="syz.4.2598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 220.360591][ T9936] device veth0_vlan left promiscuous mode [ 220.377482][ T9936] device veth0_vlan entered promiscuous mode [ 220.791699][ T9951] device pim6reg1 entered promiscuous mode [ 221.502331][ T9985] device syzkaller0 entered promiscuous mode [ 221.577922][ T9990] device syzkaller0 entered promiscuous mode [ 221.585859][ T9992] geneve1: tun_chr_ioctl cmd 1074025698 [ 221.652127][T10000] device veth0_vlan left promiscuous mode [ 221.713254][T10000] device veth0_vlan entered promiscuous mode [ 222.360835][T10108] syz.1.2661[10108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.360887][T10108] syz.1.2661[10108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.807528][T10147] syz.1.2670[10147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.021033][T10147] syz.1.2670[10147] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.136828][T10165] device bridge_slave_1 left promiscuous mode [ 223.156695][T10164] syz.1.2670[10164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.156770][T10164] syz.1.2670[10164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.228590][T10165] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.369894][T10165] device bridge_slave_0 left promiscuous mode [ 223.381829][T10165] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.127009][T10211] device macsec0 entered promiscuous mode [ 225.387330][T10282] syz.0.2711[10282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.387378][T10282] syz.0.2711[10282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.466472][T10285] syz.0.2711[10285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.596917][T10285] syz.0.2711[10285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.368196][T10332] device syzkaller0 entered promiscuous mode [ 227.376782][T10395] device syzkaller0 entered promiscuous mode [ 227.395863][T10398] : renamed from pim6reg1 [ 227.610423][T10414] bridge0: port 3(veth0_to_batadv) entered blocking state [ 227.625924][T10414] bridge0: port 3(veth0_to_batadv) entered disabled state [ 227.739952][T10414] device veth0_to_batadv entered promiscuous mode [ 227.784404][T10436] syz.3.2756[10436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.784448][T10436] syz.3.2756[10436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.805671][T10414] bridge0: port 3(veth0_to_batadv) entered blocking state [ 227.823808][T10414] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 229.266323][T10477] syz.3.2771[10477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.266374][T10477] syz.3.2771[10477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.508905][T10500] device syzkaller0 entered promiscuous mode [ 230.169405][T10504] device veth1_macvtap left promiscuous mode [ 230.185763][T10514] device veth1_macvtap entered promiscuous mode [ 230.194305][T10514] device macsec0 entered promiscuous mode [ 231.547712][T10572] device pim6reg1 entered promiscuous mode [ 231.641113][T10556] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.655667][T10556] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.663043][T10556] device bridge_slave_0 entered promiscuous mode [ 231.691270][T10556] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.726780][T10556] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.734023][T10556] device bridge_slave_1 entered promiscuous mode [ 232.116501][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 232.123906][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 232.137167][T10579] device pim6reg1 entered promiscuous mode [ 232.280480][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 232.307270][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 232.375309][ T3120] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.382199][ T3120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.473782][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 232.484183][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 232.493293][ T3120] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.500165][ T3120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.526276][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.534520][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 232.542405][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 232.550673][ T3120] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 232.562264][T10556] device veth0_vlan entered promiscuous mode [ 232.575187][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.586549][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.593921][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.775925][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.789770][T10556] device veth1_macvtap entered promiscuous mode [ 232.809312][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.822559][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.869706][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.882635][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.919442][T10598] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.926452][T10598] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.451417][T10642] device syzkaller0 entered promiscuous mode [ 233.589800][T10644] device syzkaller0 entered promiscuous mode [ 233.679275][T10642] device pim6reg1 entered promiscuous mode [ 234.087720][T10679] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.094818][T10679] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.103903][T10679] device bridge_slave_0 entered promiscuous mode [ 234.110862][T10679] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.118847][T10679] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.127370][T10679] device bridge_slave_1 entered promiscuous mode [ 234.263683][T10697] device sit0 entered promiscuous mode [ 234.512560][T10679] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.519438][T10679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.526557][T10679] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.533380][T10679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.752759][T10719] device pim6reg1 entered promiscuous mode [ 234.806704][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.817100][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.871648][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.881551][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.903325][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.917560][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.942896][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.950059][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.970370][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.984561][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.995259][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.002130][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.037929][T10738] device syzkaller0 entered promiscuous mode [ 235.068977][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.077150][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.085026][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.093526][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.130114][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 235.139582][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 235.173566][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 235.243064][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.329655][T10679] device veth0_vlan entered promiscuous mode [ 235.532544][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.539968][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.578368][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.588281][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.610931][T10679] device veth1_macvtap entered promiscuous mode [ 235.632875][T10764] device syzkaller0 entered promiscuous mode [ 235.641216][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.649914][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.658354][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.674849][ T918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.684202][ T918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.737115][ T7] device veth0_to_batadv left promiscuous mode [ 235.743125][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 235.751387][ T7] device bridge_slave_1 left promiscuous mode [ 235.772124][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.779688][ T7] device bridge_slave_0 left promiscuous mode [ 235.785646][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.793097][ T7] device veth1_macvtap left promiscuous mode [ 235.799909][ T7] device veth0_vlan left promiscuous mode [ 235.863702][T10785] device veth0_vlan left promiscuous mode [ 235.873474][T10785] device veth0_vlan entered promiscuous mode [ 235.912383][T10786] device pim6reg1 entered promiscuous mode [ 235.926324][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.934525][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.946102][ T8012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 236.100549][T10835] Y4`Ҙ: renamed from lo [ 236.644274][T10878] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.651455][T10878] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.690415][T10876] device sit0 entered promiscuous mode [ 237.463570][T10878] device bridge_slave_1 left promiscuous mode [ 237.469810][T10878] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.488171][T10878] device bridge_slave_0 left promiscuous mode [ 237.500545][T10878] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.572632][T10885] device pim6reg1 entered promiscuous mode [ 238.859044][T10987] syz.2.2911[10987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.859093][T10987] syz.2.2911[10987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.164273][T11037] syz.2.2927[11037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.175849][T11037] syz.2.2927[11037] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.705764][T11052] device syzkaller0 entered promiscuous mode [ 240.811758][T11071] device sit0 left promiscuous mode [ 240.847303][T11070] device sit0 left promiscuous mode [ 240.916092][T11075] syz.2.2939[11075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.916139][T11075] syz.2.2939[11075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.022889][T11084] syz.0.2940[11084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.126002][T11084] syz.0.2940[11084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.414607][T11113] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.552309][T11113] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.606136][T11113] device bridge_slave_0 entered promiscuous mode [ 242.628859][ T5523] device veth1_macvtap left promiscuous mode [ 242.805706][T11113] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.828433][T11113] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.837857][T11113] device bridge_slave_1 entered promiscuous mode [ 243.503635][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.550707][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.706863][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.735439][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.799005][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.805874][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.835391][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.843737][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.851960][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.858809][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.055223][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.084166][T11218] ʮ}p: renamed from pim6reg1 [ 244.116773][T11219] syz.1.2976[11219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.225641][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 244.244772][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.252955][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 244.262635][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.293496][T11113] device veth0_vlan entered promiscuous mode [ 244.302831][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 244.311344][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.332247][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 244.340328][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.354082][T11113] device veth1_macvtap entered promiscuous mode [ 244.372188][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.381827][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.394950][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 244.412399][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 244.421598][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 244.816029][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 244.824660][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 244.833373][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 244.841671][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 245.565921][T11271] syz.4.2990[11271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.565973][T11271] syz.4.2990[11271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.504164][T11353] device syzkaller0 entered promiscuous mode [ 247.971132][T11374] device syzkaller0 entered promiscuous mode [ 247.991486][T11379] device sit0 entered promiscuous mode [ 248.042627][T11381] device veth1_macvtap left promiscuous mode [ 248.051942][T11381] device macsec0 entered promiscuous mode [ 248.503534][T11423] device sit0 left promiscuous mode [ 248.596162][T11424] device sit0 entered promiscuous mode [ 250.448208][T11514] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.468469][T11514] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.823125][T11539] device pim6reg1 entered promiscuous mode [ 250.993167][T11565] device veth0_vlan left promiscuous mode [ 251.058575][T11565] device veth0_vlan entered promiscuous mode [ 251.260079][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.293528][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.387274][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.575474][T11586] ref_ctr_offset mismatch. inode: 0x6c offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 251.988512][T11620] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.995381][T11620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.002514][T11620] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.009288][T11620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.017362][T11620] device bridge0 entered promiscuous mode [ 252.062330][T11618] device syz_tun entered promiscuous mode [ 252.177151][T11634] device sit0 left promiscuous mode [ 252.431025][T11660] device veth0_vlan left promiscuous mode [ 252.439791][T11660] device veth0_vlan entered promiscuous mode [ 252.476039][ T5340] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.535250][T11676] device veth0_vlan left promiscuous mode [ 252.656637][T11676] device veth0_vlan entered promiscuous mode [ 253.184447][T11693] device syzkaller0 entered promiscuous mode [ 253.817070][T11726] syz.2.3123[11726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.817122][T11726] syz.2.3123[11726] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.888830][T11730] syz.2.3123[11730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.906163][T11730] syz.2.3123[11730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.218754][T11742] device veth0_vlan left promiscuous mode [ 254.238503][T11742] device veth0_vlan entered promiscuous mode [ 254.327853][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.338060][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.345416][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.499193][T11744] device pim6reg1 entered promiscuous mode [ 256.259240][T11779] device veth0_vlan left promiscuous mode [ 256.324934][T11779] device veth0_vlan entered promiscuous mode [ 256.486736][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.494779][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.512103][ T3125] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.601513][T11799] syz.2.3143[11799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.601556][T11799] syz.2.3143[11799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.021169][T11847] syz.2.3158[11847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.043540][T11847] syz.2.3158[11847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.444426][T11979] device sit0 entered promiscuous mode [ 260.096552][T12000] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.106551][T12000] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.194125][T12000] device bridge0 left promiscuous mode [ 260.748623][T12064] device pim6reg1 entered promiscuous mode [ 260.927718][ T94] udevd[94]: worker [310] terminated by signal 33 (Unknown signal 33) [ 260.947167][T12073] device syzkaller0 entered promiscuous mode [ 260.958286][ T94] udevd[94]: worker [310] failed while handling '/devices/virtual/block/loop0' [ 261.312007][T12104] tap0: tun_chr_ioctl cmd 1074025675 [ 261.342355][T12104] tap0: persist enabled [ 262.147359][T12178] : renamed from vlan0 [ 262.208201][T12183] tap0: tun_chr_ioctl cmd 1074025675 [ 262.213396][T12183] tap0: persist enabled [ 263.043404][T12234] tap0: tun_chr_ioctl cmd 1074025675 [ 263.049171][T12234] tap0: persist enabled [ 263.505006][T12254] syz.0.3269[12254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.505056][T12254] syz.0.3269[12254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.661638][T12255] syz.0.3269[12255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.852128][T12255] syz.0.3269[12255] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.034240][T12254] device pim6reg1 entered promiscuous mode [ 264.467246][T12281] syz.1.3275[12281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.467290][T12281] syz.1.3275[12281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.904101][T12288] tap1: tun_chr_ioctl cmd 1074025675 [ 264.929258][T12288] tap1: persist enabled [ 265.174380][T12307] device syzkaller0 entered promiscuous mode [ 265.446631][T12376] syz.3.3295[12376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.446674][T12376] syz.3.3295[12376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.289004][T12419] device syzkaller0 entered promiscuous mode [ 266.367658][T12430] syz.1.3306[12430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.367712][T12430] syz.1.3306[12430] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.860355][T12487] device sit0 left promiscuous mode [ 268.790559][T12565] device pim6reg1 entered promiscuous mode [ 268.845984][T12570] bridge_slave_0: mtu greater than device maximum [ 269.157734][T12598] device syzkaller0 entered promiscuous mode [ 269.342992][ T24] audit: type=1400 audit(1722552771.680:176): avc: denied { create } for pid=12635 comm="syz.0.3357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 269.415710][T12640] device sit0 entered promiscuous mode [ 269.816941][T12650] device sit0 left promiscuous mode [ 269.873842][T12651] device sit0 entered promiscuous mode [ 270.253841][T12668] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.261427][T12668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.273723][T12668] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.281149][T12668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.304973][T12668] device bridge0 entered promiscuous mode [ 270.319121][T12694] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.326123][T12694] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.342041][T12694] device bridge_slave_1 left promiscuous mode [ 270.358243][T12694] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.428090][T12694] device bridge_slave_0 left promiscuous mode [ 270.434295][T12694] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.725830][T12397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.087947][T12757] device syzkaller0 entered promiscuous mode [ 271.855292][T12799] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.862222][T12799] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.005752][T12799] device bridge0 left promiscuous mode [ 272.070086][T12802] device bridge_slave_1 left promiscuous mode [ 272.076237][T12802] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.088780][T12802] device bridge_slave_0 left promiscuous mode [ 272.096403][T12802] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.447016][T12835] device syzkaller0 entered promiscuous mode [ 272.517131][T12848] device syzkaller0 entered promiscuous mode [ 273.613916][T12959] bpf_get_probe_write_proto: 2 callbacks suppressed [ 273.613925][T12959] syz.4.3448[12959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.621813][T12962] device pim6reg1 entered promiscuous mode [ 273.643525][T12959] syz.4.3448[12959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.668763][T12966] syz.1.3450[12966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.805481][T12978] device veth1_macvtap entered promiscuous mode [ 273.861338][T12397] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 274.044686][T13003] syz.0.3462[13003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.044729][T13003] syz.0.3462[13003] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.498977][T13011] device syzkaller0 entered promiscuous mode [ 275.187528][T13046] syz.1.3475[13046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.187573][T13046] syz.1.3475[13046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.650580][T13018] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.668845][T13018] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.697495][T13018] device bridge_slave_0 entered promiscuous mode [ 275.728239][T13018] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.735082][T13018] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.746031][T13018] device bridge_slave_1 entered promiscuous mode [ 275.761213][T13055] device pim6reg1 entered promiscuous mode [ 275.776873][T13058] device sit0 left promiscuous mode [ 275.792758][T13058] device sit0 entered promiscuous mode [ 275.871637][T13018] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.878532][T13018] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.885628][T13018] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.892377][T13018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.924310][T12396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.932300][T12396] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.939814][T12396] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.982386][T12395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.025338][T12395] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.032217][T12395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.077962][T12395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.093114][T12395] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.100002][T12395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.119511][T12396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.128533][T12396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.147784][T13018] device veth0_vlan entered promiscuous mode [ 276.158557][T12396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.167058][T12396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.177796][T12396] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.185678][T12396] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.221553][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.230663][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.240261][T13018] device veth1_macvtap entered promiscuous mode [ 276.251403][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.259131][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.267618][ T3130] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.290213][ T3135] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.298901][ T3135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.894970][T13100] syz.4.3488[13100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.895018][T13100] syz.4.3488[13100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.955818][T13107] device sit0 entered promiscuous mode [ 277.217915][T13124] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.224908][T13124] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.315328][T13127] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.322225][T13127] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.329330][T13127] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.336123][T13127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.541010][T13127] device bridge0 entered promiscuous mode [ 277.837327][T13145] syz.0.3505[13145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.193924][T13183] device team_slave_1 entered promiscuous mode [ 278.212659][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 278.247008][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 278.318971][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.489178][ T48] device veth1_macvtap left promiscuous mode [ 278.505166][ T48] device veth0_vlan left promiscuous mode [ 280.175479][T13303] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.182549][T13303] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.224171][T13303] device bridge_slave_0 entered promiscuous mode [ 280.319083][T13303] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.337360][T13303] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.346114][T13303] device bridge_slave_1 entered promiscuous mode [ 280.617381][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.628922][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.658864][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.669503][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.678215][T13366] bpf_get_probe_write_proto: 3 callbacks suppressed [ 280.678225][T13366] syz.0.3571[13366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.705908][T13366] syz.0.3571[13366] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.766870][T12580] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.785005][T12580] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.792493][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.803730][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.811941][T12580] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.818799][T12580] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.838143][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 280.846652][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.854572][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 280.862660][T12580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.884724][T13372] device syzkaller0 entered promiscuous mode [ 280.903630][T13369] device pim6reg1 entered promiscuous mode [ 280.913262][ T3802] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 280.930324][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 280.938946][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.952822][T12395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.962666][T12395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.972112][T13303] device veth0_vlan entered promiscuous mode [ 280.999536][T12395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.022790][T12395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.082676][T12395] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.099666][T13303] device veth1_macvtap entered promiscuous mode [ 281.461765][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.470710][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.479501][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.487800][ T3113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.959644][T13444] cgroup: fork rejected by pids controller in /syz1 [ 282.007445][ T48] device bridge_slave_1 left promiscuous mode [ 282.013428][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.020909][ T48] device bridge_slave_0 left promiscuous mode [ 282.027246][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.035162][ T48] device veth1_macvtap left promiscuous mode [ 282.041352][ T48] device veth0_vlan left promiscuous mode [ 282.126251][T13446] device pim6reg1 entered promiscuous mode [ 282.223233][T13455] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.245952][T13455] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.253542][T13455] device bridge_slave_0 entered promiscuous mode [ 282.276034][T13455] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.282866][T13455] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.466573][T13455] device bridge_slave_1 entered promiscuous mode [ 282.991699][T13474] device veth0_vlan left promiscuous mode [ 283.053800][T13474] device veth0_vlan entered promiscuous mode [ 283.255823][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.276166][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.283425][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.436651][T13483] device syzkaller0 entered promiscuous mode [ 283.494143][T12394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.502524][T12394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.525902][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.534518][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.543224][T12393] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.550110][T12393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.578111][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.586737][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.650240][T12393] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.657113][T12393] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.708679][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.733525][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 283.741550][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.749463][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 283.757668][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.777378][T13503] device syzkaller0 entered promiscuous mode [ 283.824970][T13455] device veth0_vlan entered promiscuous mode [ 283.844125][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.852630][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.861354][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 283.869538][ T3128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.882887][ T3802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.892657][ T3802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 283.911268][T13455] device veth1_macvtap entered promiscuous mode [ 283.922701][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 283.931375][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 283.939759][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 283.960153][T12392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 283.968618][T12392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 283.977354][T12392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 283.985475][T12392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 284.771067][T13535] syz.1.3616[13535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.771120][T13535] syz.1.3616[13535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.783907][T13536] syz.4.3618[13536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.825809][T13536] syz.4.3618[13536] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.260674][T13545] device lo entered promiscuous mode [ 285.331206][ T48] device bridge_slave_1 left promiscuous mode [ 285.345720][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.443408][ T48] device bridge_slave_0 left promiscuous mode [ 285.513872][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.593361][ T48] device veth1_macvtap left promiscuous mode [ 285.599531][ T48] device veth0_vlan left promiscuous mode [ 286.328194][T13589] device veth0_vlan left promiscuous mode [ 286.373116][T13589] device veth0_vlan entered promiscuous mode [ 286.551669][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.564689][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 286.577281][T12393] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.584789][T13586] device sit0 entered promiscuous mode [ 287.277579][T13661] syz.3.3647[13661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.277633][T13661] syz.3.3647[13661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.191007][T13700] device sit0 entered promiscuous mode [ 290.262424][T13818] device sit0 left promiscuous mode [ 291.858380][T13885] device syzkaller0 entered promiscuous mode [ 291.870480][T13882] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.884384][T13882] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.018872][T13911] device syzkaller0 entered promiscuous mode [ 292.252397][T13923] device syzkaller0 entered promiscuous mode [ 292.402528][T13954] bridge_slave_0: mtu greater than device maximum [ 292.522019][T13975] geneve1: tun_chr_ioctl cmd 1074025681 [ 292.749404][T13993] syz.4.3745[13993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.749444][T13993] syz.4.3745[13993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.303721][T14017] device sit0 left promiscuous mode [ 294.045958][ T24] audit: type=1400 audit(1722552796.390:177): avc: denied { create } for pid=14059 comm="syz.1.3765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 294.274566][T14060] ʮ}p: renamed from pim6reg1 [ 294.668993][T14104] device syzkaller0 entered promiscuous mode [ 294.765180][T14113] device pim6reg1 entered promiscuous mode [ 294.797491][T14122] syz.1.3786[14122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.797536][T14122] syz.1.3786[14122] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.417665][T14168] syz.2.3799[14168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.541209][T14168] syz.2.3799[14168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.557953][T14174] syz.0.3800[14174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.688482][T14174] syz.0.3800[14174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.359058][T14224] syz.4.3813[14224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.376242][T14224] syz.4.3813[14224] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.726061][T14233] device syzkaller0 entered promiscuous mode [ 298.608125][T14291] syz.0.3828[14291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.608170][T14291] syz.0.3828[14291] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.864031][T14343] syz.2.3842[14343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.882878][T14339] device syzkaller0 entered promiscuous mode [ 299.900079][T14343] syz.2.3842[14343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.313718][T14383] syz.0.3854[14383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.325519][T14383] syz.0.3854[14383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.440292][T14394] device syzkaller0 entered promiscuous mode [ 300.724156][T14410] syz.0.3863[14410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.724243][T14410] syz.0.3863[14410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.015871][T14424] syz.0.3868[14424] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.124508][T14417] syz.4.3866[14417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.187361][T14672] device sit0 left promiscuous mode [ 304.312166][T14687] bpf_get_probe_write_proto: 12 callbacks suppressed [ 304.312177][T14687] syz.1.3937[14687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.375862][T14687] syz.1.3937[14687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.568808][T14704] device sit0 entered promiscuous mode [ 305.094918][T14754] syz.2.3957[14754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.094966][T14754] syz.2.3957[14754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.094967][T14788] : renamed from vlan0 [ 306.157690][T14794] syz.4.3971[14794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.157743][T14794] syz.4.3971[14794] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.159684][T14785] syz.3.3967[14785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.183366][T14796] syz.0.3970[14796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.201325][T14796] syz.0.3970[14796] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.745939][T14835] syz.2.3981[14835] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 307.876890][T14882] device sit0 left promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=4010 state=3 status=67 (errno 32: Broken pipe) [ 322.916673][ T48] device bridge_slave_1 left promiscuous mode [ 322.922585][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.929807][ T48] device bridge_slave_0 left promiscuous mode [ 322.935732][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.943462][ T48] device bridge_slave_1 left promiscuous mode [ 322.949446][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.956534][ T48] device bridge_slave_0 left promiscuous mode [ 322.962426][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.969986][ T48] device veth0_to_batadv left promiscuous mode [ 322.976021][ T48] bridge0: port 3(veth0_to_batadv) entered disabled state [ 322.983127][ T48] device bridge_slave_1 left promiscuous mode [ 322.989082][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.996207][ T48] device bridge_slave_0 left promiscuous mode [ 323.002106][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.009884][ T48] device veth1_macvtap left promiscuous mode [ 323.015771][ T48] device veth0_vlan left promiscuous mode [ 323.021294][ T48] device veth1_macvtap left promiscuous mode [ 323.027107][ T48] device veth0_vlan left promiscuous mode [ 323.032704][ T48] device veth1_macvtap left promiscuous mode