last executing test programs: 4.58613788s ago: executing program 3 (id=7292): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0x4, 0x8, 0x5, 0x3b90}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffff21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000a7f1ffff00000000000000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r7, 0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x0, 0x3, 0xffffff9b, 0x7f}, 0x10, 0xffffffffffffffff, r6, 0x2, &(0x7f0000000500)=[r5, r5, r5, r8], &(0x7f0000000540)=[{0x4, 0x1, 0xf, 0xb}, {0x0, 0x0, 0x2}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x10, &(0x7f0000001080)=ANY=[@ANYBLOB="180000efc3ba370000000000000000001813000059ef787a618c42f6b30a2d0f54ed0b0c13b74727ca0fc1ed4c98153a300f6419404ee6d38561bfd5298f3682ad604e2182dc4a184cf89bf1cb0db9775f78bc47412948aa88154178565c8b935431f5a4060000002e01dd4d53ed3c235fd7fb4712d356efe9bf", @ANYRESDEC=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008500000092000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41000, 0x30, '\x00', r7, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x3, 0x3, 0x2, 0xffffffff}, 0x10, 0xffffffffffffffff, r3, 0x0, 0x0, &(0x7f0000000300)}, 0x90) r9 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x4, '\x00', 0x0, r9}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x15, 0xd4f4, 0x7ff, 0x78b7, 0x0, 0x1, 0xff, '\x00', r7, r10, 0x2, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x48}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), 0x0}, 0x20) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r13}, 0x2d) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 4.531500185s ago: executing program 3 (id=7293): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001b80)=ANY=[]) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffa3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000060000000b000000000000020300000000615f615f00860427b3c7d82a861be289ad4f542c71e7d0e0da1adce909f027716b34e4ea8255c7f6288fcdf1e363ccbd2ff4bf4367d6b6008214"], 0x0, 0x2a, 0x0, 0x0, 0x1cd6}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="b4080000000000e773114100000000008510000002000000b7000000000000009500c2000000000095000012000000000c17d99557d9dcae053c23d238459ea1765a302520457d1fb7907c719ec923ce25b643c3eb683e50eeef46ba10b3767ae25eb3"], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', r3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x15) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x15, &(0x7f0000000640)={{r4}, 0x0, 0x0}, 0x20) 1.86335806s ago: executing program 1 (id=7307): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b708595c0e8a8ec4fe0000000000007b8af8ff00000000bfa20000000000000702b993b6176d529413fe29701cb0662998796cc1cc4eb90000f80400000000000000000000b70b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffff7d, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x200005, 0x5}, 0x81) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r1, 0x58, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0x4) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'veth1_virt_wifi\x00', 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8b0f, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', r4}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x14}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0xfffffffd, 0x5, 0x10000, 0x271, r3, 0x8d2, '\x00', 0x0, r10, 0x2, 0x0, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r12, &(0x7f0000000000), 0xfffffd26) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.539434416s ago: executing program 4 (id=7309): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000ec0)=ANY=[@ANYRES8=r0, @ANYBLOB], 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x9, 0x8000e, 0xda, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00'}, 0x29) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000840)=""/29, 0x1d}, {&(0x7f0000000880)=""/129, 0x81}, {&(0x7f0000000940)=""/141, 0x8d}, {&(0x7f0000000b00)=""/169, 0xa9}, {&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000bc0)=""/201, 0xc9}, {&(0x7f0000000cc0)=""/118, 0x76}], 0x7, &(0x7f0000000dc0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001ac0)={&(0x7f0000000040)='ext4_unlink_exit\x00'}, 0xa) close(r2) unlink(0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.538960336s ago: executing program 0 (id=7278): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0031da180000000000"], 0x0, 0x5ed, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r3, 0x0, 0x0}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a001c030300000000000009030000000f0000000400000f010000000000000001000000060000000400020000000000000000000400000000080000070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa05000080000008500000048000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b7080000000000007b8af8ff00000000b70800003f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x1002, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000004c0), &(0x7f0000000500)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.443101134s ago: executing program 1 (id=7310): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="9500000000006adc950000000000", @ANYRES64=r2, @ANYRES8=r0, @ANYBLOB="b3152b8e1ba635983fcab82532b46c63eddf539b88c367f24355496464ef8e862f1964904929562c5d6873c6ce625be225000257182b7f460723fa712c9583c6121b6365bcbcd9e82387e8db", @ANYRES8, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x0, 0x0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c80)=[0xffffffffffffffff], &(0x7f0000000300)}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, &(0x7f0000000640)=""/121, 0x98, 0x79, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000dc0)=ANY=[@ANYBLOB="18330000a84c0000000000000000000018000000000009000000000008000000950000813f377100f444877d1f1b8c7dcf00cde92eb6a17be51014090d254eb2da69ce6b4f3dc5a4d45143830ff03a6a93630d6e78be1f52997ca18c1d9d28539eeea73647a7b170ed2c3ad86968ee56c2a3a85c02f461fc7c00889d024d31e8b5b6347e1a64f1187556d9ab398cfd5f8be57a701daf10487ba83470e0584d76ed658a45f33630847ec37e5fb9686cd3ced86fa6bae04f750775832cdf4f38ce926280a0194ff361a6b42e3f0e861959e0087bb0a292752df0fd8240ad856123299fba"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 1.442627184s ago: executing program 3 (id=7311): socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/163, 0xa3}], 0x300}, 0x0) sendmsg$tipc(r0, &(0x7f0000000940)={&(0x7f0000000400)=@name={0x1e, 0x2, 0x2, {{0x0, 0x4}, 0x2}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000440)="cfe6a7d957110cdd213ea880a7d4e536e156bb6689a2a5dd3ad4e17ea80e658da5eb5ffa854bec4798933a7c444c7e41d71f393f5c78a3d01d0778de522de2d509597a6cd1962b2c85404f81865c591e9c24b24b1a1c2119ba16ebe8aecba112a3f0cf60218b07eec470f7a62ae92e49a80cf51267573b48c5913f5929a51efa1929f9f30c4d0c3dcbdd0cac", 0x8c}, {&(0x7f0000000740)="eb8c5eaa684425351ca07a01de9f1eea79ab8fdc5f76b99b738ebb3fe45b1440650c1f2b494ac880d150697755b1b201fd709e7e1a59382877292c090fa433ce22774a314710244d2c9e2c946e87af3830b79f54f52dad14af3253138fff052a15ca6f164b474047e733cffd2a91e675517742257a39f33acdd79009bb9e69c804bc164b5b929eef4084ccdfa8823109bde489b5b97d593bf7f9c64c4bb96f97d5e6da57aaa73e74a566e3b7420e1ae448c94ac494afd9e0213e73f258e0fb8b3c08b7d7c6f29b652ce86df5c6aaac1f3357f5e5efcf408a422b41eb3b27951aa394c3b8b1a005", 0xe7}, {&(0x7f0000000840)="2d99d69ea1043dffb140be597c903feedd570dcef883dff6a00ca7321a31c4a83ed55ba57fd5f3b0d2d3ebca69fbf61dd15a95232846d02e230a7fabb0e26ed2d08b53d3efc7c16b636023883497f8dbfb495cef9d4c0930aad8353a42d1fbbcd5adc7f4c243230d15a2ef66c8d4dcae3152a89e1744740570df4a568846bedbf2469f3b604fe1ec6069b817f9e2a930392dcb165d8b573f9356693354159e5c5464b6047676de8f", 0xa8}], 0x3, &(0x7f0000000900)="affa6278289eec790bad3d171e96f7e7", 0x10, 0x4000000}, 0x0) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x58, &(0x7f0000000a40)}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b80)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0x12, 0x7fff, 0x3f, 0x3cb, 0x828, 0x1, 0x6}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0x6, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@map_fd={0x18, 0x0, 0x2, 0x0, r2}, @call]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xd2, &(0x7f0000000040)=""/210}, 0x21) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x6, 0x100, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000400000004000000002000000000000000000000300000000031400000200000000000000000000000000000105000000200000000000000000000003000000000200000002"], 0x0, 0x5a}, 0x20) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000}, 0x8452, 0x0, 0x0, 0x0, 0x3, 0xffffffff}, 0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcff7ffa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67e6ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4510555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cace339f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d000000009682e24b92533ac2a997d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f18215523167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3037ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cb8846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966f08294cd6f496e5dee734fe7da3770845cf442d488afd80e170000000000000000000000000000000000000000000000000000052007563885a1105000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb9aaa57a8abef8b64237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2c09000000bfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07000000ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbcbf2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00a40e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2add58ffb25f339297729a7a51810134d3dfbf71f651600eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47547f164391c673b6079e65d7295eed164ca63e4ea26d65f6b3ce0f6591d80dfb8f386bb74b5589829b6b067903000000000000003d9950d48c774eaa35b24fce696af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c80c57ed04dbc574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff559973c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511732f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db55474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a8340000000000000008029be3788dd8422b1ab7b4c9d5b7d8682fd750947109c713108e1386f5843a9ee29af30ecbeb26ff81f0921be501ade32a81aa175f4f8f117fc23b2adb38200f0f360e213534e14fae98502f92017d32f29777b6890ad5a103352dd80f036db18220932a2d26e0f9f807c4eb9ae9ba0b77c54bcf501873ce30286cdd633346bc11ed2259ab31f0bc2630a23738a646833b4d03f0028835f71cee1a5bafec9de0cfe4b5f0197fa9c7f5bcac99dbd85fb924db68d7384d4c5ab1087e4464592f278036d2b81e02a3be90a6b8757ece967569d66c8399796825e80f4dc6b3920ed9813a259de560000000000000000000000000000aeecc3447c907474d2129496fc6f6bc804965f8caaac7e2ef733f77708d618dbeae5352a5bc32d826a1b62cd698b4cfdc74ba5e8f18e808783fd5f32ef793a3069ac0906609aa9ca7dca982d6e903aea749f60beb35e2bee8eb43b8c65f4526c61281d6517f1f6e9741365acdaf8ae916575459f7d14087f826f97c94b09cd1275e576d17f76b39a6ac9e33030d67262209a52012dd9c9c60e45c51dd06ee7ba3d0c53a16070536d583ab8639d4fafe62997819033338a5ea4a5d2b61d05de4d5ad4c8dd0de3b98a1f4d6142851571b8d61715c7cb557373854f7eaf2f4e4bfd3dcb6c1d2e7b0bcb4d896092e90f95a61df4ffeeb64dee29de77fba312943bc53efb61138a5a82f7a828c04faf679edf2fa31cdfc57a2cb7ce03f3cdc40a1a20e82e54d10ce35579d7e065a8840abf4ce792ced89bd4288c8d427000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"/3112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x1f, 0x0, 0xff, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200}, 0x0, 0x5, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1a04"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x80) 1.440623044s ago: executing program 2 (id=7255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0xfffffffffffffef9, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r3, 0x2, '\x00', r6, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) close(r11) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) (async, rerun: 64) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYBLOB="761a45b79f5cacece29551bf0e18388b3cb67321a6cb8779e485df136d1e8ff75638a019fe222f0a3f6ccbf88412715c49fd86995ea776eac84f9675191d38bee88a4b08ebbd5cda767fdf7cdce1010c20ee2f2c5ab1e2322c4368e857119961c419cd986990c7bd2c863c64e6aad9bf13371ed7ab971b42497e159e7f9bc7e47ee373ccb1eff1746ed6e33bf234afb98e66c7eb4521ce47d84891b0c35892484b73057c22387206a74ff19c91670d6da3e75747b1f7a3592f83321a4b4cadcc", @ANYBLOB="0000000000000000b702000000000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000010000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000ffab911b1b56e09fc3c59a28fdffffbf9000000000000007040000f0ffffffc4", @ANYRES32=r12, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000", @ANYRES32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.379925189s ago: executing program 4 (id=7312): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000005a96bdcb20f01c509b8aa2375a2c0adf227c78ee98b6ac2ba7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="e68832a3dfaab73c000000000000000061127800000000009500000700770000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000054e5e9a5d4b7b2068600"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 1.379335769s ago: executing program 0 (id=7278): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0031da180000000000"], 0x0, 0x5ed, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r3, 0x0, 0x0}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a001c030300000000000009030000000f0000000400000f010000000000000001000000060000000400020000000000000000000400000000080000070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa05000080000008500000048000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b7080000000000007b8af8ff00000000b70800003f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x1002, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000004c0), &(0x7f0000000500)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.322931514s ago: executing program 1 (id=7313): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYRESDEC=r1], 0x0, 0xffffffff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='fsi_master_acf_cmd_abs_addr\x00', r3}, 0x10) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={0x0, 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000600), 0x12) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r6}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) 1.322638824s ago: executing program 2 (id=7255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0xfffffffffffffef9, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r3, 0x2, '\x00', r6, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) close(r11) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) (async, rerun: 64) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYBLOB="761a45b79f5cacece29551bf0e18388b3cb67321a6cb8779e485df136d1e8ff75638a019fe222f0a3f6ccbf88412715c49fd86995ea776eac84f9675191d38bee88a4b08ebbd5cda767fdf7cdce1010c20ee2f2c5ab1e2322c4368e857119961c419cd986990c7bd2c863c64e6aad9bf13371ed7ab971b42497e159e7f9bc7e47ee373ccb1eff1746ed6e33bf234afb98e66c7eb4521ce47d84891b0c35892484b73057c22387206a74ff19c91670d6da3e75747b1f7a3592f83321a4b4cadcc", @ANYBLOB="0000000000000000b702000000000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000010000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000ffab911b1b56e09fc3c59a28fdffffbf9000000000000007040000f0ffffffc4", @ANYRES32=r12, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000", @ANYRES32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.236250091s ago: executing program 3 (id=7314): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8d, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x63, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYRESHEX=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYRESHEX=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) 1.2332681s ago: executing program 4 (id=7315): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r3, 0xc0189436, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x58fba86195ef874a, 0xc, &(0x7f0000000880)=ANY=[@ANYRES16=r0, @ANYRES32=r4, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x80000001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xb6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="0580300001000000180000000700000000000000010000000b2e0100"], 0x0, 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x9062d06}, 0x10}, 0x90) syz_open_procfs$namespace(r8, &(0x7f0000000380)='ns/user\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 1.230668981s ago: executing program 0 (id=7278): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0031da180000000000"], 0x0, 0x5ed, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r3, 0x0, 0x0}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a001c030300000000000009030000000f0000000400000f010000000000000001000000060000000400020000000000000000000400000000080000070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa05000080000008500000048000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b7080000000000007b8af8ff00000000b70800003f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x1002, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000004c0), &(0x7f0000000500)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.191096414s ago: executing program 1 (id=7316): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000eb060002000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x4, 0x500, 0x7, 0x20}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000000)="83", 0x0}, 0x20) r3 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x10800}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x1, 0x20, 0x8, 0xff, 0x0, 0xf404, 0x80000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0xff}, 0x10000, 0x8, 0x0, 0x8, 0x850, 0x8001, 0x80, 0x0, 0x93, 0x0, 0xfffffffffffffffb}, r3, 0xb, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008002825b703000000800000850000002d0000079500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x51) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x2e, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="184000000000000000000000001000009500007f7a456e24"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_queued\x00', 0x26e1, 0x0) close(r10) openat$cgroup_procs(r10, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) 1.190655614s ago: executing program 2 (id=7255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0xfffffffffffffef9, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r3, 0x2, '\x00', r6, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) close(r11) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) (async, rerun: 64) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYBLOB="761a45b79f5cacece29551bf0e18388b3cb67321a6cb8779e485df136d1e8ff75638a019fe222f0a3f6ccbf88412715c49fd86995ea776eac84f9675191d38bee88a4b08ebbd5cda767fdf7cdce1010c20ee2f2c5ab1e2322c4368e857119961c419cd986990c7bd2c863c64e6aad9bf13371ed7ab971b42497e159e7f9bc7e47ee373ccb1eff1746ed6e33bf234afb98e66c7eb4521ce47d84891b0c35892484b73057c22387206a74ff19c91670d6da3e75747b1f7a3592f83321a4b4cadcc", @ANYBLOB="0000000000000000b702000000000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000010000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000ffab911b1b56e09fc3c59a28fdffffbf9000000000000007040000f0ffffffc4", @ANYRES32=r12, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000", @ANYRES32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 763.521798ms ago: executing program 0 (id=7278): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0031da180000000000"], 0x0, 0x5ed, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r3, 0x0, 0x0}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a001c030300000000000009030000000f0000000400000f010000000000000001000000060000000400020000000000000000000400000000080000070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa05000080000008500000048000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b7080000000000007b8af8ff00000000b70800003f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x1002, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000004c0), &(0x7f0000000500)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 564.998714ms ago: executing program 4 (id=7317): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa2000000"], 0x0, 0x0, 0x48, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r1, @ANYRES16=r1], 0x0, 0x3, 0x0, 0x0, 0x40f00}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYRES16=r0, @ANYRES64=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) (async) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000000000}, 0x0, 0xfffffffffffff245}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r8, 0x1, 0x2d, &(0x7f0000000040), 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r6, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000280), 0x0, 0xcb, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x60, 0x10, &(0x7f00000002c0), &(0x7f0000000400), 0x8, 0x3b, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) write$cgroup_subtree(r10, &(0x7f0000000040)=ANY=[@ANYBLOB='-'], 0xc) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) (async) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r12, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 564.268405ms ago: executing program 2 (id=7255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0xfffffffffffffef9, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r3, 0x2, '\x00', r6, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) close(r11) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) (async, rerun: 64) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYBLOB="761a45b79f5cacece29551bf0e18388b3cb67321a6cb8779e485df136d1e8ff75638a019fe222f0a3f6ccbf88412715c49fd86995ea776eac84f9675191d38bee88a4b08ebbd5cda767fdf7cdce1010c20ee2f2c5ab1e2322c4368e857119961c419cd986990c7bd2c863c64e6aad9bf13371ed7ab971b42497e159e7f9bc7e47ee373ccb1eff1746ed6e33bf234afb98e66c7eb4521ce47d84891b0c35892484b73057c22387206a74ff19c91670d6da3e75747b1f7a3592f83321a4b4cadcc", @ANYBLOB="0000000000000000b702000000000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000010000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000ffab911b1b56e09fc3c59a28fdffffbf9000000000000007040000f0ffffffc4", @ANYRES32=r12, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000", @ANYRES32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 394.564378ms ago: executing program 0 (id=7278): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0031da180000000000"], 0x0, 0x5ed, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r3, 0x0, 0x0}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a001c030300000000000009030000000f0000000400000f010000000000000001000000060000000400020000000000000000000400000000080000070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa05000080000008500000048000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b7080000000000007b8af8ff00000000b70800003f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x1002, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000004c0), &(0x7f0000000500)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 340.932973ms ago: executing program 3 (id=7318): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mm_page_free\x00', r0}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x8, 0x4, 0x800}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180)={0x7}, 0x8) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000009e8685000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000cbd520850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000040007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000004c0)={0x0, r1}, 0x10) perf_event_open(0x0, 0x0, 0x3, r7, 0x0) (async) openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300)=0xffffffffffffffff, 0x12) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x63}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$SIOCSIFHWADDR(r2, 0x89f1, &(0x7f0000000900)={'lo\x00', @local}) (async, rerun: 64) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x100002, 0x0) (rerun: 64) write$cgroup_int(r9, &(0x7f0000000200), 0x43451) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xd, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x0, 0x71, 0x10, 0xb7}}, &(0x7f0000000480)='GPL\x00'}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x40086602, &(0x7f00000002c0)=0x84005) 339.827593ms ago: executing program 4 (id=7319): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000ec0)=ANY=[@ANYRES8=r0, @ANYBLOB], 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x9, 0x8000e, 0xda, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='rss_stat\x00'}, 0x29) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000840)=""/29, 0x1d}, {&(0x7f0000000880)=""/129, 0x81}, {&(0x7f0000000940)=""/141, 0x8d}, {&(0x7f0000000b00)=""/169, 0xa9}, {&(0x7f0000000a00)=""/24, 0x18}, {&(0x7f0000000bc0)=""/201, 0xc9}, {&(0x7f0000000cc0)=""/118, 0x76}], 0x7, &(0x7f0000000dc0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001ac0)={&(0x7f0000000040)='ext4_unlink_exit\x00'}, 0xa) close(r2) unlink(0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 338.432203ms ago: executing program 1 (id=7320): openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32=0x0, @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r3, 0xc0189436, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x58fba86195ef874a, 0xc, &(0x7f0000000880)=ANY=[@ANYRES16=r0, @ANYRES32=r4, @ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x80000001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xb6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="0580300001000000180000000700000000000000010000000b2e0100"], 0x0, 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x9062d06}, 0x10}, 0x90) syz_open_procfs$namespace(r8, &(0x7f0000000380)='ns/user\x00') socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 335.154263ms ago: executing program 2 (id=7255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0xfffffffffffffef9, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r3, 0x2, '\x00', r6, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) close(r11) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) (async, rerun: 64) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYBLOB="761a45b79f5cacece29551bf0e18388b3cb67321a6cb8779e485df136d1e8ff75638a019fe222f0a3f6ccbf88412715c49fd86995ea776eac84f9675191d38bee88a4b08ebbd5cda767fdf7cdce1010c20ee2f2c5ab1e2322c4368e857119961c419cd986990c7bd2c863c64e6aad9bf13371ed7ab971b42497e159e7f9bc7e47ee373ccb1eff1746ed6e33bf234afb98e66c7eb4521ce47d84891b0c35892484b73057c22387206a74ff19c91670d6da3e75747b1f7a3592f83321a4b4cadcc", @ANYBLOB="0000000000000000b702000000000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000010000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000ffab911b1b56e09fc3c59a28fdffffbf9000000000000007040000f0ffffffc4", @ANYRES32=r12, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000", @ANYRES32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 43.137016ms ago: executing program 0 (id=7278): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x20000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x502, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0031da180000000000"], 0x0, 0x5ed, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r3, 0x0, 0x0}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="9feb01001800000000000000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a001c030300000000000009030000000f0000000400000f010000000000000001000000060000000400020000000000000000000400000000080000070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa05000080000008500000048000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b7080000000000007b8af8ff00000000b70800003f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000850000"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x0, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x1002, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000380)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r9}, &(0x7f00000004c0), &(0x7f0000000500)=r6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.57023ms ago: executing program 1 (id=7321): r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xfea4}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8f41c288d409ef0e169a340295f36d4b4", &(0x7f0000000180), 0x7, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYRES8=r4, @ANYRES8=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f8f96c32189c904eaef580987f1ce601a7cdc35461db9981ac42f9e24b0699bbe4e3d986e38952b0b7938eefd9e7a292bbb66367ad77045fdc18855c81c031dedd185c723238373fc698d676791d04f1ff5f0825a6619e844882f31ed190233d58ecee949e310bf2b1a51b8a33ae65a06d2b6ad386bf8dc49dd328bcd75d1843a13d68560175a18af7efc3c0f20e32f84f6aaaf000000000000000000000013a6c66bce74a8fb9092023df695da2714a7933d699d42de2bc4a85e0a0e22228290a7a7553ab93a16e42553ed86869a02df2f47d4088fac1772d3cd955c81cbf91c2ca7942942f61723b558079b82547844f92df2499c4b2c2ef2539e5daa8d8727baaa6b5755e6f83bbfca000000000000000000000509619f5f0cbc72eebc653946d3552236f0dfe485cfa71bd69f4ded6e131128c3875b785875addfcbd5931c12adbef75535e694f3a19f28f9f99fa32e8ff66e7b1ff674434fb63ba0e28aadccf77d387525c98e81476058c958eaccfa7d251d0671222dc9d06485f7f690d3d4227bd21bd7ff8338617705b7faec47c86789a488b43d0fedf1b0ee05d65c677ced1e8214b2f6cb74d73886eb"], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x400000}, 0x8, 0x10, &(0x7f0000000500), 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffd73) r10 = gettid() bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x0, '\x00', 0x0, r8, 0x0, 0x2, 0x2}, 0x48) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x0, 0x0, 0x3, 0x0, 0x6d18, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0xa07}, 0x711, 0x0, 0x5, 0x0, 0x3, 0x4, 0x6}, r10, 0xaffffffffffffffc, r1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r11) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r12, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r13, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="70d370117ddb"}) 4.2039ms ago: executing program 3 (id=7322): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async, rerun: 32) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x20000773}], 0x1}, 0x0) r5 = syz_clone(0x68800, &(0x7f0000000540)="5ebcd469bc10bde565ba98e1071e2008cc75f9a46b7563cabd3aa8a633d0f3e55654fbff263e78e01fe95c90a33a47cd3813448b6a03ff61d865c057f8367ca99b93253627d1e8dd4365a0bec1d5467fe178a424e6fbc3bfaea7971c3e17dfd97027f268429ab9db788b3b05900d50be49a5d70b23a520a7c510739816e4e16d4c567d8588932f6fa718e7473f900191b8a5520b2ffffb7301978f94a29461943a22e39d8f6a9058be8d4e286115152d9d554b541e684df0aeb74897600a6b0d42525fa8a3924d", 0xc7, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="1140bf292d668e1f6ca2edaa4979f9174e62") perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x1, 0x1, 0xdf, 0x2b, 0x0, 0x7fffffffffffffff, 0x8202, 0x18, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x4000, 0xb5, 0xfffffffd, 0x6, 0x401, 0x9, 0xe63f, 0x0, 0x80000001, 0x0, 0x2}, r5, 0xffffffffffffffff, r2, 0x9) (async, rerun: 32) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) (async, rerun: 32) recvmsg$unix(r3, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) 1.80866ms ago: executing program 4 (id=7323): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x15, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="9500000000006adc950000000000", @ANYRES64=r2, @ANYRES8=r0, @ANYBLOB="b3152b8e1ba635983fcab82532b46c63eddf539b88c367f24355496464ef8e862f1964904929562c5d6873c6ce625be225000257182b7f460723fa712c9583c6121b6365bcbcd9e82387e8db", @ANYRES8, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x0, 0x0, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c80)=[0xffffffffffffffff], &(0x7f0000000300)}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={0x0, &(0x7f0000000640)=""/121, 0x98, 0x79, 0x1}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000dc0)=ANY=[@ANYBLOB="18330000a84c0000000000000000000018000000000009000000000008000000950000813f377100f444877d1f1b8c7dcf00cde92eb6a17be51014090d254eb2da69ce6b4f3dc5a4d45143830ff03a6a93630d6e78be1f52997ca18c1d9d28539eeea73647a7b170ed2c3ad86968ee56c2a3a85c02f461fc7c00889d024d31e8b5b6347e1a64f1187556d9ab398cfd5f8be57a701daf10487ba83470e0584d76ed658a45f33630847ec37e5fb9686cd3ced86fa6bae04f750775832cdf4f38ce926280a0194ff361a6b42e3f0e861959e0087bb0a292752df0fd8240ad856123299fba"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 0s ago: executing program 2 (id=7255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0xfffffffffffffef9, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, r3, 0x2, '\x00', r6, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) (rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r10], 0x18}, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) close(r11) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) (async, rerun: 64) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYBLOB="761a45b79f5cacece29551bf0e18388b3cb67321a6cb8779e485df136d1e8ff75638a019fe222f0a3f6ccbf88412715c49fd86995ea776eac84f9675191d38bee88a4b08ebbd5cda767fdf7cdce1010c20ee2f2c5ab1e2322c4368e857119961c419cd986990c7bd2c863c64e6aad9bf13371ed7ab971b42497e159e7f9bc7e47ee373ccb1eff1746ed6e33bf234afb98e66c7eb4521ce47d84891b0c35892484b73057c22387206a74ff19c91670d6da3e75747b1f7a3592f83321a4b4cadcc", @ANYBLOB="0000000000000000b702000000000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000010000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000ffab911b1b56e09fc3c59a28fdffffbf9000000000000007040000f0ffffffc4", @ANYRES32=r12, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000", @ANYRES32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): de [ 184.342594][ T8418] device pim6reg1 entered promiscuous mode [ 184.610951][ T8482] device pim6reg1 entered promiscuous mode [ 185.451596][ T8535] device veth0_vlan left promiscuous mode [ 185.491251][ T8535] device veth0_vlan entered promiscuous mode [ 185.512106][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.548135][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.593230][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.684470][ T8570] device veth0_to_batadv left promiscuous mode [ 185.690598][ T8570] bridge0: port 3(veth0_to_batadv) entered disabled state [ 185.735711][ T8570] device bridge_slave_1 left promiscuous mode [ 185.745647][ T8570] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.754336][ T8570] device bridge_slave_0 left promiscuous mode [ 185.767281][ T8570] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.942561][ T8554] device syzkaller0 entered promiscuous mode [ 186.083647][ T8595] rose0: tun_chr_ioctl cmd 1074812118 [ 186.200078][ T321] device bridge_slave_1 left promiscuous mode [ 186.207493][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.237595][ T321] device bridge_slave_0 left promiscuous mode [ 186.262102][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.287645][ T321] device veth1_macvtap left promiscuous mode [ 186.519313][ T8607] device syzkaller0 entered promiscuous mode [ 186.798208][ T8636] device syzkaller0 entered promiscuous mode [ 186.901744][ T8659] tap0: tun_chr_ioctl cmd 1074025675 [ 186.915640][ T8659] tap0: persist enabled [ 186.990944][ T8665] tap0: tun_chr_ioctl cmd 1074025675 [ 186.998866][ T8665] tap0: persist enabled [ 187.277529][ T8686] device pim6reg1 entered promiscuous mode [ 187.368779][ T8688] device sit0 left promiscuous mode [ 187.465184][ T8698] syz.2.2273[8698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.896097][ T8774] syz.2.2291[8774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.936732][ T8774] syz.2.2291[8774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.977563][ T8859] device veth0_to_team entered promiscuous mode [ 192.085755][ T8875] device sit0 entered promiscuous mode [ 192.172621][ T8879] device syzkaller0 entered promiscuous mode [ 192.757804][ T8890] : renamed from vlan0 [ 192.766373][ T8894] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.773272][ T8894] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.818551][ T8894] device bridge0 left promiscuous mode [ 192.934163][ T8913] device veth0_vlan left promiscuous mode [ 193.028044][ T8913] device veth0_vlan entered promiscuous mode [ 193.971782][ T8975] device syzkaller0 entered promiscuous mode [ 194.169952][ T321] device bridge_slave_1 left promiscuous mode [ 194.175965][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.183195][ T321] device bridge_slave_0 left promiscuous mode [ 194.189234][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.196801][ T321] device veth1_macvtap left promiscuous mode [ 195.041204][ T9047] device wg2 entered promiscuous mode [ 197.100788][ T9099] syz.0.2380[9099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.100837][ T9099] syz.0.2380[9099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.103077][ T9097] syz.0.2380[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.123470][ T9099] syz.0.2380[9099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.129953][ T9097] syz.0.2380[9097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.134635][ T9099] syz.0.2380[9099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.422352][ T9138] device sit0 left promiscuous mode [ 197.864806][ T9157] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.910822][ T9157] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.999316][ T9157] device bridge_slave_0 entered promiscuous mode [ 198.085313][ T9157] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.155548][ T9157] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.163297][ T9157] device bridge_slave_1 entered promiscuous mode [ 198.798308][ T9178] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.805149][ T9178] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.812775][ T9178] device bridge_slave_0 entered promiscuous mode [ 198.821740][ T9178] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.828759][ T9178] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.836387][ T9178] device bridge_slave_1 entered promiscuous mode [ 198.919182][ T9178] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.926134][ T9178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.933215][ T9178] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.940030][ T9178] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.179250][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.209698][ T2181] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.224296][ T2181] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.303742][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.322237][ T2181] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.329094][ T2181] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.336819][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.344759][ T2181] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.351603][ T2181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.358782][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.366015][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.504400][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.518360][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.529295][ T4986] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.536268][ T4986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.545010][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.554030][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.562754][ T4986] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.569622][ T4986] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.591368][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.599487][ T4986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.901715][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.909883][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.917630][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.925497][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.934439][ T7960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.949735][ T9178] device veth0_vlan entered promiscuous mode [ 199.955900][ T2708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 199.963988][ T2708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 199.972377][ T2708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.980135][ T2708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.087779][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.095287][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.102788][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.120344][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.133606][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.148637][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.158982][ T2191] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.166884][ T2191] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.181064][ T9157] device veth0_vlan entered promiscuous mode [ 200.190602][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 200.199932][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.293831][ T9157] device veth1_macvtap entered promiscuous mode [ 200.301519][ T9178] device veth1_macvtap entered promiscuous mode [ 200.311969][ T4603] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.319459][ T4603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 200.327740][ T4603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.335663][ T4603] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.351643][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.359969][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.373195][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.381563][ T2181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.630692][ T2191] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.638806][ T2191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.647391][ T2191] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.655494][ T2191] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.390514][ T9327] device pim6reg1 entered promiscuous mode [ 201.916784][ T9354] device macsec0 entered promiscuous mode [ 201.957737][ T9355] device veth1_macvtap entered promiscuous mode [ 201.978194][ T4972] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.595969][ T9409] device syzkaller0 entered promiscuous mode [ 202.777084][ T9420] syz.3.2453[9420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.777137][ T9420] syz.3.2453[9420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.839728][ T9418] syz.3.2453[9418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.909246][ T9418] syz.3.2453[9418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.195861][ T9405] device syzkaller0 entered promiscuous mode [ 203.358502][ T9427] device pim6reg1 entered promiscuous mode [ 203.684604][ T9447] geneve1: tun_chr_ioctl cmd 1074025681 [ 204.218571][ T9457] device pim6reg1 entered promiscuous mode [ 204.762523][ T9483] device pim6reg1 entered promiscuous mode [ 205.167081][ T9534] device sit0 entered promiscuous mode [ 205.453594][ T9541] device pim6reg1 entered promiscuous mode [ 205.983625][ T9564] device syzkaller0 entered promiscuous mode [ 206.487413][ T9585] : renamed from vlan0 [ 206.851850][ T9608] device syzkaller0 entered promiscuous mode [ 207.551436][ T9647] device pim6reg1 entered promiscuous mode [ 207.719123][ T9652] syz.0.2520[9652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.719176][ T9652] syz.0.2520[9652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.745677][ T9651] device sit0 entered promiscuous mode [ 209.377037][ T9732] device veth1_macvtap left promiscuous mode [ 209.531315][ T9756] device syzkaller0 entered promiscuous mode [ 209.637546][ T9779] device sit0 left promiscuous mode [ 210.005938][ T9787] device pim6reg1 entered promiscuous mode [ 210.388972][ T24] audit: type=1400 audit(1722953353.760:164): avc: denied { create } for pid=9824 comm="syz.4.2572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 210.419008][ T9828] device pim6reg1 entered promiscuous mode [ 211.516739][ T9869] device syzkaller0 entered promiscuous mode [ 211.539514][ T9860] device veth0_vlan left promiscuous mode [ 211.578412][ T9860] device veth0_vlan entered promiscuous mode [ 211.613521][ T9872] syz.2.2583[9872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.613574][ T9872] syz.2.2583[9872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.770145][ T9881] tap1: tun_chr_ioctl cmd 1074025677 [ 211.804562][ T9881] tap1: linktype set to 1 [ 212.932123][ T9953] lo: mtu less than device minimum [ 216.680447][T10126] syz.4.2642[10126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.680499][T10126] syz.4.2642[10126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.904900][T10213] device vxcan1 entered promiscuous mode [ 219.462242][T10220] device pim6reg1 entered promiscuous mode [ 219.557208][T10224] device syzkaller0 entered promiscuous mode [ 221.084972][T10290] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.091974][T10290] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.266823][T10343] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.279214][T10343] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.292027][T10343] device bridge_slave_0 entered promiscuous mode [ 222.304953][T10343] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.313911][T10343] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.321454][T10343] device bridge_slave_1 entered promiscuous mode [ 222.424549][ T1814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.432207][ T1814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.467479][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.485992][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.503611][ T2163] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.510497][ T2163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.520725][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.529069][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.537265][ T2163] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.544104][ T2163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.551486][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.560096][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.576454][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.584547][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.592436][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.599948][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.611245][ T293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.621649][T10343] device veth0_vlan entered promiscuous mode [ 222.643119][ T1814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.652723][T10343] device veth1_macvtap entered promiscuous mode [ 222.669992][ T1814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.686482][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.399216][T10413] Y4`Ҙ: renamed from lo [ 223.719630][T10424] device macsec0 entered promiscuous mode [ 224.192060][T10450] device veth1_macvtap left promiscuous mode [ 224.664516][T10453] device syzkaller0 entered promiscuous mode [ 227.235724][T10615] device syzkaller0 entered promiscuous mode [ 227.768209][T10652] device veth0_vlan left promiscuous mode [ 227.820155][T10652] device veth0_vlan entered promiscuous mode [ 227.976799][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 227.984757][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 228.076229][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.004239][T10691] device veth0_vlan left promiscuous mode [ 229.010540][T10691] device veth0_vlan entered promiscuous mode [ 230.145330][T10735] device sit0 entered promiscuous mode [ 231.414893][T10760] syz.4.2817[10760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.414933][T10760] syz.4.2817[10760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.756232][T10784] syz.3.2824[10784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.796967][T10784] syz.3.2824[10784] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.956453][T10835] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 237.006924][T10835] syzkaller0: linktype set to 65535 [ 238.703252][T10877] device syzkaller0 entered promiscuous mode [ 238.731231][T10883] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.738219][T10883] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.804677][T10931] device syzkaller0 entered promiscuous mode [ 241.304755][T11094] device syzkaller0 entered promiscuous mode [ 241.372253][T11103] device pim6reg1 entered promiscuous mode [ 241.383580][T11101] device veth0_vlan left promiscuous mode [ 241.390426][T11101] device veth0_vlan entered promiscuous mode [ 241.409623][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.420212][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.436194][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.508408][T11108] device pim6reg1 entered promiscuous mode [ 241.990996][T11131] device syzkaller0 entered promiscuous mode [ 242.014603][T11142] device syzkaller0 entered promiscuous mode [ 243.871831][T11207] device pim6reg1 entered promiscuous mode [ 243.901614][ T24] audit: type=1400 audit(1722953387.270:165): avc: denied { create } for pid=11209 comm="syz.1.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 244.359426][T11252] syz.1.2956[11252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.359473][T11252] syz.1.2956[11252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.496644][T11252] syz.1.2956[11252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.545933][T11252] syz.1.2956[11252] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.615125][T11258] syz.1.2958[11258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.655701][T11258] syz.1.2958[11258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.040974][T11279] syz.2.2965[11279] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 246.577580][T11323] device syzkaller0 entered promiscuous mode [ 247.672091][T11354] device syzkaller0 entered promiscuous mode [ 249.613889][T11433] device syzkaller0 entered promiscuous mode [ 249.822977][T11488] device pim6reg1 entered promiscuous mode [ 251.153527][T11643] syz.3.3057[11643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.153578][T11643] syz.3.3057[11643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.188075][T11633] device syzkaller0 entered promiscuous mode [ 251.597081][T11682] device syzkaller0 entered promiscuous mode [ 251.729709][T11683] bridge0: port 3(veth0_to_batadv) entered blocking state [ 251.739976][T11683] bridge0: port 3(veth0_to_batadv) entered disabled state [ 251.797662][T11683] device veth0_to_batadv entered promiscuous mode [ 251.804834][T11676] device veth0_to_batadv left promiscuous mode [ 251.812173][T11676] bridge0: port 3(veth0_to_batadv) entered disabled state [ 252.054237][T11720] device veth1_macvtap entered promiscuous mode [ 252.061439][T11720] device macsec0 entered promiscuous mode [ 252.172673][T11608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.791436][T11766] device syzkaller0 entered promiscuous mode [ 253.803560][T11829] syz.3.3100[11829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.803638][T11829] syz.3.3100[11829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.822496][T11828] syz.3.3100[11828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.836754][T11828] syz.3.3100[11828] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.008370][T11846] device syzkaller0 entered promiscuous mode [ 254.347931][T11864] syz.3.3109[11864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.347980][T11864] syz.3.3109[11864] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.352404][T11865] syz.3.3109[11865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.708962][T11920] syz.1.3123[11920] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.326724][T11943] device syzkaller0 entered promiscuous mode [ 256.530264][T11945] device syzkaller0 entered promiscuous mode [ 256.737318][T11975] device syzkaller0 entered promiscuous mode [ 257.363980][T11994] device veth0_vlan left promiscuous mode [ 257.526521][T11994] device veth0_vlan entered promiscuous mode [ 258.347325][T12062] device syzkaller0 entered promiscuous mode [ 260.411757][T12222] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.419492][T12222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.436210][T12222] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.443489][T12222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.472484][T12222] device bridge0 entered promiscuous mode [ 260.604550][T12248] device wg2 entered promiscuous mode [ 261.134701][ T2163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 261.194281][T12313] bpf_get_probe_write_proto: 3 callbacks suppressed [ 261.194288][T12313] syz.1.3231[12313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.201281][T12313] syz.1.3231[12313] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.557390][T12323] device pim6reg1 entered promiscuous mode [ 261.964121][T12388] device syzkaller0 entered promiscuous mode [ 262.005555][T12393] device pim6reg1 entered promiscuous mode [ 262.268081][T12402] device syzkaller0 entered promiscuous mode [ 262.860733][T12426] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.867723][T12426] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.898211][T12426] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.905809][T12426] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.920206][T12426] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.928376][T12426] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.980528][T12426] device bridge0 entered promiscuous mode [ 263.138790][T12455] device veth1_macvtap left promiscuous mode [ 263.268304][T12455] device syzkaller0 entered promiscuous mode [ 263.720380][T12469] device veth1_macvtap entered promiscuous mode [ 263.811412][ T1808] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.847620][T12492] device syzkaller0 entered promiscuous mode [ 263.890429][T12499] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.897424][T12499] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.941352][T12499] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.948354][T12499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.961354][T12499] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.968862][T12499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.987867][T12499] device bridge0 entered promiscuous mode [ 264.741689][T12547] device syzkaller0 entered promiscuous mode [ 265.288991][T12567] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x32 [ 265.373829][T12576] device pim6reg1 entered promiscuous mode [ 265.598970][T12581] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.605898][T12581] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.616037][T12581] device bridge0 left promiscuous mode [ 266.785539][T12641] syz.4.3322[12641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.785589][T12641] syz.4.3322[12641] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.844411][T12644] syz.4.3322[12644] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.204618][T12688] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.222708][T12688] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.230654][T12688] device bridge0 left promiscuous mode [ 267.294703][T12688] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.302104][T12688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.310238][T12688] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.317705][T12688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.349020][T12688] device bridge0 entered promiscuous mode [ 267.655919][T12729] device pim6reg1 entered promiscuous mode [ 267.687629][T12735] syz.4.3349[12735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.687684][T12735] syz.4.3349[12735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.768796][T12742] device pim6reg1 entered promiscuous mode [ 267.826249][T12767] syz.4.3358[12767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.826303][T12767] syz.4.3358[12767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.840066][T12767] syz.4.3358[12767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.852033][T12767] syz.4.3358[12767] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.914586][T12784] device veth1_macvtap left promiscuous mode [ 267.937423][T12784] device macsec0 left promiscuous mode [ 268.062626][T12795] device veth1_macvtap entered promiscuous mode [ 268.068742][T12795] device macsec0 entered promiscuous mode [ 268.490863][T12816] device syzkaller0 entered promiscuous mode [ 269.315959][T12839] device syzkaller0 entered promiscuous mode [ 270.825893][T12901] geneve1: tun_chr_ioctl cmd 1074025698 [ 271.228507][T12926] syz.4.3408[12926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.857394][T13038] device syzkaller0 entered promiscuous mode [ 272.557984][T13077] device veth0_vlan left promiscuous mode [ 272.785339][T13077] device veth0_vlan entered promiscuous mode [ 275.142509][T13122] device sit0 entered promiscuous mode [ 275.152587][T13122] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.159470][T13122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.166549][T13122] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.173308][T13122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.180900][T13122] device bridge0 entered promiscuous mode [ 275.194537][T13105] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.202043][T13105] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.238402][T13105] device bridge_slave_0 entered promiscuous mode [ 275.249287][T13105] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.313464][T13105] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.374971][T13105] device bridge_slave_1 entered promiscuous mode [ 275.799716][T13105] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.806604][T13105] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.813688][T13105] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.820479][T13105] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.100645][ T4580] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.111149][ T4580] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.138941][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.147062][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.176075][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 276.204281][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.224380][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.232739][ T2728] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.239584][ T2728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.246754][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.254666][ T2728] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.261510][ T2728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.268892][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.276861][ T2728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.289828][T13105] device veth0_vlan entered promiscuous mode [ 276.320353][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.386136][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.509326][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.571390][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 277.081617][T13163] device syzkaller0 entered promiscuous mode [ 277.176902][T13187] device wg2 left promiscuous mode [ 277.243850][T13105] device veth1_macvtap entered promiscuous mode [ 277.250556][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 277.258991][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.267919][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 277.290058][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 277.298334][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 277.306932][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 277.315234][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.372484][T13211] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.379396][T13211] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.393079][T13211] device bridge0 left promiscuous mode [ 277.464952][T13206] device pim6reg1 entered promiscuous mode [ 277.595577][T13211] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.602461][T13211] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.609580][T13211] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.616426][T13211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.623980][T13211] device bridge0 entered promiscuous mode [ 278.473812][T13258] device veth1_macvtap entered promiscuous mode [ 278.566158][T13258] device macsec0 entered promiscuous mode [ 278.589830][ T4579] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 278.608930][T13265] device pim6reg1 entered promiscuous mode [ 278.815760][T13272] device veth1_macvtap left promiscuous mode [ 279.152548][T13278] device veth1_macvtap entered promiscuous mode [ 279.171488][T13278] device macsec0 entered promiscuous mode [ 279.235324][T13280] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.242316][T13280] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.403707][T13298] device veth0_vlan left promiscuous mode [ 279.409776][T13298] device veth0_vlan entered promiscuous mode [ 279.581916][T11603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.589807][T11603] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 279.597118][T11603] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 279.606459][T13309] device pim6reg1 entered promiscuous mode [ 281.464755][T13338] device veth1_macvtap left promiscuous mode [ 281.471443][T13338] device macsec0 left promiscuous mode [ 281.733633][T13361] bpf_get_probe_write_proto: 3 callbacks suppressed [ 281.733642][T13361] syz.2.3531[13361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.740608][T13362] syz.2.3531[13362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.752826][T13361] syz.2.3531[13361] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.764402][T13362] syz.2.3531[13362] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.591441][T13398] device wg2 entered promiscuous mode [ 283.919010][T13455] device syzkaller0 entered promiscuous mode [ 284.107412][T13490] device syzkaller0 entered promiscuous mode [ 284.118063][ T24] audit: type=1400 audit(1722953427.480:166): avc: denied { create } for pid=13492 comm="syz.0.3567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 284.207070][T13501] ʮ}p: renamed from pim6reg1 [ 284.238532][T13502] device pim6reg1 entered promiscuous mode [ 285.035863][T13543] device sit0 left promiscuous mode [ 285.448949][T13563] device pim6reg1 entered promiscuous mode [ 285.792173][T13582] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 285.955731][T13593] device veth1_macvtap left promiscuous mode [ 286.631491][T13628] syz.0.3609[13628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.631569][T13628] syz.0.3609[13628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.659116][T13628] syz.0.3609[13628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.675682][T13628] syz.0.3609[13628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.288869][T13675] Y4`Ҙ: renamed from lo [ 287.776646][T13704] syz.2.3630[13704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.776703][T13704] syz.2.3630[13704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.790076][T13704] syz.2.3630[13704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.802365][T13704] syz.2.3630[13704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.089368][T13729] syz.0.3640[13729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.100869][T13729] syz.0.3640[13729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.740617][T13890] bridge0: port 3(veth0_to_batadv) entered blocking state [ 290.789495][T13890] bridge0: port 3(veth0_to_batadv) entered disabled state [ 290.843961][T13890] device veth0_to_batadv entered promiscuous mode [ 290.885403][T13890] bridge0: port 3(veth0_to_batadv) entered blocking state [ 290.892375][T13890] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 290.901817][T13896] device veth0_to_batadv left promiscuous mode [ 290.930213][T13896] bridge0: port 3(veth0_to_batadv) entered disabled state [ 290.989593][T13909] device sit0 left promiscuous mode [ 291.821757][T13995] device pim6reg1 entered promiscuous mode [ 292.246315][T14042] device sit0 left promiscuous mode [ 292.267229][T14038] device pim6reg1 entered promiscuous mode [ 292.291907][T14042] device sit0 entered promiscuous mode [ 293.260875][T14097] device pim6reg1 entered promiscuous mode [ 294.974058][T14188] device syzkaller0 entered promiscuous mode [ 298.314587][T14283] device pim6reg1 entered promiscuous mode [ 298.417839][T14288] syz.4.3793[14288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.417889][T14288] syz.4.3793[14288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.755176][T14305] bridge0: port 3(veth0_to_batadv) entered blocking state [ 298.778376][T14305] bridge0: port 3(veth0_to_batadv) entered disabled state [ 298.848349][T14305] device veth0_to_batadv entered promiscuous mode [ 298.874727][T14314] device veth0_to_batadv left promiscuous mode [ 298.881667][T14314] bridge0: port 3(veth0_to_batadv) entered disabled state [ 300.625625][T14400] device veth0_vlan left promiscuous mode [ 300.632078][T14400] device veth0_vlan entered promiscuous mode [ 300.790848][T14437] device syzkaller0 entered promiscuous mode [ 301.205090][T14427] device syzkaller0 entered promiscuous mode [ 301.310662][T14450] device syzkaller0 entered promiscuous mode [ 301.326983][ T24] audit: type=1400 audit(1722953444.700:167): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 301.349225][ T24] audit: type=1400 audit(1722953444.700:168): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 301.371763][ T24] audit: type=1400 audit(1722953444.700:169): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 301.600217][T14460] device pim6reg1 entered promiscuous mode [ 302.111042][T14498] ʮ}p: renamed from pim6reg1 [ 303.273369][T14569] device veth1_macvtap entered promiscuous mode [ 303.316112][T14569] device macsec0 entered promiscuous mode [ 303.400465][T11591] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 303.444780][T14585] device pim6reg1 entered promiscuous mode [ 304.564361][T14621] device syzkaller0 entered promiscuous mode [ 304.672090][T14637] syz.0.3883[14637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.672144][T14637] syz.0.3883[14637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.733497][T14637] device syzkaller0 entered promiscuous mode [ 304.816423][T14662] device pim6reg1 entered promiscuous mode [ 305.683679][T14697] : renamed from ipvlan1 [ 306.075349][T14744] device syzkaller0 entered promiscuous mode [ 306.235199][T14756] device sit0 entered promiscuous mode [ 306.422736][T14765] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.429859][T14765] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.437317][T14765] device bridge_slave_0 entered promiscuous mode [ 306.444203][T14765] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.451863][T14765] bridge0: port 2(bridge_slave_1) entered disabled state [ 306.459399][T14765] device bridge_slave_1 entered promiscuous mode [ 306.555761][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.563359][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.600939][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.620625][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.629534][ T7948] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.636422][ T7948] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.643839][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.652531][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.669077][ T7948] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.675956][ T7948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.798702][T14773] device syzkaller0 entered promiscuous mode [ 306.805209][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.864894][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 306.876129][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 306.883954][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 306.892419][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 306.916134][T14771] device syzkaller0 entered promiscuous mode [ 306.936666][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.946853][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.955075][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 306.965527][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.974530][T14765] device veth0_vlan entered promiscuous mode [ 306.990785][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.000145][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.032164][T14765] device veth1_macvtap entered promiscuous mode [ 307.042243][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 307.071722][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 307.080447][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 307.143574][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 307.196181][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 307.320540][T14778] device sit0 entered promiscuous mode [ 307.646439][ T216] device bridge_slave_1 left promiscuous mode [ 307.652385][ T216] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.673669][ T216] device bridge_slave_0 left promiscuous mode [ 307.681372][ T216] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.690299][ T216] device veth1_macvtap left promiscuous mode [ 307.696220][ T216] device veth0_vlan left promiscuous mode [ 308.352506][T14860] device pim6reg1 entered promiscuous mode [ 308.454556][T14871] syz.1.3950[14871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.454589][T14871] syz.1.3950[14871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 309.018124][T14908] device pim6reg1 entered promiscuous mode [ 309.077590][T14916] device pim6reg1 entered promiscuous mode [ 309.158595][T14925] device sit0 left promiscuous mode [ 309.210722][T14925] device sit0 entered promiscuous mode [ 309.274583][T14934] device sit0 left promiscuous mode [ 309.284910][T14935] device sit0 entered promiscuous mode [ 310.258061][T15035] device pim6reg1 entered promiscuous mode [ 310.316012][T15045] device sit0 left promiscuous mode [ 310.541506][T15053] cgroup: fork rejected by pids controller in /syz1 [ 310.984316][T15068] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.991593][T15068] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.999462][T15068] device bridge_slave_0 entered promiscuous mode [ 311.029291][T15068] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.037201][T15068] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.044410][T15068] device bridge_slave_1 entered promiscuous mode [ 311.108963][T15068] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.115830][T15068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.122906][T15068] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.129729][T15068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.455719][T15078] device syzkaller0 entered promiscuous mode [ 311.468626][T15086] device sit0 left promiscuous mode [ 311.486655][T15093] device sit0 entered promiscuous mode [ 311.519813][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 311.527495][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.536676][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.580172][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.588434][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.601017][T15075] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.608340][T15075] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.615658][T15075] device bridge_slave_0 entered promiscuous mode [ 311.622912][T15075] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.629759][T15075] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.638001][T15075] device bridge_slave_1 entered promiscuous mode [ 311.656770][T15107] geneve1: tun_chr_ioctl cmd 1074025681 [ 311.710086][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.724012][T15068] device veth0_vlan entered promiscuous mode [ 311.745358][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.754022][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.761298][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.777995][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.790119][T15068] device veth1_macvtap entered promiscuous mode [ 311.802017][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.816931][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 311.825066][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 312.211034][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 312.228991][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 312.280354][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 312.335333][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 312.405525][ T7953] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.412415][ T7953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 312.419657][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 312.427884][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 312.436012][ T7953] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.442851][ T7953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.542248][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 312.593818][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 312.602113][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 312.610634][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 312.659635][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 312.667691][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 312.683466][ T7948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 312.699785][T15075] device veth0_vlan entered promiscuous mode [ 312.726911][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 312.734955][T15146] syz.3.4034[15146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.735011][T15146] syz.3.4034[15146] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.739280][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 312.773898][T15075] device veth1_macvtap entered promiscuous mode [ 312.803840][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 312.818253][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 312.836380][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 312.844494][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 312.852811][ T7953] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 312.917632][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 312.936719][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 312.945076][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 312.953728][ T2177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 313.071776][T15179] device syzkaller0 entered promiscuous mode [ 313.141636][ T7] device bridge_slave_1 left promiscuous mode [ 313.157561][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.246902][ T7] device bridge_slave_0 left promiscuous mode [ 313.252869][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.307068][ T7] device veth1_macvtap left promiscuous mode [ 313.360838][ T7] device veth0_vlan left promiscuous mode [ 313.848020][T15213] syz.0.4050[15213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.848064][T15213] syz.0.4050[15213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.147648][T15235] device sit0 entered promiscuous mode [ 317.289667][T15278] syz.3.4069[15278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.289701][T15278] syz.3.4069[15278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.911156][T15362] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.929302][T15362] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.937898][T15362] device bridge_slave_1 left promiscuous mode [ 318.944049][T15362] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.952291][T15362] device bridge_slave_0 left promiscuous mode [ 318.958614][T15362] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.358279][T15379] device syzkaller0 entered promiscuous mode [ 320.387187][T15431] device veth1_macvtap left promiscuous mode [ 321.642529][T15484] device sit0 entered promiscuous mode [ 324.366066][T15527] device sit0 left promiscuous mode [ 324.469759][T15526] device sit0 entered promiscuous mode [ 325.612587][T15555] device wg2 left promiscuous mode [ 326.168349][T15575] device sit0 entered promiscuous mode [ 327.438239][T15595] syz.3.4151[15595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.438293][T15595] syz.3.4151[15595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.180043][T15635] device syzkaller0 entered promiscuous mode [ 330.250620][T15670] syz.2.4171[15670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.250673][T15670] syz.2.4171[15670] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.571602][T15705] device syzkaller0 entered promiscuous mode [ 331.156172][T15720] device sit0 left promiscuous mode [ 331.494486][T15737] device pim6reg1 entered promiscuous mode [ 331.585074][T15715] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.592545][T15715] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.600944][T15715] device bridge_slave_0 entered promiscuous mode [ 331.610899][T15715] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.618300][T15715] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.626084][T15715] device bridge_slave_1 entered promiscuous mode [ 331.752487][T15715] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.759349][T15715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.766457][T15715] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.773210][T15715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.805104][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.814465][ T7952] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.824328][ T7952] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.848660][ T5000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.856832][ T5000] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.863665][ T5000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.871364][ T5000] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.880292][ T5000] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.887170][ T5000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.895589][ T5000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.903904][ T5000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.922579][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.937545][T15771] device sit0 entered promiscuous mode [ 331.956329][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.964092][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.971462][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.980176][T15715] device veth0_vlan entered promiscuous mode [ 331.994936][T15715] device veth1_macvtap entered promiscuous mode [ 332.010963][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.025146][T15776] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.032133][T15776] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.042435][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.053874][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.193318][T15802] device syzkaller0 entered promiscuous mode [ 332.215237][ T24] audit: type=1400 audit(1722953475.580:170): avc: denied { create } for pid=15807 comm="syz.0.4214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 332.777773][T15827] device syzkaller0 entered promiscuous mode [ 332.867937][T15847] bridge0: port 3(veth0_to_batadv) entered blocking state [ 332.874916][T15847] bridge0: port 3(veth0_to_batadv) entered disabled state [ 332.882324][T15847] device veth0_to_batadv entered promiscuous mode [ 332.911297][T15847] device veth0_to_batadv left promiscuous mode [ 332.917479][T15847] bridge0: port 3(veth0_to_batadv) entered disabled state [ 332.950774][T15849] device pim6reg1 entered promiscuous mode [ 333.400613][T15884] device syzkaller0 entered promiscuous mode [ 333.880743][T15904] device veth0_virt_wifi entered promiscuous mode [ 334.240581][T15922] device sit0 left promiscuous mode [ 334.449462][T15925] device syzkaller0 entered promiscuous mode [ 334.726542][T15939] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 334.735190][T15939] device syzkaller0 entered promiscuous mode [ 335.042257][T15969] device pim6reg1 entered promiscuous mode [ 335.747779][T16003] device syzkaller0 entered promiscuous mode [ 338.107490][T16126] device syzkaller0 entered promiscuous mode [ 339.057907][T16183] syz.0.4314[16183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.057979][T16183] syz.0.4314[16183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.226740][T16183] syz.0.4314[16183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.271217][T16183] syz.0.4314[16183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.624914][T16213] device macsec0 left promiscuous mode [ 340.397052][T16255] device pim6reg1 entered promiscuous mode [ 340.833736][T16276] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.840705][T16276] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.910363][T16276] device bridge0 left promiscuous mode [ 340.945144][T16277] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.952032][T16277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.959112][T16277] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.965887][T16277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.033944][T16277] device bridge0 entered promiscuous mode [ 341.301935][T16283] device pim6reg1 entered promiscuous mode [ 341.360496][T16293] -: renamed from syzkaller0 [ 341.382347][T16301] device pim6reg1 entered promiscuous mode [ 342.368441][T16319] device syzkaller0 entered promiscuous mode [ 346.868767][T16489] device sit0 entered promiscuous mode [ 347.905968][T16512] device pim6reg1 entered promiscuous mode [ 348.068586][T16551] syz.4.4414[16551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.068654][T16551] syz.4.4414[16551] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.317791][T16580] device vxcan1 entered promiscuous mode [ 349.337052][T16581] device pim6reg1 entered promiscuous mode [ 349.725687][T16600] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.732680][T16600] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.780351][T16603] device syzkaller0 entered promiscuous mode [ 349.786918][T16600] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.793749][T16600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.801010][T16600] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.807870][T16600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.819572][T16600] device bridge0 entered promiscuous mode [ 350.711335][T16610] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.719709][T16610] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.733580][T16610] device bridge0 left promiscuous mode [ 351.063089][T16622] device syzkaller0 entered promiscuous mode [ 351.582081][T16635] device syzkaller0 entered promiscuous mode [ 351.693788][T16647] device pim6reg1 entered promiscuous mode [ 351.984908][T16703] device macsec0 entered promiscuous mode [ 354.464998][T16780] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.488733][T16780] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.582433][T16780] device bridge_slave_0 entered promiscuous mode [ 354.752236][T16780] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.763362][T16780] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.770848][T16780] device bridge_slave_1 entered promiscuous mode [ 355.276263][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 355.284113][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.296874][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 355.304323][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 355.311821][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 355.320915][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 355.330158][ T4985] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.337008][ T4985] bridge0: port 1(bridge_slave_0) entered forwarding state [ 355.345528][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 355.353784][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 355.362083][ T4985] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.368928][ T4985] bridge0: port 2(bridge_slave_1) entered forwarding state [ 355.376850][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 355.420638][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 355.431662][T16780] device veth0_vlan entered promiscuous mode [ 355.449655][T15355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.676567][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.683854][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 355.705474][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 355.716288][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 355.726094][T16780] device veth1_macvtap entered promiscuous mode [ 355.858577][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 355.866232][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 355.874192][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 355.910218][T16851] device veth0_vlan left promiscuous mode [ 355.941995][T16851] device veth0_vlan entered promiscuous mode [ 355.965469][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 355.973645][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 355.981905][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 355.990043][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 355.997681][ T4985] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 356.045410][T16872] device sit0 entered promiscuous mode [ 356.172539][T16874] device syzkaller0 entered promiscuous mode [ 356.349476][T16885] device pim6reg1 entered promiscuous mode [ 356.525416][T16887] syz.4.4516[16887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.525465][T16887] syz.4.4516[16887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.422379][T16926] device syzkaller0 entered promiscuous mode [ 357.660286][T16939] device pim6reg1 entered promiscuous mode [ 358.333063][T16965] device sit0 left promiscuous mode [ 358.389598][T16965] device sit0 entered promiscuous mode [ 358.844433][T16963] device syzkaller0 entered promiscuous mode [ 359.716741][T17113] device pim6reg1 entered promiscuous mode [ 360.108768][T17177] syz.3.4594[17177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.108819][T17177] syz.3.4594[17177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.179401][T17235] syz.4.4610[17235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 361.296529][T17235] syz.4.4610[17235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.429108][T17263] device sit0 left promiscuous mode [ 362.453515][T17274] device sit0 entered promiscuous mode [ 365.704939][T17455] device sit0 left promiscuous mode [ 365.756123][T17455] device sit0 entered promiscuous mode [ 366.431892][T17501] device syzkaller0 entered promiscuous mode [ 366.509750][T17510] device sit0 entered promiscuous mode [ 366.727001][T17530] device syzkaller0 entered promiscuous mode [ 366.996098][T17573] device syzkaller0 entered promiscuous mode [ 367.157614][T17598] device syzkaller0 entered promiscuous mode [ 367.674420][T17638] device wg2 entered promiscuous mode [ 369.188682][T17734] lo: mtu less than device minimum [ 369.379863][T17743] rose0: tun_chr_ioctl cmd 35139 [ 369.608591][T17750] device sit0 left promiscuous mode [ 370.458817][T17751] device sit0 entered promiscuous mode [ 372.672255][T17804] device sit0 left promiscuous mode [ 374.175475][T17873] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.182515][T17873] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.190144][T17873] device bridge_slave_0 entered promiscuous mode [ 374.197524][T17873] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.204353][T17873] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.211948][T17873] device bridge_slave_1 entered promiscuous mode [ 374.260690][T17873] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.267562][T17873] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.274634][T17873] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.281438][T17873] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.307067][T17559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 374.314834][T17559] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.325143][T17559] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.356932][T17559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 374.364950][T17559] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.371796][T17559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 374.379931][T17559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 374.389064][T17559] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.395915][T17559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 374.403301][T17559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 374.415672][T17559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 374.430465][T17873] device veth0_vlan entered promiscuous mode [ 374.441362][T17563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.458531][T17563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.467779][T17563] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.476401][T17563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 374.492123][T17873] device veth1_macvtap entered promiscuous mode [ 374.527432][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 374.587383][T11608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 374.670684][T11608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.933965][T17901] bridge0: port 3(veth0_to_batadv) entered blocking state [ 374.943531][T17901] bridge0: port 3(veth0_to_batadv) entered disabled state [ 375.037904][T17901] device veth0_to_batadv entered promiscuous mode [ 375.160698][T17901] bridge0: port 3(veth0_to_batadv) entered blocking state [ 375.168949][T17901] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 375.227633][T17898] device veth0_to_batadv left promiscuous mode [ 375.243633][T17898] bridge0: port 3(veth0_to_batadv) entered disabled state [ 375.356268][T17902] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.363186][T17902] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.370643][T17902] device bridge_slave_0 entered promiscuous mode [ 375.379035][T17902] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.386066][T17902] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.398472][T17902] device bridge_slave_1 entered promiscuous mode [ 375.499219][T17902] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.506091][T17902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.513170][T17902] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.519996][T17902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.543210][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 375.551117][T17560] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.570723][T17560] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.618044][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 375.636518][ T2199] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.643361][ T2199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.654791][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 375.662806][ T2199] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.669652][ T2199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.676820][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 375.822274][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 375.886954][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 375.951091][T11606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 376.036111][T11606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 376.043947][T17902] device veth0_vlan entered promiscuous mode [ 376.122511][T17902] device veth1_macvtap entered promiscuous mode [ 376.204106][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 376.218350][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 376.233302][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 376.245318][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 376.300056][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 376.358544][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 376.375170][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 376.383613][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 376.395196][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 376.831208][T17959] device pim6reg1 entered promiscuous mode [ 379.998462][T18110] bridge0: port 3(veth0_to_batadv) entered blocking state [ 380.015069][T18110] bridge0: port 3(veth0_to_batadv) entered disabled state [ 380.032095][T18110] device veth0_to_batadv entered promiscuous mode [ 380.038833][T18110] bridge0: port 3(veth0_to_batadv) entered blocking state [ 380.045784][T18110] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 380.124422][T18107] device veth0_to_batadv left promiscuous mode [ 380.168057][T18107] bridge0: port 3(veth0_to_batadv) entered disabled state [ 380.473041][T18124] device macsec0 entered promiscuous mode [ 380.671316][T18154] device pim6reg1 entered promiscuous mode [ 381.006603][T18168] bridge0: port 3(veth0_to_batadv) entered blocking state [ 381.045893][T18168] bridge0: port 3(veth0_to_batadv) entered disabled state [ 381.053241][T18168] device veth0_to_batadv entered promiscuous mode [ 381.232192][T18168] bridge0: port 3(veth0_to_batadv) entered blocking state [ 381.239145][T18168] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 381.723141][T18203] device syzkaller0 entered promiscuous mode [ 382.134548][T18253] syzkaller0: tun_chr_ioctl cmd 2148553947 [ 382.548880][T18301] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.555900][T18301] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.650695][T18309] device bridge_slave_1 left promiscuous mode [ 382.685174][T18309] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.806970][T18309] device bridge_slave_0 left promiscuous mode [ 382.876961][T18309] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.513701][T18327] device syzkaller0 entered promiscuous mode [ 384.471053][T18381] device veth0_vlan left promiscuous mode [ 384.618801][T18381] device veth0_vlan entered promiscuous mode [ 384.814037][T18383] device veth1_macvtap entered promiscuous mode [ 384.820244][T18383] device macsec0 entered promiscuous mode [ 384.830545][T11608] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 384.889987][ T24] audit: type=1400 audit(1722953528.260:171): avc: denied { create } for pid=18399 comm="syz.1.4920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 384.910406][T18416] device sit0 left promiscuous mode [ 384.957265][T18416] device sit0 entered promiscuous mode [ 385.083495][T18433] bridge0: port 3(veth0_to_batadv) entered blocking state [ 385.097231][T18433] bridge0: port 3(veth0_to_batadv) entered disabled state [ 385.105002][T18433] device veth0_to_batadv entered promiscuous mode [ 385.462973][T18458] device syzkaller0 entered promiscuous mode [ 386.769114][T18511] device veth1_macvtap left promiscuous mode [ 386.794790][T18511] syz.2.4954[18511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.799135][T18511] syz.2.4954[18511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.815489][T18511] device pim6reg1 entered promiscuous mode [ 387.555018][T18549] device syzkaller0 entered promiscuous mode [ 387.873589][T18580] syz.4.4972[18580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.873644][T18580] syz.4.4972[18580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.027009][T18602] syz.4.4977[18602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.039881][T18602] syz.4.4977[18602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.848813][T18656] device syzkaller0 entered promiscuous mode [ 389.369553][T18683] device syzkaller0 entered promiscuous mode [ 389.908853][T18733] device pim6reg1 entered promiscuous mode [ 391.085895][T18766] device syzkaller0 entered promiscuous mode [ 391.166517][T18768] device syzkaller0 entered promiscuous mode [ 392.479833][T18827] device sit0 left promiscuous mode [ 393.363572][T18864] bridge0: port 3(veth0_to_batadv) entered blocking state [ 393.370622][T18864] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 393.377807][T18864] bridge0: port 2(bridge_slave_1) entered blocking state [ 393.384570][T18864] bridge0: port 2(bridge_slave_1) entered forwarding state [ 393.391678][T18864] bridge0: port 1(bridge_slave_0) entered blocking state [ 393.398482][T18864] bridge0: port 1(bridge_slave_0) entered forwarding state [ 393.406011][T18864] device bridge0 entered promiscuous mode [ 393.794173][T18895] syz.1.5061[18895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.794228][T18895] syz.1.5061[18895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.122723][T18917] device pim6reg1 entered promiscuous mode [ 394.206778][T17563] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 394.250511][T18926] device pim6reg1 entered promiscuous mode [ 394.307928][T18938] device pim6reg1 entered promiscuous mode [ 394.354378][T18951] syz.4.5078[18951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.354429][T18951] syz.4.5078[18951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 394.378376][T18949] device pim6reg1 entered promiscuous mode [ 395.177384][T19006] syz.4.5093[19006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.177438][T19006] syz.4.5093[19006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.491629][T19015] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.515331][T19015] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.522939][T19015] device bridge_slave_0 entered promiscuous mode [ 395.530694][T19015] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.537779][T19015] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.545033][T19015] device bridge_slave_1 entered promiscuous mode [ 395.600561][T19015] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.607443][T19015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.614491][T19015] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.621325][T19015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.644823][T11608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 395.653344][T11608] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.669376][T11608] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.715102][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 395.736053][T11599] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.742896][T11599] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.922263][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 395.986244][T11599] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.993081][T11599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.036434][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 396.044670][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 396.146737][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 396.154009][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 396.161321][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 396.169271][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 396.178301][T19015] device veth0_vlan entered promiscuous mode [ 396.294446][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 396.312747][T19015] device veth1_macvtap entered promiscuous mode [ 396.450147][T17563] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 396.466396][T17563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 396.675549][T17559] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 396.684047][T17559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 397.038371][T19122] device macsec0 entered promiscuous mode [ 397.473701][T19145] device veth1_macvtap left promiscuous mode [ 397.479620][T19145] device macsec0 entered promiscuous mode [ 398.990813][T19221] syz.1.5145[19221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.990865][T19221] syz.1.5145[19221] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.014962][T19226] syz.3.5147[19226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.026677][T19226] syz.3.5147[19226] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.355199][ T24] audit: type=1400 audit(1722953542.720:172): avc: denied { write } for pid=19255 comm="syz.3.5154" name="task" dev="proc" ino=70632 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 399.388087][ T24] audit: type=1400 audit(1722953542.720:173): avc: denied { add_name } for pid=19255 comm="syz.3.5154" name="devices.list" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 399.410115][ T24] audit: type=1400 audit(1722953542.720:174): avc: denied { create } for pid=19255 comm="syz.3.5154" name="devices.list" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 399.431356][ T24] audit: type=1400 audit(1722953542.720:175): avc: denied { associate } for pid=19255 comm="syz.3.5154" name="devices.list" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 399.483169][T19266] device macsec0 left promiscuous mode [ 399.493814][T19266] device veth1_macvtap entered promiscuous mode [ 399.500017][T19266] device macsec0 entered promiscuous mode [ 399.653085][T19283] syz.4.5161[19283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.653130][T19283] syz.4.5161[19283] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.691152][T11599] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 399.777234][T19288] device sit0 left promiscuous mode [ 399.936552][T19299] device sit0 entered promiscuous mode [ 400.147730][T19326] bridge0: port 2(bridge_slave_1) entered disabled state [ 400.154646][T19326] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.166589][T19326] device bridge0 left promiscuous mode [ 400.173163][T19335] syz.4.5173[19335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.173216][T19335] syz.4.5173[19335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.218666][T19353] device pim6reg1 entered promiscuous mode [ 401.361029][T19357] syz.2.5180[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.361079][T19357] syz.2.5180[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.880353][T19365] device syzkaller0 entered promiscuous mode [ 402.702729][T19380] device syzkaller0 entered promiscuous mode [ 403.109801][T19422] device pim6reg1 entered promiscuous mode [ 403.892962][T19472] device sit0 entered promiscuous mode [ 405.192230][T19507] bridge0: port 3(veth0_to_batadv) entered disabled state [ 405.199339][T19507] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.206166][T19507] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.268544][T19507] device bridge0 left promiscuous mode [ 405.364392][T19528] device pim6reg1 entered promiscuous mode [ 406.343741][T19601] device syzkaller0 entered promiscuous mode [ 406.475234][T19619] device pim6reg1 entered promiscuous mode [ 407.047880][T19654] bpf_get_probe_write_proto: 2 callbacks suppressed [ 407.047889][T19654] syz.0.5254[19654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.082109][T19654] syz.0.5254[19654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.478972][T19683] device veth0_vlan left promiscuous mode [ 407.567439][T19683] device veth0_vlan entered promiscuous mode [ 407.594871][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 407.609392][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 407.628450][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 408.026057][T19732] device syzkaller0 entered promiscuous mode [ 408.041065][T19726] device veth1_macvtap left promiscuous mode [ 408.076184][T19726] device macsec0 left promiscuous mode [ 408.122995][T19741] device veth1_macvtap entered promiscuous mode [ 408.129400][T19741] device macsec0 entered promiscuous mode [ 408.313949][T19749] device syzkaller0 entered promiscuous mode [ 410.908196][T19824] device pim6reg1 entered promiscuous mode [ 411.148239][T19821] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.167134][T19821] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.174359][T19821] device bridge_slave_0 entered promiscuous mode [ 411.366043][T19821] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.374405][T19821] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.412260][T19821] device bridge_slave_1 entered promiscuous mode [ 411.598248][T19848] device syzkaller0 entered promiscuous mode [ 411.836688][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 411.844093][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 411.871314][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 411.881089][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 411.889460][T10136] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.896317][T10136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 411.979086][T19865] device veth0_vlan left promiscuous mode [ 412.141432][T19865] device veth0_vlan entered promiscuous mode [ 412.231230][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 412.241144][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 412.259698][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 412.275027][ T4976] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.281903][ T4976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.290342][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 412.307588][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 412.315744][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.324757][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.332365][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.368327][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 412.456228][T19821] device veth0_vlan entered promiscuous mode [ 412.538872][T10142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 412.603166][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 412.669002][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 412.791326][T19821] device veth1_macvtap entered promiscuous mode [ 412.807340][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 412.815341][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 412.932078][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 413.082500][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 413.106057][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 413.114190][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 413.128168][ T2199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.503340][T19937] device syzkaller0 entered promiscuous mode [ 414.964966][T19956] device sit0 left promiscuous mode [ 415.001941][T19956] device sit0 entered promiscuous mode [ 415.033007][T19961] device pim6reg1 entered promiscuous mode [ 415.059912][T19956] device veth1_macvtap left promiscuous mode [ 415.217021][ T216] device veth1_macvtap left promiscuous mode [ 416.200856][T20002] device syzkaller0 entered promiscuous mode [ 416.432411][T20011] device sit0 left promiscuous mode [ 416.532455][T20011] device sit0 entered promiscuous mode [ 416.818889][T20044] device syzkaller0 entered promiscuous mode [ 417.817764][T20072] device syzkaller0 entered promiscuous mode [ 418.199656][T20097] syz.1.5377[20097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.199706][T20097] syz.1.5377[20097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 420.014700][T20155] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.032862][T20155] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.043829][T20155] device bridge_slave_1 left promiscuous mode [ 420.241425][T20155] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.250241][T20155] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.309706][T20156] device sit0 left promiscuous mode [ 420.403217][T20172] device pim6reg1 entered promiscuous mode [ 420.761682][T20176] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.768667][T20176] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.775993][T20176] device bridge_slave_0 entered promiscuous mode [ 420.782824][T20176] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.789985][T20176] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.797391][T20176] device bridge_slave_1 entered promiscuous mode [ 421.009044][T20176] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.015919][T20176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.022988][T20176] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.029815][T20176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.404951][T11603] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.437108][T11603] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.444717][T11603] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.527640][T11603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.617137][T11603] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.623989][T11603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.786928][T11603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.808218][T20222] syz.0.5408[20222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.808271][T20222] syz.0.5408[20222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.809764][T11603] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.837509][T11603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.870516][T20222] syz.0.5408[20222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.870570][T20222] syz.0.5408[20222] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.888048][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 421.912545][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.928385][ T5000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 421.939777][ T5000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.971961][T20176] device veth0_vlan entered promiscuous mode [ 421.989927][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 421.998481][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 422.006943][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 422.014687][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 422.045382][T20176] device veth1_macvtap entered promiscuous mode [ 422.075330][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 422.082874][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 422.090647][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 422.108761][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 422.127433][T17560] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 422.145929][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 422.153965][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 422.174051][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 422.190347][T17557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 422.243330][T20253] device syzkaller0 entered promiscuous mode [ 422.319151][T20261] device sit0 entered promiscuous mode [ 422.789211][ T630] device bridge_slave_1 left promiscuous mode [ 422.795283][ T630] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.802689][ T630] device bridge_slave_0 left promiscuous mode [ 422.808843][ T630] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.099249][T20285] device syzkaller0 entered promiscuous mode [ 423.258310][T20310] device sit0 left promiscuous mode [ 423.648149][T20348] device syzkaller0 entered promiscuous mode [ 424.643834][T20374] tap0: tun_chr_ioctl cmd 1074025677 [ 424.650637][T20374] tap0: linktype set to 821 [ 424.707782][T20385] device lo entered promiscuous mode [ 425.524879][T20424] device wg2 entered promiscuous mode [ 425.695607][T20450] device pim6reg1 entered promiscuous mode [ 426.598715][T20465] device veth1_macvtap left promiscuous mode [ 426.604589][T20465] device macsec0 left promiscuous mode [ 428.542410][T20545] syz.3.5507[20545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.542462][T20545] syz.3.5507[20545] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.441909][T20568] device syzkaller0 entered promiscuous mode [ 429.909752][T20587] device veth0_vlan left promiscuous mode [ 429.920006][T20587] device veth0_vlan entered promiscuous mode [ 430.543719][T20604] syz.1.5525[20604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.544014][T20604] syz.1.5525[20604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.917819][T20623] device pim6reg1 entered promiscuous mode [ 431.396426][T20643] bridge0: port 3(veth0_to_batadv) entered blocking state [ 431.456119][T20643] bridge0: port 3(veth0_to_batadv) entered disabled state [ 431.575031][T20643] device veth0_to_batadv entered promiscuous mode [ 431.598688][T20643] bridge0: port 3(veth0_to_batadv) entered blocking state [ 431.605790][T20643] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 431.918867][T20647] device veth0_to_batadv left promiscuous mode [ 431.929347][T20647] bridge0: port 3(veth0_to_batadv) entered disabled state [ 433.638817][T20695] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.658057][T20695] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.665371][T20695] device bridge_slave_0 entered promiscuous mode [ 433.687962][T20695] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.694820][T20695] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.706410][T20695] device bridge_slave_1 entered promiscuous mode [ 433.754271][T20695] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.761132][T20695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.768241][T20695] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.775005][T20695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.803518][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 433.833244][ T7952] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.844631][ T7952] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.866886][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 433.874825][ T7952] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.881668][ T7952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.895576][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 433.904301][ T7952] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.911149][ T7952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.919264][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 433.934105][ T7952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 433.955326][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 434.064477][T20695] device veth0_vlan entered promiscuous mode [ 434.101114][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.126899][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 434.208299][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 434.255091][T20695] device veth1_macvtap entered promiscuous mode [ 434.296173][T17555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 434.362294][T17551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 434.379500][T17555] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 435.098063][T20750] syz.3.5563[20750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.098277][T20750] syz.3.5563[20750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.122439][T20743] device syzkaller0 entered promiscuous mode [ 435.900090][T20764] device sit0 entered promiscuous mode [ 436.701197][T20782] device veth1_macvtap left promiscuous mode [ 436.724763][T20803] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.731734][T20803] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.764240][T20801] device syzkaller0 entered promiscuous mode [ 436.785850][T20803] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.792737][T20803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.799853][T20803] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.806632][T20803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.824174][T20803] device bridge0 entered promiscuous mode [ 436.831965][T20809] bridge0: port 3(veth0_to_batadv) entered disabled state [ 436.838977][T20809] bridge0: port 2(bridge_slave_1) entered disabled state [ 436.845879][T20809] bridge0: port 1(bridge_slave_0) entered disabled state [ 436.861734][T20812] bridge0: port 3(veth0_to_batadv) entered blocking state [ 436.869072][T20812] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 436.881213][T20812] bridge0: port 2(bridge_slave_1) entered blocking state [ 436.889424][T20812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 436.901933][T20812] bridge0: port 1(bridge_slave_0) entered blocking state [ 436.910302][T20812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 436.919243][T20812] device bridge0 entered promiscuous mode [ 438.442731][T20951] device syzkaller0 entered promiscuous mode [ 438.452206][T20955] device pim6reg1 entered promiscuous mode [ 439.479994][T21020] syz.4.5640[21020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 439.480044][T21020] syz.4.5640[21020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.032176][T21061] device syzkaller0 entered promiscuous mode [ 440.513173][ T321] device veth0_to_batadv left promiscuous mode [ 440.535946][ T321] bridge0: port 3(veth0_to_batadv) entered disabled state [ 440.566460][ T321] device bridge_slave_1 left promiscuous mode [ 440.592916][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 440.636173][ T321] device bridge_slave_0 left promiscuous mode [ 440.642112][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 440.675600][ T321] device veth1_macvtap left promiscuous mode [ 441.003709][T21154] bridge0: port 3(veth0_to_batadv) entered disabled state [ 441.010729][T21154] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.017551][T21154] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.027930][T21154] device bridge0 left promiscuous mode [ 441.035189][T21154] device veth0_to_batadv left promiscuous mode [ 441.042120][T21154] bridge0: port 3(veth0_to_batadv) entered disabled state [ 441.051350][T21154] device bridge_slave_1 left promiscuous mode [ 441.057328][T21154] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.066390][T21154] device bridge_slave_0 left promiscuous mode [ 441.072329][T21154] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.257217][T21190] device pim6reg1 entered promiscuous mode [ 441.375998][T21220] device pim6reg1 entered promiscuous mode [ 442.033212][T21244] : renamed from pim6reg1 [ 442.340321][T21275] bond_slave_1: mtu less than device minimum [ 442.889441][ T321] device bridge_slave_1 left promiscuous mode [ 442.911399][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.018457][ T321] device bridge_slave_0 left promiscuous mode [ 443.084390][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.180394][ T321] device veth1_macvtap left promiscuous mode [ 443.217042][ T321] device veth1_macvtap left promiscuous mode [ 443.260095][ T321] device veth0_vlan left promiscuous mode [ 443.850758][T21339] device veth0_vlan left promiscuous mode [ 443.856795][T21339] device veth0_vlan entered promiscuous mode [ 444.629184][T21385] device wg2 entered promiscuous mode [ 444.635337][T21389] geneve1: tun_chr_ioctl cmd 1074025681 [ 444.658166][T21390] device veth0_vlan left promiscuous mode [ 444.726548][T21390] device veth0_vlan entered promiscuous mode [ 444.918280][T21409] device macsec0 entered promiscuous mode [ 444.950894][T21409] device veth1_macvtap entered promiscuous mode [ 444.963523][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 445.413280][T21436] device wg2 left promiscuous mode [ 445.509420][T21436] device wg2 entered promiscuous mode [ 445.703715][T21450] syz.0.5773[21450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.703767][T21450] syz.0.5773[21450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 447.380702][T21526] device pim6reg1 entered promiscuous mode [ 448.417650][T21568] device veth1_macvtap left promiscuous mode [ 448.433742][T21583] device veth1_macvtap entered promiscuous mode [ 448.439844][T21583] device macsec0 entered promiscuous mode [ 448.452582][T21582] device sit0 entered promiscuous mode [ 448.942955][T21601] bridge0: port 3(veth0_to_batadv) entered blocking state [ 448.949983][T21601] bridge0: port 3(veth0_to_batadv) entered disabled state [ 448.957590][T21601] device veth0_to_batadv entered promiscuous mode [ 448.964061][T21601] bridge0: port 3(veth0_to_batadv) entered blocking state [ 448.971002][T21601] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 449.166136][T21607] device pim6reg1 entered promiscuous mode [ 450.121092][T21629] device syzkaller0 entered promiscuous mode [ 450.861122][T21669] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 450.897311][T21669] device syzkaller0 entered promiscuous mode [ 450.904942][T21676] device sit0 left promiscuous mode [ 450.952305][T21677] device sit0 entered promiscuous mode [ 450.995994][T21679] device pim6reg1 entered promiscuous mode [ 451.386470][T21698] : renamed from macsec0 [ 451.454993][T21702] device syzkaller0 entered promiscuous mode [ 452.048566][ T321] device veth0_vlan left promiscuous mode [ 452.379322][T21775] device veth0_vlan left promiscuous mode [ 452.385317][T21775] device veth0_vlan entered promiscuous mode [ 452.440678][T21784] device sit0 entered promiscuous mode [ 452.685965][T21818] rose0: tun_chr_ioctl cmd 1074025673 [ 452.691278][T21816] rose0: tun_chr_ioctl cmd 35139 [ 453.213276][T21854] device syzkaller0 entered promiscuous mode [ 453.423613][ T321] device bridge_slave_1 left promiscuous mode [ 453.432389][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.441309][ T321] device bridge_slave_0 left promiscuous mode [ 453.447320][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.455079][ T321] device bridge_slave_1 left promiscuous mode [ 453.461396][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.469103][ T321] device bridge_slave_0 left promiscuous mode [ 453.475073][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.483778][ T321] device bridge_slave_1 left promiscuous mode [ 453.490064][ T321] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.497580][ T321] device bridge_slave_0 left promiscuous mode [ 453.503552][ T321] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.511372][ T321] device veth0_vlan left promiscuous mode [ 453.517101][ T321] device veth1_macvtap left promiscuous mode [ 453.523028][ T321] device veth1_macvtap left promiscuous mode [ 453.528848][ T321] device veth0_vlan left promiscuous mode [ 453.876473][T21884] device syzkaller0 entered promiscuous mode [ 454.691523][T21999] device syzkaller0 entered promiscuous mode [ 454.958949][T22031] syz.1.5936[22031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.959001][T22031] syz.1.5936[22031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.509359][T22059] device sit0 left promiscuous mode [ 455.951738][T22088] device syzkaller0 entered promiscuous mode [ 456.019688][T22092] device syzkaller0 entered promiscuous mode [ 457.547201][T22187] device sit0 left promiscuous mode [ 457.580412][T22191] device sit0 entered promiscuous mode [ 458.825337][T22265] device pim6reg1 entered promiscuous mode [ 458.928108][T22277] device syzkaller0 entered promiscuous mode [ 459.426462][T22321] device sit0 left promiscuous mode [ 459.439488][T22323] device sit0 entered promiscuous mode [ 459.458589][T22324] tap0: tun_chr_ioctl cmd 1074025675 [ 459.463748][T22324] tap0: persist enabled [ 459.479854][T22327] device syzkaller0 entered promiscuous mode [ 459.531468][T22331] device sit0 left promiscuous mode [ 459.603347][T22331] device sit0 entered promiscuous mode [ 459.794562][T22345] syz.0.6022[22345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.794615][T22345] syz.0.6022[22345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.856357][T22347] device syzkaller0 entered promiscuous mode [ 460.298039][T22386] syz.0.6036[22386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.298090][T22386] syz.0.6036[22386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.764478][T22390] device syzkaller0 entered promiscuous mode [ 461.921619][T22464] syz.0.6054[22464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.921671][T22464] syz.0.6054[22464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 461.996355][T22465] syz.2.6053[22465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.153658][T22507] syz.1.6068[22507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 463.165128][T22507] syz.1.6068[22507] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 464.397845][ T24] audit: type=1400 audit(1722953607.760:176): avc: denied { create } for pid=22540 comm="syz.2.6077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 465.228870][T22568] syz.4.6082[22568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 465.228922][T22568] syz.4.6082[22568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.099197][T22636] syz.0.6100[22636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.114323][T22636] syz.0.6100[22636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.608755][T22682] syz.0.6113[22682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.620386][T22682] syz.0.6113[22682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.632326][T22682] syz.0.6113[22682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.649371][T22682] syz.0.6113[22682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.669384][T22684] syz.4.6114[22684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.682185][T22684] syz.4.6114[22684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.512429][T22743] syz.2.6131[22743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.548630][T22743] syz.2.6131[22743] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.089452][T22776] tun0: tun_chr_ioctl cmd 2147767507 [ 469.122058][T22817] device pim6reg1 entered promiscuous mode [ 470.678325][T22915] device veth0_vlan left promiscuous mode [ 470.831958][T22915] device veth0_vlan entered promiscuous mode [ 470.895457][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 470.905549][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 470.913091][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 471.273320][T22989] bpf_get_probe_write_proto: 8 callbacks suppressed [ 471.273329][T22989] syz.4.6198[22989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.285868][T22989] syz.4.6198[22989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.363862][T23007] tun0: tun_chr_ioctl cmd 2147767507 [ 471.528847][T23014] device veth0_vlan left promiscuous mode [ 471.593838][T23014] device veth0_vlan entered promiscuous mode [ 471.754651][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 471.772550][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 471.804604][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 471.853696][T23031] device pim6reg1 entered promiscuous mode [ 471.970936][T23046] syz.0.6211[23046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.970988][T23046] syz.0.6211[23046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.936941][T23075] device veth0_vlan left promiscuous mode [ 472.976516][T23086] syz.1.6222[23086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.976567][T23086] syz.1.6222[23086] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 473.069930][T23075] device veth0_vlan entered promiscuous mode [ 473.572725][T23104] device veth1_to_hsr entered promiscuous mode [ 473.638990][T23112] bridge0: port 3(veth0_to_batadv) entered disabled state [ 473.646005][T23112] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.652840][T23112] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.660449][T23112] device bridge0 left promiscuous mode [ 473.674211][T23110] device pim6reg1 entered promiscuous mode [ 473.801156][T23114] device vxcan1 entered promiscuous mode [ 474.275061][T23136] syz.0.6238[23136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.275115][T23136] syz.0.6238[23136] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.419517][T23175] syz.1.6250[23175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.433717][T23175] syz.1.6250[23175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 474.502870][T23182] device syzkaller0 entered promiscuous mode [ 474.551720][T23194] device veth0_vlan left promiscuous mode [ 474.640116][T23194] device veth0_vlan entered promiscuous mode [ 474.853793][T23204] device bridge0 entered promiscuous mode [ 477.335873][T23319] device veth0_to_batadv left promiscuous mode [ 477.351362][T23319] bridge0: port 3(veth0_to_batadv) entered disabled state [ 478.824289][T23380] device veth0_vlan left promiscuous mode [ 478.939240][T23380] device veth0_vlan entered promiscuous mode [ 480.923457][T23423] device pim6reg1 entered promiscuous mode [ 480.968411][T23426] device syzkaller0 entered promiscuous mode [ 480.974586][T23435] bridge_slave_0: mtu less than device minimum [ 481.481927][T23471] device sit0 left promiscuous mode [ 481.667875][T23471] device sit0 entered promiscuous mode [ 482.687732][T23508] device sit0 entered promiscuous mode [ 482.820231][T23521] device pim6reg1 entered promiscuous mode [ 482.851655][T23523] bpf_get_probe_write_proto: 4 callbacks suppressed [ 482.851661][T23523] syz.3.6346[23523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.858384][T23523] syz.3.6346[23523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.927831][T23532] device wg2 left promiscuous mode [ 482.994696][T23536] device syzkaller0 entered promiscuous mode [ 483.164722][T23567] syz.3.6358[23567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.164774][T23567] syz.3.6358[23567] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.262169][T23572] device syzkaller0 entered promiscuous mode [ 484.088069][T23604] device pim6reg1 entered promiscuous mode [ 484.229188][T23606] device macsec0 entered promiscuous mode [ 484.382449][T23636] device syzkaller0 entered promiscuous mode [ 486.123029][T23760] device syzkaller0 entered promiscuous mode [ 486.385920][T23776] device pim6reg1 entered promiscuous mode [ 486.470012][T23786] device vxcan1 entered promiscuous mode [ 486.522576][T23794] device pim6reg1 entered promiscuous mode [ 488.332283][T23847] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.408047][T23847] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.415258][T23847] device bridge_slave_0 entered promiscuous mode [ 488.429030][T23847] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.436920][T23847] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.444116][T23847] device bridge_slave_1 entered promiscuous mode [ 488.462117][T23865] syz.1.6438[23865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.462170][T23865] syz.1.6438[23865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.557101][T23847] bridge0: port 2(bridge_slave_1) entered blocking state [ 488.575145][T23847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 488.582276][T23847] bridge0: port 1(bridge_slave_0) entered blocking state [ 488.589134][T23847] bridge0: port 1(bridge_slave_0) entered forwarding state [ 488.669565][ T7963] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.758817][ T7963] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.946575][T23884] device syzkaller0 entered promiscuous mode [ 489.036752][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 489.057465][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 489.065112][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 489.168257][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 489.256023][ T322] bridge0: port 1(bridge_slave_0) entered blocking state [ 489.262872][ T322] bridge0: port 1(bridge_slave_0) entered forwarding state [ 489.270113][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 489.289301][ T322] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 489.297311][ T322] bridge0: port 2(bridge_slave_1) entered blocking state [ 489.304150][ T322] bridge0: port 2(bridge_slave_1) entered forwarding state [ 489.322942][T23889] device sit0 left promiscuous mode [ 489.352285][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 489.360905][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 489.372939][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 489.386586][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 489.415489][T23847] device veth0_vlan entered promiscuous mode [ 489.432612][ T7963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 489.451006][ T7963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 489.470326][ T7963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 489.556227][ T7963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 489.573643][T23847] device veth1_macvtap entered promiscuous mode [ 489.712440][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 489.724438][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 489.735582][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 489.779170][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 489.839452][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 489.847195][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 489.855306][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 489.863662][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 489.871930][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 491.162671][T23943] device pim6reg1 entered promiscuous mode [ 493.269878][T24033] device pim6reg1 entered promiscuous mode [ 493.942718][T24107] device veth0_vlan left promiscuous mode [ 493.996624][T24107] device veth0_vlan entered promiscuous mode [ 494.044239][T24107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 494.100545][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 494.117739][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 494.126093][ T4976] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 495.632956][T24155] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.784006][T24155] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.819332][T24155] device bridge_slave_0 entered promiscuous mode [ 495.916161][T24155] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.024699][T24155] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.116788][T24155] device bridge_slave_1 entered promiscuous mode [ 496.953603][T24194] ʮ}p: renamed from pim6reg1 [ 497.013865][ T4981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 497.026588][ T4981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 497.077593][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 497.085733][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 497.093997][T10136] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.100854][T10136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 497.119956][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 497.128371][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 497.136622][T10136] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.143443][T10136] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.150645][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 497.158784][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 497.166573][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 497.175916][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 497.183741][T10136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 497.198266][T24235] device pim6reg1 entered promiscuous mode [ 497.223070][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 497.232242][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 497.269223][T24155] device veth0_vlan entered promiscuous mode [ 497.292019][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 497.323522][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 497.389282][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 497.428148][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.465613][T24155] device veth1_macvtap entered promiscuous mode [ 497.497536][ T2196] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 497.506438][ T2196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 497.539915][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 497.562165][ T4580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 504.528270][T24412] syz.0.6577[24412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.528333][T24412] syz.0.6577[24412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.811489][T24474] tap0: tun_chr_ioctl cmd 1074025675 [ 504.906473][T24474] tap0: persist enabled [ 505.087053][T24486] device syzkaller0 entered promiscuous mode [ 505.127148][T24474] tap0: tun_chr_ioctl cmd 1074025675 [ 505.132251][T24474] tap0: persist enabled [ 506.397028][T24555] device sit0 left promiscuous mode [ 506.759031][T24586] device pim6reg1 entered promiscuous mode [ 506.863019][T24584] device pim6reg1 entered promiscuous mode [ 508.335929][T24631] device wg2 entered promiscuous mode [ 508.523436][T24651] device pim6reg1 entered promiscuous mode [ 509.252562][T24700] device gre0 entered promiscuous mode [ 510.331502][T24738] device sit0 left promiscuous mode [ 511.485188][T24822] device syzkaller0 entered promiscuous mode [ 512.096957][T24849] device veth0_to_team entered promiscuous mode [ 514.728581][T24979] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.735632][T24979] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.747149][T24979] device bridge0 left promiscuous mode [ 514.778774][T24982] device bridge_slave_1 left promiscuous mode [ 514.796278][T24982] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.804057][T24982] device bridge_slave_0 left promiscuous mode [ 514.810369][T24982] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.008791][T24997] syz.3.6730[24997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.008842][T24997] syz.3.6730[24997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.034141][T24997] device pim6reg1 entered promiscuous mode [ 515.498400][T25048] device syzkaller0 entered promiscuous mode [ 517.041279][T25108] bridge0: port 3(veth0_to_batadv) entered blocking state [ 517.048454][T25108] bridge0: port 3(veth0_to_batadv) entered disabled state [ 517.056801][T25108] device veth0_to_batadv entered promiscuous mode [ 517.063252][T25108] bridge0: port 3(veth0_to_batadv) entered blocking state [ 517.070256][T25108] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 517.095494][T25113] device veth0_to_batadv left promiscuous mode [ 517.101569][T25113] bridge0: port 3(veth0_to_batadv) entered disabled state [ 517.611021][T25125] syz.4.6769[25125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.632703][T25125] syz.4.6769[25125] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.292082][T25136] device team_slave_1 entered promiscuous mode [ 518.396292][ T2197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 518.404207][ T2197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 518.414991][T25138] device veth0_vlan left promiscuous mode [ 518.425248][T25138] device veth0_vlan entered promiscuous mode [ 518.854528][T25145] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.862641][T25145] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.962791][T25161] device veth0_vlan left promiscuous mode [ 518.970905][T25161] device veth0_vlan entered promiscuous mode [ 520.831049][T25216] device syzkaller0 entered promiscuous mode [ 522.814532][T25258] device team_slave_1 entered promiscuous mode [ 522.916459][ T2201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 522.924400][ T2201] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 523.682213][T25345] syz.2.6822[25345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.682269][T25345] syz.2.6822[25345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.803398][T25342] syz.0.6826[25342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.826511][T25342] syz.0.6826[25342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 523.841341][T25347] device syzkaller0 entered promiscuous mode [ 523.920816][T25347] device pim6reg1 entered promiscuous mode [ 525.345397][T25418] : renamed from ipvlan1 [ 525.354507][T25425] device pim6reg1 entered promiscuous mode [ 527.096972][T25492] device veth1_macvtap left promiscuous mode [ 530.942340][T25642] : renamed from vlan0 [ 532.208983][T25758] syz.4.6939[25758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.209027][T25758] syz.4.6939[25758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.266032][T25759] syz.4.6939[25759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.356068][T25759] syz.4.6939[25759] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.508810][T25758] syz.4.6939[25758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.586524][T25758] syz.4.6939[25758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.996889][T25908] device sit0 entered promiscuous mode [ 535.907645][T25937] Q6\bY4: renamed from lo [ 536.489856][T25982] device sit0 entered promiscuous mode [ 537.216426][T26031] device sit0 left promiscuous mode [ 537.722976][T26070] device veth0_vlan left promiscuous mode [ 537.860987][T26070] device veth0_vlan entered promiscuous mode [ 538.123693][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 538.132411][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 538.140868][ T2703] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 541.402519][T26187] device sit0 left promiscuous mode [ 541.578883][T26193] device sit0 entered promiscuous mode [ 542.909103][T26252] device veth1_macvtap left promiscuous mode [ 543.209589][T26289] syz.0.7094[26289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.209632][T26289] syz.0.7094[26289] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.280742][T26290] syz.0.7094[26290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.292657][T26290] syz.0.7094[26290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 543.492008][T26330] : renamed from vlan1 [ 543.597979][T26331] device veth1_macvtap left promiscuous mode [ 543.620295][T26331] device macsec0 left promiscuous mode [ 544.024990][T26371] syz.3.7110[26371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.025035][T26371] syz.3.7110[26371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 544.722362][T26413] device veth1_macvtap entered promiscuous mode [ 544.740274][T26413] device macsec0 entered promiscuous mode [ 544.746867][ T4982] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 544.867544][T26428] device sit0 left promiscuous mode [ 544.918592][T26428] device sit0 entered promiscuous mode [ 545.089885][T26434] device sit0 entered promiscuous mode [ 545.604683][T26494] device veth0_vlan left promiscuous mode [ 545.611326][T26494] device veth0_vlan entered promiscuous mode [ 545.618792][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.631298][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.643818][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 546.512340][T26533] device sit0 entered promiscuous mode [ 548.575885][T26709] device team_slave_1 entered promiscuous mode [ 548.582874][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 548.605846][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 548.908993][T26726] device sit0 left promiscuous mode [ 549.481021][T26727] device sit0 entered promiscuous mode [ 549.645703][T26747] device sit0 entered promiscuous mode [ 549.997379][T26782] device bridge_slave_1 left promiscuous mode [ 550.003621][T26782] bridge0: port 2(bridge_slave_1) entered disabled state [ 550.011146][T26782] device bridge_slave_0 left promiscuous mode [ 550.017451][T26782] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.016661][T26847] device sit0 left promiscuous mode [ 552.053938][T26847] device sit0 entered promiscuous mode [ 554.625965][T26922] device sit0 left promiscuous mode [ 554.654662][T26922] device sit0 entered promiscuous mode [ 556.361280][T26969] device sit0 left promiscuous mode [ 556.436383][T26969] device sit0 entered promiscuous mode [ 557.266403][T26980] device sit0 left promiscuous mode [ 557.297370][T26984] device sit0 entered promiscuous mode [ 557.924223][T27011] device veth0_vlan left promiscuous mode [ 557.950288][T27011] device veth0_vlan entered promiscuous mode [ 558.140001][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 558.147856][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 558.155024][ T4989] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 560.433039][T27095] device sit0 left promiscuous mode [ 560.459374][T27095] device sit0 entered promiscuous mode [ 561.632951][T27144] device sit0 left promiscuous mode [ 561.668573][T27144] device sit0 entered promiscuous mode SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=7255 state=3 status=67 (errno 32: Broken pipe) [ 563.687705][ T216] device veth1_macvtap left promiscuous mode [ 563.693516][ T216] device veth0_vlan left promiscuous mode [ 563.699309][ T216] device veth1_macvtap left promiscuous mode [ 563.705104][ T216] device veth0_vlan left promiscuous mode