last executing test programs: 1.945723149s ago: executing program 4 (id=7394): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x9b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x16}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0xb, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x0, 0x8}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = getpid() (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (async) r5 = gettid() sendmsg$unix(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000009c0)="ec663189d3348bf13f872a468352b72482b5b2b364a29c6f0f2c4e741bf6457d1418455e157253231681a3889f39b3da6b60dbe404cb9a145d0d49cfd1668a32b96ff302975748993a8a534144d211c681ff3d91ffa436d40b9afe648ec8bde2f7553fb5d3f3b8423873903abd024284bfd01511c149b6101851f7aae4675df76e7d32d7b91659e4adcc14ddfff8a2b49d1393de72b9d970ee7f45a755c1d9f7b4d43e37e17d6eaff5fe352d507eb0424ab937980ae8fae8a9062b651a53b6543733e259ee3083a308a78ac50f0972629b74e6aadefedf2352d024d8f27d4bc8703493b08bbe75e34ee5796d0d275cae3d3c0eba179e145feee0c8acc98af7888a374dbe705e058fc565e40677890a39e6999ae47202a9237803e9eee30f368725ca8571a8f6a8ba396905f4f023a60acb644bab6b0b8964aa514c37f23509c685648d6adb0e230aca690c91e664bc49fa30ae42a2c71abc7517181d4157ef996628b3624f367519970366acca85d399e2c7703930e2abd4bdbac076230ad16368ccb350357d57626ea47a15f0fa16bd5efa8233fa3ea1183da730204a455a673c783c10a26411c5de816699f7af3401b9f38592a4cd9f3f0b7de18cd69f831eee87a3d2edb64ecf517d201f32f86b80fcd3287330f286465260370527e6116df0651001405563622e14af715f6c3dd10e1986e3b95ebf618ff42bdd7a74f0d0cc2cc8dab1048eb5fdbfb72cb16f9e2a196b512720cbfbb4696f291200a153c383cc441091c62649a88ef173a42eced93a374e4f0a078244e56c14b3c4cc9625b3e9e1853839ecb00d6cfc2d2398634935aedd9a545e4b13895a3b8b05c8fca9af2bba82762db85a449f5d9c6ff87b724f19dc1805eca58445e67782a30f03e7b1272685ab8306c255604360b0d6e53cc443b0b81bcf92b470b8734b7b7b2ccf2d51fc1a8b43d8dba290e875f35b0bdb66790a3bb4d8391c5fdde5f461b5922c56f8a858865c0fd8b39cb79e8e182342ef0398641ca3c76620482705878ff0d9fe2eaae18a8ad73313663e36feca9bae81834482bb19c651e273bc04333963f2a64d516761280db45fc4217b5c2ab73a8a04c5d2c2aced37bb2825d17f68c4d65dfcc54057a46f045bf435391b7304ee376977220e71e97919cd67e3f0f0f63e0dcee8d90d80ead12a5eda22db217bd362c1a4f9244c99da91d618c6b71b21ed80826d4df95aee10786e61b3141002e342490f2d842051305d2e8d41aca580a13cd48a850eada7dfee4bda67a5491acf4cfdd3919135e7b113a1973595b99d6ba152ae8cc63fd95c1d7d4a59b038c426ffdb949fe1a6004df2bbae2acce3f5720419dc597229f2d120c689b07a344e75f4c631d83b3130cc927412daa9607c8c0fa254cde27306360a9a5d18ff9d4d4ed38162a5202ba214db4486887b5831d727bd93e6e7cddfa4d3480cb3b4683b1de52bdff534016719324051f81bdf49a5c12dd7b389107b3eb5dc4858caebe8c0a9866ff632deebc16492f95d202ce0f454476ab77871d3188ec83fc74f2ec1055893b2a138cce27ac5553c5496cbf147002a9c55fdb202969a4802ca3556453a58d2aa8e19f40e577fa280625468d385af8659a0f3ab69fabf4fa1326f7a7ebad98a23958c91f28c4b03ff9f343b6ecdb82e820bcb7de6f51d0fcfbbcef902d21a7eed03ea125363b758085022ade27451ba5e0acd9a0044ec50571d234855448be132e14517ae38b798482cc07e1c009c1a4cdd5c42f3862dd6d4c3b18f9c41d0bf5b709d742877ef7ee6d9932c6d7a9fd09bede9f80645a5c4b97ae48734985131f948bf20e93f82b93d6e69479491158d83655244d91bb5e9dfdf103e2238a95a92f35750769b87dce1d0e8bac4e6ee5467f9800a12fe27a2c8f727bbda617899ca26d13ec3b68b4acd7200b3206852aafb13c94681413ee7d0987f4d067b4bc5fc5e01ebe9bdbfc0198232f92da3371d12023388f86a4bb4db9bd559570aef27a96812dd2583c72732922266b98c89c264311577621ceb2625dac0af0fd08f5c27a658645777cb36d687d6f0e6835587cbe65ed922cbd1190b1d60259024be61e7e32b1ecb5e72799103c3a3ea91191667418fedf79d839200ee75da4d68fd6facdd1243f30727c40c6a7c4ffa3d937f4c21b076d146f439d8961258526d56336f7d94e945f90053ef865dd9f939b12d8b6b72b1f20a050b69b8a3b8bc88584766bf9783116c8fc8c4883f8dca31dbfd2775675d868136e5f5e16e3508986750fa8825231fed43ae2b444f5992011f0b80b1f3b0e397ff98fe81da3bd00593329f3014315fb4828fdfec77c8f3c8a92278866f7d299f9a0818e36d1bbad629a61345e01e495dfc4412fcc8b64eac5259de21dae5f5b34c06ee81c0e46b12203b639cfef7f12871287abca6b2f70ffa2cb225585bfbf2c0cd010bdd1b2b3f560016e4db6c30a26e517b608633aa40ab1802da8e94188bad14ab007e415ec41c3dabf4d2817a43a082313529e4a80596807b785af9391117f780db637f2214bb8082373303da889ffd89fa43f4cca427b43e3c17942d314a577112cfb31e841ae40fd18220e9aaa24e382936c0b859a3a425c2018b093e42648b7517dcce9af1366dc5ea8fd575001cbe880ddbb0a768033ee3802c68c4b2fc290fcb84f1e33318543fd2ddf065503c0767c86fcde6931797f275ee4c149d616ff02a9a019c223c16cfd6e618b07c7bd8009d3201a92b91a0944ff21d71ffc53c39b7a318c6451d80b05f9d9c81fd1a78ef35e14cbebc1b4e2de28039301042c0fa09ad2e43d5f78ab4104218bab2da5034050bbf625c6803496dd3d77b574aed51badd3e9967548014b8b318dfb2e0a6ce6637cee786806ec06b359d6569c65df2e538b43862be27d4ddb2710447ed7e56cb4a02779c8767e11056cfaca1ab1aea20d4198a050e98695ae3f2a0aadb5b34b6b945379b81259ebe7abe6d3ca23cae048429b6c850813706f59231034fce07c4111961193d581e3bbbd6c9afd8b3d1e0604807dbd880d2ccc5266818a18287e8c4bda311be83c6f1c5e7f571b9f5ab1f84f8252df9d62f75865adcdd61eaaf7df4cbdd994ab17d2d5d684f95715d4636a6cb69fa2619c6b76ee060202a0a8c934aa537d2c5cf736142349b19fb9b532b05e6dff05c4c635f4134bcc0ef2e38c3fd75d8664d7dfa3139e1b2c2cbbdbe4fc0e2e80870ade368b730d4c06946b608088991f346765afaad6765e5a16267b2d249ee22ea1c6cb85d5d0f8ee48204a5dc48ae6415e3802fd8a431d249f95c72f6895978b36c424e40f83dfe1d0ca01dca14c4a308e926fe726ea0b456dcd976147e61744675f81f38bd5ef06ed76692ac8ac03744c8dc313f06aa28832a3286e626d5e29c748c21164475c739d3f6c6ad046fbb1a149867faf770c089b3513a0649d787208f06e7db6f8a44a9e32c6bd8dd9cca53bcd8ba7ec49d4068d7018b4c8fbd13070f9b0d02d3686b54f96a21e74e346c380a99f21f33925d4a39d510842ed84f2605a15051a784d8216364c2f8ec79f7884ec151ac56d11e30e058d2c49998147c1d54e04aea5d2e9bcc5bf051690d7aa905fdd68528309afda3fd5920cecfae73f6d5f8962e647f5e909748ff9105097118feecf28d6d514ede8cb2d4201da6efc9f3c24893570b227dfe673158e6c17bfcd91625bc4f87eb6fc67e5b647b18231da1da165220815b24431144fc05e1e207e12dbd9e26254d61bc9f47e4ec7e5e19a58ea2444e97a6daf57c895ec35c497d84e2f0c2e520e123f3cadf380a7e54836f7b5a9ba24b1bbe690b7f3de459adbe4d80a648ac2d8158e8b0948ea6ec4b8ac3ce4dafc8ed0f709c13a5ada9fa6c254b57e3cc83411e26dacb6aee290ced0bd65f18884b33dfd1229acd273f97d3edf7673747193ececc83e9ba1e1a73ceb8c347ac88333308df5e4d9ea133e2c6fa4bb1489980cf8ce20201bbba6334936fbc6bb7e6495ba48a3648fe57a0957de758182d3248601ab2bc9d2edf826255d5774021ae4d5d7f87a18927ac866b24e9fa2ca4fb5623c9e0ccbe491a61566f5f649047f97db9cea177ce08ec58c28e7e174f427b38c2e3c2d7165b321eeffe4fc03e8acc2c0ba7520699e8f6480261de487e33d3169790024cec06e3d776c98ccbc5da2ec0032c8241bedea3db12687a82e1eafa4ff828f5347e8ae0b22bcfa5de853d05381a04e8eb953a54c5ebb528bc03d4f7d74b1741f7833a7b90456ff847619b5893bd1515ed87cfd9aa44208572d1578849d5e7310b29e4a5af6026d9d5d2d6c18cc222fa375bc756e86d30a673420c4ac99c0b0a6baadd5bb53bf161074e85b105d5c8f704ea4fef269b3e2d62dc9e494393957a9aba76d7a7c79a1f37a9c0b20a69c47f74b489a8d60bb017272497f2cc7e3dd85a6622c0c1038978ca44170229f1ef25d11d2757940a5b6d35eab977937a5cccfb979dd79accb86476ae7da6fa96527a0ad6a7613c9008fd3cb2cbf81d7be93304dab9059c38cb54a191118bdf39148f6a7e44eca45272a3a2f1812ab6ac72f3009c235abcfe300a5599340b7baa1d6b07797a8fc29533b1d39b24642a867cc188327927d224045bb65e47238f7e260dbe81e2fdd8dac3f3da3724817975e008e0ccbfd958fec78f01cd6cf9d46594513d8a67c9ff5d1f745a7b1b82ee0d1b0babcbea6d4334f8f474c0f1d438d80da71e1158865621613cb9eb1b08f224fca3c26ed879fb13a7148d7a65ea7d2364b71568e2b56e7ab492866ff1d9f0d83647682fd3a31ca4c3735ed4accb26d45e9b26f80856a287fdd42a12de98d1b5d4f2278dd78a8b287a18d8edd003d338049214faef3d6c17b3117da3e1c60715480e1739b52ac39265803d5d6019559d028bbc2c874071c021c581458c67aea919e14db399a54314b1d734eaeafee4844ee9c208887b1c4b7c475997146ccd5f6df48262ab997fc0e5f3ef5e68506fd1d9835b7028c22933024dd9ea325dbb1f8172f9c564b973a1668fb8b566e484a6f821c7bf709aecc0794a71ecc8bcf2fd5ac8d0c76b19f4ce02fefa9780549df3f606a0e520b059f95cb4f749b8c9204f1a052a588ce8ccc519a89e5444aec50739e92a914782bd1c991ae6e403aec0655570e1f90d921695548a645c317d9c13d36da32f86bb104d4b36b66b1e766731dfca460354bd9194e90523afc4e36d9aadd8dc777cfe26c955dcf57736139668b29f4c8ad197050737ebba3d55eb30cc94bdc3a1e28c3573a98ca4d5502d9893755cf2dfec4843fa39eb0a9948b6589eceebfe750b2db0", 0x3eff}, {0x0, 0x803e}, {&(0x7f0000000140)="bd", 0x1}], 0x3, &(0x7f0000000780)=ANY=[@ANYBLOB="1c000000ca8a00000100000002000000", @ANYRES32=r3, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r4, @ANYRES32=r2, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB='\x00\x00\x00\x00'], 0x60}, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r6, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f0000000240)='\x02;\xff\xff\x00\x00\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x8e\x93\xc5_\x81]\x16\xa3H\xcc\xcc\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 \x00\x00\x00\x00W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\x00\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xe6\xde\b\t\x84(\x12\x8b\x15S\x03U\xe0\xd8t\xe3%96\xf9\xb3J\x8d\x00\x16\xed\xcf\xfd\x1d\xbb\xdb\x8b\x19\x976\xc7\x9e\x8bM,\xed=!19\x17\x9c\xc9\xe1\xc20\x18P\xc3q\r\v\x82\xdaAz]\xd1\x1cx\xefXF\v\xc5\x87\x9a\a\xd6\x96\xc8Y\x91\x9d\x9fI\x1d\xad\x12HO\xde\xde\xfc\xa2EF\xe8QD\xa4\xcf') ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000200)=0x7fff) (async) close(0xffffffffffffffff) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc0096616, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079100000000000007b0a00ff000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x6c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) 1.494662326s ago: executing program 4 (id=7400): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYRES16=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x222a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x581}, 0x0, 0xfff0000000000000, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3ff, 0x222a0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x581}, 0x0, 0xfff0000000000000, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES64], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80bd9f}, 0x90) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1d, 0xa496, 0x2, 0x9, 0x4, r5, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1d, 0xa496, 0x2, 0x9, 0x4, r5, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=0x0, @ANYRESHEX=r4], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5}, 0x0, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000780), 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/17, 0x11}], 0x1, &(0x7f0000000800)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x10002) (async) recvmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000780), 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000580)=""/17, 0x11}], 0x1, &(0x7f0000000800)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x10002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 1.457868179s ago: executing program 4 (id=7402): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000980)={'veth0_virt_wifi\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000780)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_exit\x00', r5}, 0x10) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="0904"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000}, 0x90) ioctl$TUNSETOFFLOAD(r6, 0x4010744d, 0x20000000) (async) ioctl$TUNSETOFFLOAD(r6, 0x4010744d, 0x20000000) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x581}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x581}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x3, 0x7, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 1.352071668s ago: executing program 1 (id=7408): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000005000000010000000399718b74e30470b9456f088f3d9000000004110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000852000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000085000000d20000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff94}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000005000000010000000399718b74e30470b9456f088f3d9000000004110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000852000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000000000850000008600000085000000d20000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff94}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70000010000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70000010000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x6) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100800}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086602, &(0x7f0000000180)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x18000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r10, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) close(r10) close(r9) close(r6) (async) close(r6) perf_event_open(&(0x7f00000008c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, r2, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) syz_clone(0x4000, &(0x7f0000000540)="54525074b14fc7ae861175f176c3b16b824c36f3ae15108dc1a782bededb4707f8f71a670718bd0d265d815523a52089335a82a4f501d22d5bbba86fb8493449662a5afa09f7c5f99caa35fdd745fc80d8062e8f60d4c7a1c5d05864ca97b4cd18ec9ca478ae58704aca13ea82a16c72d5a76e8df1e5d4a2f493bbf0b060954db046898af579d4f2bb5060764c28716d07b43a4571befa1404be04b1538155bb2d512e043d7d815d5acfb3b00e9f", 0xae, &(0x7f0000000000), &(0x7f0000000340), &(0x7f0000000780)="e03bed84626b40531f1a219b958a0a5c837526e3f3a3a83ac9528c474dafc7db8cdfca836f410aeb0ef5ccfdccf7a8c5afe6a23d311cd1d5b6c140eec143af8b1cac3c0998725d0370b532641b7eeb5d49d3392280437d1065559201b1891625d8e42a7ac823335554f489") 1.304837202s ago: executing program 3 (id=7409): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000700)='signal_deliver\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1], 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r3, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f00000004c0), &(0x7f0000000740)=[0x0, 0x0], 0x0, 0xe7, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe8, 0x8, 0x8, &(0x7f0000000600)}}, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000003c0)={0x1, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00)={r6}, 0x4) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_tracing={0x1a, 0x22, &(0x7f0000000780)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_val={0x18, 0xb, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x6}, @exit, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x5, 0x8d, &(0x7f00000008c0)=""/141, 0x41100, 0x12, '\x00', r5, 0x18, r7, 0x8, &(0x7f0000000080)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x1, 0xc, 0xe469, 0xe264}, 0x10, 0x4e6e, r0, 0x2, &(0x7f00000002c0)=[r8, r1, r7], &(0x7f0000000380)=[{0x0, 0x2, 0xc, 0x6}, {0x3, 0x5, 0x7, 0xb}], 0x10, 0xfffffed9}, 0x90) 1.302609753s ago: executing program 1 (id=7410): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0x22, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000200018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095", @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x97ba, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0xc, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES16=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYRES16=r7, @ANYRESHEX=r5, @ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x7e, 0x0, &(0x7f0000000800)="05c7a5c745dada93cb221e0e1d6bc659a2648247b398f374b6b4dbcd134525b4ffee137876001c1b0e220f186922c59a98f1d18e45bee23b041a428ca55e674f00fdae168659ffdc9957287d518bbb081fa7f02a7d415556be68820d532330ad82337f30e03d80203af950b93b455437eaacbace9c7db95e64ace824ad5c", 0x0, 0x5, 0x0, 0xa2, 0x0, &(0x7f0000000b00)="562f00df3ef91598549bce56858578163e3c915f4e796e186ed8200b5452c8d79fd4b306e7c722801dad2a939cdfbb65ac6be88ebffa8e9c78f520b80377fb50ed25b7078b687825f6d214287f1a1a8381eabc9f535dc3f82715f4c5ea3913b86c1ee0759325e7b48e92f060a98ff8b68094ab0d7b380c5165d1ae34340acb73fc0b7411526b8fbf4030b9cd3a9f9868b364fbdf44ac0af696df5aeb67bcffc67e19", 0x0, 0x2, 0x0, 0x8}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x4d900000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.300360992s ago: executing program 0 (id=7411): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0xfffffffe, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x58, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x28, 0x802, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYRES32=r1, @ANYRESHEX=r0, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x0, 0xf, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa104000000000007010000f8ffffffb702002e63"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff85000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r7}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.299468793s ago: executing program 0 (id=7412): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x81, 0x20, 0x9, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x402, r1}, 0x38) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, &(0x7f0000001640)=""/233, &(0x7f00000002c0), &(0x7f0000000440), 0x5, r1}, 0x38) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000440)={r2, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='workqueue_execute_start\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x44000) sendmsg$inet(r3, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) 1.289093524s ago: executing program 4 (id=7413): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x16, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="660a000000000000611190000000"], &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8, r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x0, 0x0, 0x864, 0x4f, 0x2020, 0xffffffffffffffff, 0x3}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000680)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000020000000000000000018010000756c6c2500000800002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32, @ANYRES64=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000ecff850000000400000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xc000000}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.151242905s ago: executing program 0 (id=7414): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9b, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (async) 973.141389ms ago: executing program 2 (id=7415): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff, 0x10000, 0x4}, 0xc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={&(0x7f0000000000)="3d6428ec6da7b489fcec23fafefd7fef7e67ca06941c557a275a00486784f227d62dc3a69d66ee9db8b588", &(0x7f0000000040)=""/134, &(0x7f0000000100)="7a7599045f47c7206038b96f33a4dfc46fdf5ff8297c69f61cae43fc783f", &(0x7f0000000140)="581279fc5089f906", 0x100, r0}, 0x38) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x6, 0x5, 0xe, 0x81, 0x4f8, 0xffffffffffffffff, 0x1dcc, '\x00', 0x0, r1, 0x5, 0x2}, 0x48) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000300), 0x9) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000340)='mm_page_alloc\x00', r4}, 0x10) r6 = openat$cgroup_ro(r4, &(0x7f0000000400)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='threaded\x00') ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x14) mkdirat$cgroup(r5, &(0x7f00000004c0)='syz1\x00', 0x1ff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r2, &(0x7f0000000500)="49bc41b8ccae5a1159bfd6dbf7d89c556f35139455b51985898d06663f1edb225084153e504e64b32bf5f1d2875ee992e08922956102d0260b7ce729b7b1fa165f14da46f3d21acc762ad3d042175cb6340eba74d49ce7277961d9c2be07a350ae50b85307f2339ae8541627f3a59ddd83b533f2e1d2d47e52363213ee34058e63e6b966394e4eb166f0b996e0724a7dc5e0bf88af4b6861b14a0bce37878533250927a42632985bb913aae6ef30b07c9570140111ec6091951d16fc2fe60b9a938131cffbfcbbdaf98f4d2333671126f7bf6914164bce843d8d946306431c56b08979a10d6aac29ac3e97", &(0x7f0000000600)=""/21}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={r0}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4, 0xffffffffffffffff}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r0, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f00000007c0)=r6}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x1c, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, [@exit, @ldst={0x3, 0x2, 0x6, 0x9, 0x3, 0x1, 0xffffffffffffffff}, @map_val={0x18, 0x4, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x9, 0xf, 0x2, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r8}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}]}, &(0x7f0000000940)='GPL\x00', 0x9, 0x32, &(0x7f0000000980)=""/50, 0x41000, 0xa8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000a00)=[r0, r6], &(0x7f0000000a40)=[{0x2, 0x4, 0xf, 0x6}, {0x4, 0x5, 0x5, 0x9}, {0x0, 0x4, 0x3, 0x4}], 0x10, 0x7}, 0x90) openat$cgroup_type(r4, &(0x7f0000000b40), 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000b80)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e80)={r6, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c40)=[0x0], 0x0, 0xee, &(0x7f0000000c80)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0x3d, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=@bloom_filter={0x1e, 0x5, 0x2, 0x9, 0x2105, r8, 0x26, '\x00', r9, r6, 0x5, 0x4, 0x2, 0x8}, 0x48) recvmsg$unix(r6, &(0x7f00000012c0)={&(0x7f0000000f40), 0x6e, &(0x7f0000001200)=[{&(0x7f0000000fc0)=""/158, 0x9e}, {&(0x7f0000001080)=""/251, 0xfb}, {&(0x7f0000001180)=""/97, 0x61}], 0x3, &(0x7f0000001240)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x40000000) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001300)={r2}, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001340)={0x8}, 0x8) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001640)={&(0x7f0000001500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@struct={0x6, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x0, 0x5, 0xb133}, {0xb, 0x4, 0x7}]}, @ptr={0x2, 0x0, 0x0, 0x2, 0x2}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xa, 0x4}, {0xf, 0x2}, {0x5, 0x3}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x6, 0x2}, {0x5, 0x1}, {0x1, 0x3}, {0xf, 0x5}, {0x9, 0x5}, {0x6, 0x5}]}]}, {0x0, [0x0, 0x30, 0x0]}}, &(0x7f00000015c0)=""/119, 0xad, 0x77, 0x0, 0x7}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001700)={0x6, 0x14, &(0x7f0000001380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0xd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_fd={0x18, 0x0, 0x1, 0x0, r10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001440)='GPL\x00', 0x655, 0x71, &(0x7f0000001480)=""/113, 0x41100, 0x4, '\x00', r9, 0x25, r12, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001680)=[r6, r2, r2, r4], &(0x7f00000016c0)=[{0x5, 0x1, 0x2, 0xb}, {0x1, 0x2, 0x5, 0xc}], 0x10, 0xea3e}, 0x90) r13 = openat$cgroup_type(r4, &(0x7f00000017c0), 0x2, 0x0) write$cgroup_type(r13, &(0x7f0000001800), 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f0000001840)='threaded\x00') 933.855462ms ago: executing program 2 (id=7416): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000140)=r0}, 0x20) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) (async, rerun: 32) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000600)={&(0x7f0000000480)=""/74, 0x4a, 0x0, &(0x7f0000000500)=""/249, 0xf9}}, 0x10) (async, rerun: 32) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1d, 0x5, 0x2, 0xa9c, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x5, 0xd, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000ffff0000bc33be323f3c536d9000080800000085200000050000009500000000000000981100000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000ff0100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000"], &(0x7f00000002c0)='GPL\x00', 0x2, 0xda, &(0x7f0000000300)=""/218, 0x40f00, 0xd3, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000440)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x1, &(0x7f0000000680)=[r4], &(0x7f00000006c0)=[{0x4, 0x4, 0x5, 0xa}], 0x10, 0x8}, 0x90) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) (async, rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000011100007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10000, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='mm_page_alloc\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async) r8 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r8, 0x0, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r5}, 0x10) (rerun: 32) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8}, 0x48) (rerun: 32) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) 920.687793ms ago: executing program 3 (id=7417): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0x1, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x3, 0x0}, 0x8) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x14, 0x11, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xc8, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, [@map_fd={0x18, 0x6}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000680)='syzkaller\x00', 0xffffffff, 0x99, &(0x7f00000006c0)=""/153, 0x41100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0x10, 0x1, 0x1ff}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000800)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x81}, 0x90) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0xb, 0x1b, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x0, 0x3, 0x6, 0x8, 0xfffffffffffffef5, 0xffffffffffffffff}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @jmp={0x5, 0x1, 0x1, 0xa, 0x8, 0xffffffffffffffe0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000340)='syzkaller\x00', 0x5, 0x7b, &(0x7f0000000380)=""/123, 0x40f00, 0x4, '\x00', r3, 0x17, r4, 0x8, &(0x7f0000000500)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000540)={0x5, 0x0, 0x4, 0x6}, 0x10, r5, r6, 0x3, &(0x7f0000000980)=[0x1, r7], &(0x7f00000009c0)=[{0x0, 0x5, 0xc}, {0x2, 0x5, 0x6, 0xb}, {0x4, 0x2, 0xc, 0x2}], 0x10, 0x6}, 0x90) (async) r9 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) write$cgroup_type(r9, &(0x7f0000000b00), 0x9) (async) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000cc0)={r6, 0x0, 0xe9, 0x0, &(0x7f0000000b40)="135683a334ca0acaa5e5e97a49db8ca5c58898829e04994ac525e8b5a9712ac734925479348cce7cec861c93fa6c5afc128a49435b115b6e8d0ff274766af7423e879cd642363edf3bb11e3ecd703dec02b6e8ce91ad8a6435c73db52bb298b24f32056002b4a31ccb4ca5039f42affabbe5233cc050edacf17b5975375a11245e5b22aff231490d430db8a6449d20d51670de7bee7e8daad9e75f629bff7294116f497f791066d4df92b4ac884ecbc640bf859bae764793f1b80ddd469f875f9b637d84ed423a7e873c1110391b0b1853974ca8cf55242b872f3edd840b0471b87e98cb06914a5eba", 0x0, 0x75, 0x0, 0x80, 0x0, &(0x7f0000000c40)="26e6feafd77aef7393c09028fcdacf8a0810f5e0c0963678497c47edeba3e6287c9046e6c469b8f224ce91788c7cfb84843c55bef7d92969aa391f920d53bb374560323b9f0c5255312a2bec2549d0e1ac1134a6f3dfffb3a3270da52e3dd2323347470ea2ccb9c89d68974cbddc9e696a6a52cd686ad218fdc87673b6cdaa85", 0x0, 0x2, 0x0, 0xfa4b}, 0x50) (async) r10 = syz_clone(0xd40ac07142dab48f, &(0x7f0000000dc0)="867f9f8f009c43c47e3346e48c3088dc48b33c633472ab4f5275ad3fa67f5a867e4120079126532a487fdaf9143a76a37990d38e97a7052c238b47775b66bfbdef5ada9e9299abb49433cb755f32a672f2eaf849287add504074c9aee4518996ef8ff6985643373eb3badbbae2082fa42b3e2c5a2b1bf99acfad72ed5a75516ba5", 0x81, &(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)="a58847418422cc221a5a324567f7e19249f12a9832a585a6bc165486da81756b10e7") r11 = perf_event_open(&(0x7f0000000d40)={0x0, 0x80, 0x6, 0x6, 0xff, 0x81, 0x0, 0xd053, 0x4000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb5, 0x0, @perf_config_ext={0x6, 0x7}, 0x1020, 0xfffffffffffff000, 0x55, 0x8, 0x563810fd, 0x8, 0x81, 0x0, 0x7fff, 0x0, 0x10}, r10, 0x9, r8, 0x0) (async) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x2, '\x00', r3, r4, 0x3, 0x1, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x5, 0x4, &(0x7f0000000f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000f80)='GPL\x00', 0x0, 0x42, &(0x7f0000000fc0)=""/66, 0x41000, 0x1, '\x00', r3, 0x55, r6, 0x8, &(0x7f0000001040)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000001080)={0x5, 0x0, 0x9, 0x6}, 0x10, r5, 0xffffffffffffffff, 0x1, &(0x7f0000001140)=[r12, r2, r7], &(0x7f0000001180)=[{0x0, 0x3, 0xa, 0x2}], 0x10, 0x10000}, 0x90) (async) socketpair(0x28, 0x6, 0x6c, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r13, &(0x7f0000001a00)={&(0x7f00000012c0), 0x80, &(0x7f0000001940)=[{&(0x7f0000001340)=""/235, 0xeb}, {&(0x7f0000001440)=""/137, 0x89}, {&(0x7f0000001500)=""/18, 0x12}, {&(0x7f0000001540)=""/220, 0xdc}, {&(0x7f0000001640)=""/137, 0x89}, {&(0x7f0000001700)}, {&(0x7f0000001740)=""/252, 0xfc}, {&(0x7f0000001840)=""/93, 0x5d}, {&(0x7f00000018c0)=""/79, 0x4f}], 0x9}, 0x20) (async) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000001a40)={'dvmrp1\x00', 0x400}) (async) r14 = perf_event_open$cgroup(&(0x7f0000001a80)={0x2, 0x80, 0x9, 0xfe, 0x83, 0x3, 0x0, 0x8, 0x6e4a0, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3a54d2bc, 0x1, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x400, 0x9, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x8}, 0xffffffffffffffff, 0x5, r11, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r14, 0x40082406, &(0x7f0000001b00)='cgroup.type\x00') (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001b40)={r12, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001c00)={r15, 0x58, &(0x7f0000001b80)}, 0x10) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001d40)={0xffffffffffffffff, &(0x7f0000001c40)="0bebed6dd1db59d249f46d8c5e890c697d32f75dd36e040870a6a7d8238ab6d8bf2b79070d6ba3efac14c47b4013dc22ca58671af116f9fb29869268fc2c282e2a86d47e456b6d6818c2838641127102db047ceb3e813cbc0c08af3d1396f5bd2daf36aef9051f8fc6b6fc82fe96496b788093b5ad050831f782629dfc7ab8ca761e3dffa15c0c998ff4d0f28191e164d74baa4761b2aa7a1d4e7f59940a4865f083e5701b11f9ed87f7051ab0eb5e29bd0c94118ad5013a05953eb89ec63fc8304ed9"}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001ec0)={r4, 0x20, &(0x7f0000001e80)={&(0x7f0000001d80)=""/224, 0xe0, 0x0, 0x0}}, 0x10) (async) perf_event_open(&(0x7f0000001f00)={0x4, 0x80, 0x5, 0x4, 0x53, 0x0, 0x0, 0x1, 0x50, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb, 0x0, @perf_config_ext={0x6, 0x8}, 0x10100, 0x9, 0x3, 0x0, 0x7, 0x81, 0x101, 0x0, 0x5, 0x0, 0xffffffffffffffff}, r10, 0xf, r14, 0x1) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002080)={&(0x7f0000001f80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@const={0xb, 0x0, 0x0, 0xa, 0x1}, @fwd={0xc}]}, {0x0, [0x2e, 0x2e, 0x0, 0x5f, 0x0]}}, &(0x7f0000001fc0)=""/141, 0x37, 0x8d, 0x0, 0x7ff}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000020c0)={0x10, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002100)=r16, 0x4) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 835.75044ms ago: executing program 0 (id=7418): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x1f, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/300], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc90}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f4, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x9}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x13, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7030000070421000000b70000000000000095000080000000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[], 0x1268}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000280)="e02742e8680d95ff9782762f22da", 0x0, 0xe8a6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r1, 0xffffffffffffffff}, 0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000001540)=[{0x0}, {&(0x7f00000013c0)=""/232, 0xe8}, {0x0}], 0x3, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002300)=ANY=[@ANYBLOB="1800000000000000000000000000000065f5f95f6437cbb6e7adff3745c856330407855d30a889e7bed1e20f8b690fc42d40cec854c57542fb3d0bc5634590ff", @ANYRESHEX, @ANYRES32=r6, @ANYRES32=0x0, @ANYRES32, @ANYRES16=0x0, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r7, @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT, @ANYRES32, @ANYRES32, @ANYRESDEC], 0xe0, 0x20000001}, 0x20048857) r8 = getpid() perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x1, 0x0, 0x0, 0xfe, 0x0, 0x0, 0xa200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x11}, 0x1020, 0xc8, 0x0, 0x4}, r8, 0x7, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={r1, 0x58, &(0x7f0000001cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001e40)={@ifindex=r9, 0x25, 0x0, 0xfffffac8, &(0x7f0000001d40)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000001d80)=[0x0, 0x0], &(0x7f0000001dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001e00)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x0, 0x0, 0x5}, 0x48) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x10, 0x19, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000006000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000530a00008500000006000000186500000e00000000000000b0000000bf91000000000000b7020000fe7f18648500000085000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x19, 0xe1, &(0x7f00000004c0)=""/225, 0x41100, 0x28, '\x00', 0x0, 0x11, r11, 0x8, &(0x7f00000000c0)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r11, 0x9, &(0x7f0000000100)=[r10, 0x1, r10], &(0x7f00000005c0)=[{0x5, 0x4, 0xc, 0xa}, {0x1, 0x5, 0x4, 0xa}, {0x1, 0x4, 0x3, 0x3}, {0x2, 0x1, 0x2, 0x4}, {0x5, 0x5, 0x5, 0x1}, {0x1, 0x5, 0x5, 0x8}, {0x1, 0x1, 0xb, 0xc}, {0x5, 0x4, 0x6, 0x1}, {0x4, 0x4, 0x5, 0x1}], 0x10, 0x1ff}, 0x90) r12 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r13, &(0x7f0000002ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000000900)=""/4090, 0xffa}, {&(0x7f0000001900)=""/245, 0xf5}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x3, &(0x7f0000002a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYRES64=r14], &(0x7f0000000180)=""/179, 0x51, 0xb3, 0x1, 0x9}, 0x20) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001b80)=[{&(0x7f0000000340)="ee6015a1800c4852c1dcea2e6032170cc708c256bd3571826a4a32fefbd6fecc128be1c2373964f976f3fcb8e1b9552bca9afa9d0843b0960f1ad25706d137ca92e56a1648b06a563a7e72fc67b94460dbd7b3a2f0a44c376d16deac43495b378dd47b16e602efe76cc0c5888fa64af010028088553c87dff3dee468bf40c8224aaf332465ea7c6fb295cdbec40e8760a7eac37b12301bed99323b41ec0902cce812b570bbd7a740e953bf151a58b4eeffd4f34b32be33390a3e22cad0173384e227b1", 0xc3}, {&(0x7f0000000680)="4b18066f61d0ca6afdb44280b8eb61b85c1c8ef9e2a3201cc9ee8df5dfb6b288847fe6206e75221a7d30e923e287acdf44a3e715793097a33721358003b9b677c4dd13b626d655efe996645d66d1bc26f18df92a10a62fda9a2b0ac54c65717a87c4bd9b0ba70b449789933bfc25b50afb5d014c3133fd05d5f95dea6e56497f3a8d0d35bce2c11ba7b806e9bf4d58972bd551e3ff84d0c656744f26878aafc666ac6b0d7d2ff080900fa0ac53ab482286591f64d674ca01a8c5f42d75d8", 0xbe}, {&(0x7f0000000740)="bf860792b2ee0fd76d0da7816bb7811653b670170d2f033e2f024c62590de3cb90aa70a1525062835f6fd65d1fd922677e6349b73beb5ae87c63fefa9de32e781c2c291297423613bb1e0d0e960c733795fad71def8df7defb9ebce64f54a39bd5ef8601ad28fa6852a064711c8b3f313d23ee10047204598c42d2d3744e0b835c22", 0x82}, {&(0x7f0000000980)="47e2e5f782e201fa3977268e1c1ede434abedd6039f4127cde97935e6b05f51f5049dd66b9eb49a3a837e7250dd79273385634c64ec3f56ceb175713475b9beecd9479decd761963d48926ab8d1aba4d4038df96181c8a3f5aa1eaedb13b1160b6e7d31e7d127c44bf2048d0f79d0b7806ef4ca29a826f8ae4ad1bfd4c1c1db82d1f2c735feecb7e1ba06c91d9595e998425da695377beca1c21d750d2286d7fc673641a07b5ef52fd5a1a39a6891de49cac991033eaed4422c90ad43e29d246e2354bf97fe3864fda6a0e6bfb1092d2d80b585d6a5131738189e2e92ac895e1fd155785e56237f980709134082ac7edb72bc7516556d42df4327f1b91e2042a5d26f35860351d063281458d9b45c827d57b67c71f34259ab8848f2cfe7eeea9ae487220e0f2df74353ab321584ea9153b19376b5b98a2fc2b2db7ce457c4cb58db5861eea314ba14c2fba3f28c18c339104b5af5ed030cfdb99673962b3f0103d29cf43f37eed46664b2ee417c2e2403a5113dde3c977edbf47e5056b024517bd9d79e0de96a82494df0b1d497d501bbd03188a5dce4514fe552d7ac6953b20b42bdee05312c4166247f72833d2ad3d451de8b3408e3f9e196307864723b80e642cbb39bd86953567a9222938159d9c488bfa3f26f5bb76255c2995738ec380e1af796505ecbde9f498dc995942d5c4e53c455ad247bb45dd4b003ca5a97d184f3b8a3627c376ae505cb1e264481eef8446a356575ad30034ab9e71b6aedd0b5de83685d52dcb310df0198a041b6d7ca08c4311dcc7423417d010a3a759fbd10fa36cd7cfcdb52d3b5d6bdabc5680bfb9e641c8f0bda599accf8bdc3c807ed31577fc389260ca69470127845841f73ace1b8a093706fbccdef9aa9ae90ce1338918b7ccc92d6d2025a66cf3ddfe757d6ef264c7a3d303933bebf35279e56b1eaf37e1e6017732199e2401bb9481e37c5994c1f6fddd521fb84c34a96445326324183b66c6bcd3ffbe6134fe24539cbefdb1cf56bc2d107ae282a66f4656cdcbbb74fe5a2ef273d61792ee03eed12747a5bb19cdddc3b6d90acce8afc2c6c19c3849564c0fc19ab89ff785a7c5c28e19c4e94cbd21140798785a30f00c368f0024cf40233addaaad6b43179a824880b517b646a0d707a14cbbefd944529afd6b91f811297413c1c2a5a80518cd6f47b3fcd7f4d12da4fba960ba78fcbdc080dee5ad3fa2fd0dc3d81bf25c262104a8544e7c3f1c6cb7fa83eed62e260247eaa582413b6bfc177a3107911b02e893211c4cc18313656c29984ddc75b26f2ab30332f4104ff8ee7550c2f52a1b130518fd2365e640b631470db3055d636f849121a529d7b575ea24b96be6304b6b46866db538f61f303eaa9247a4679f01696b5a5c7691aded6451a459eea0f0ec96728aced4ff5c297306712c440cb5992af2db73849c6cdfa2da182002f41c826f0407b921fd96db4f5fb31ca77ecccb7ed0f2457f220944b74a6e429b846905a9d2d78b1f0f6718f654cf0a95d98a2845c86264901c4b8c95f096e598883387285ee3a7d652e4702f589e0ea5e4abc24b8797ee860d1c94a3524b05129ddc44dbb00425890396fdd10ef884ba6313d5ff0f063c8402144938e90773086033416fc38b32c55317333e4c91021735c35ce46431c0b99852e01a9965f5b8b73108f0e96de973bc000c9e88221f4ed2679c92d82d751f9e78a1819b8e0fdb89b5a466bf603c30320fbb71b602b316811a584d7910866d04bf4c9d5ecf39b497459e77e6d94cc13d3581f0f78d904d4019d558b521c1b0ba00d35b8da5962d00a0367da64b70357b994932c1926555ab5962b5d32920f587c353ae4e1e1550a6a21f673ccea314d5de3654312df1e90acbbfd2748e4c8a7a3d598ccd6c61f998c75c4f8c6e1d7d5df90f436efb62ce474bfa48c4972cfe2361a50be8f896944daa6e50644b803a442f319c3ccaa63602a913d4dbd5d465ad3e74a77f793c9b54e55b55b426bc8324da1cea84a4f74d4db2cd3fdb558344eec72bf401f13a072f0232a4976108b58bc6f6dbc4fa206db474f289cecf1a2916ba0ed077a4147c75f46c44e626aab43b0b309c0589643e018bfd8f0c41a1779b2e2735a2bd94ce1869ad7a6ac6d109806a2c7635acacae66066f527a18cd5d103623f641ba83bb69541eee56d887a8f171321b6840aaf3916f25c79e4c7547eaf0846eeb2c7996a1179fe92388611614b701fd4196c27df0a70b8bc1994535c2c24388f98b1b91d9f662315d43624ce6a3b060fef9b06dae32f24e2b00f3baea3d9be95b8ffe57ebcabafe507eb92995feb005bf04a0146018283e42aacba34488e67c0b7e652b9f0752e6ac67f4e3ccc634c9768a0f15257d2b24b719b7d8ceb16f0d816a3c8080d4da2c22832cd6285ff6849210971fb3f14eb93c86e816d1206a4927ca0cbd4af94fa28ef4581ebf138c1cc9fb5e788f4af37b4a22abadc985431aa47892c47143fbc01a3e07f48fce6d73c7a4d5c991754e12ab2a806a5c6184c5db2a6563e06ff659bf648c8a5d1dd4ac186108562205e6f71ccbf7262092f3cea9781c34a936d5e428da7ca756a6613b709e42fab0f96419f9a9f566d6605560cd7a4a5ac38f1ef1640e5a836a43b33a168ad85caaaf4f17531ef31d4dbafe3d059426b10ee4af989a9b356e5433705d7cc1e4aab04d7f8d27707340ede8adff24d45446b6807f650de6bfa0827bdd18a9fc676ff65fdac774f9f16e2026520135d883a7dd82ccb893d59715d2def4dd09e33884cb7a1d9fc34e814f37ce6ade7d28a4e4c92141b205bdc12d4503bca714cd000f675dce2a776259065c34bb0b960596b35eeb9fa8a207a6cf87e670c8be9bc5df773e82d6159e83f6bcbbc26e6501ac05ccc41ae573b4e00b31533c49c0fb981ad8d2f8c528da8da3456cee4b502ddd7d4a8e49cc1ec6803331512ef8580db61dc0a6c5e226c95218d67edb03f9046d5b635e73cee0cbb276d002d68a0c7929b16033e1980a326b6bb98e39f5f49a4542b0c99da5efdbc7e48e7fd5677eb087b72033ac4de50fe3205ed8a25b8af55785c15036a216888688f8efe6ee95e75245edc20b41fe521b8163c504d7a3c58e41665890370ad745d712d18650fae64531dacfd1f8b8868f81536ec74f6d073a234e85796d1d7c78164de8d32ae21d3d05fcf160845dd06005b52c7fc82579f8a017ba447a926c4626cc90fd3295a51bbb30891057c15ae07480f6f3f132fb1c46b3526aa5594174ab56b33f557efc205ff71a7e566c5ccbb22c9b9c6413cdb8e314277587b981f84db6d188b746afa56dc83d0a94efc97349b8756bd370ead22760bb67e0212dbee2e643f1a3a8cecefed1b2701ff960350fd755c8b1b572dd0921578ca1fd97bcc9888d3a5256fdf0684797c1b971e701e877814e7edf9ae531edf517d42861b73ac6c01312faccef077f2669304b0bef5ce84e4fb368e04115d40cb4704f59d586c517001b617c2139f1b56fe456fef49292110e8be42197531689686b93edf5e4b5c3cb431152b1eb71ce13a0dd91bd66fffae8f7ff3763f3857c566d6b1c71e381934429c48de9effff181b87383db664c1e92320a184cf83efd41a32c5870b25374d4fcd56b80e7c1d0f12ef4db90ac79c191bc7e22e0ea8038cd83132d8911b5e842b03214dc2041e252ede91387548172dd1ebddc62035868e6ad9b9598fa30283d2a6e36c94a65e3927c7fa4247a9da9b156a554d39ac2eb97e4d4d96c6662149e88ad4e8cb5dc191cb47b8b3a023577d98a7f347b3af79164df80f21a3339a579a68c95b7a5d8b3d83d9e7a798db8a2c40d1767285366f2f54afbfe81bf5ebfd85c2c9191a149b5a5bea2bbc48f14fe0cf4b5a7bed1028e5b5ebf1de2831267788c3c6cd9b787c2d74d7b760e53bc571f553968d8733ba87029296419b655e5e97ede517c51b691be55c0879ed5a8866ae8ee53cf504790288c90b85bee38d36f8c18504a27c80ff5fa2abcdac3201ac441040f8ecf6d3a3e0faa6df2de954deb74dabb27dddbe0bd2a5474333f3d34b1682a2bb4f3da855de45a2f3a53e57fa473c3d898938c69bfa7087b0a19f1231a70268b7d7d9cd088ecbef34f7a2edcfe2f53c5b3cab4414204419f8b9802ff78b2566631a1dd52a1d63674d8f1d4be2e1f3924a14378022553a8f43cd3a8a478ea905fbd18603f94f96b5c5c60d0aa456cdbe566fa05d712eeab310d591427718ece0a9bb2f8d557a2555f844d1c4e5162f2a5100669c348cd46c105590560e55827219dc7ad9e97ffaf33b0d414d06a192228705799a5d8bb3518c10204a498525e2067515e6a010eae960d63eca9a1cb650f8cc006b7747f8a844bedff465f53adb0a460b0307b89e81fa08f87eb5ed594b5fbff9d80da1ca068d3f1d97e45eaac3eafad5a314e2946c557b5d2825e75f6141ab4e55b3ed0683696877277b1ae8b10d0d691ce0ceb00782e5d8ec520efdba6723e4d8dfe7cc74fa0c93bbf997c5234b0340381c45632cab0418145b0aac6328672832f408aeabdc95a63b1ddecfc9c27faab5eb0c1e941ee6cfce6cee7215aa923fcf3bc139d8fd7fa098100eac1af8029e69dbce6c81897706db2af1edc5bbf77cc158ad32d9061bac4f6d9d0976ddf0897cda3c8bf60f43eff7f0672eedfc6757a85dc357a28c06976d9dd81814b7cd6498eefd4bab7d720c2dd00c5e4efc1b0070328a3c973252262f99e567324e18e4f6215349c6d085d5477d39bc087672b23877ef700f6735ce7a641973e6c2836a80da90380ba1f29d6c2fc243c2990653e18860eb0e59a003b3c6b4cc8c56461440de8ce89c324ce5ae104cafed63798e686c937a7da3b4e78530724ff6a76e0788c9ca9e9b92e36162634733879118b14c1ab18ca6509ee7632aedbd57b2660f8e0149aba2411aed90724a0c49530b4636a06b83df45be08f1657f4729ed745f384df7a07ed0a05d608b154b07479356a28a1fd8554b19a6fe56406850efc9cc96decc04706813578f31513f538b1580abd204bbcfc349de3786a97d1abf727b50e7f4892d7889113bc46b967e74582ae5b7d9b05c710eb47336bcfcf7fa1ba865ea67e024dc14270b35c90fb832b4a5297305cf5a2c70dbe3acffbbd5e4e14caba872d2ab1ca882d51c063c0aec3c1db80c9df1b41bd24cd6e145a44a37aeecf402635a5be4887a9dc08d15b55866b18b88d7253d4b12315b935b27aa336e8c96110b157476ac33ad7299bdafa6a146152a83d11bdab07b45c10e1b2e7276cbd63eaf2de221adb71d4a8a4eff02f0bbc36b17cd051ac83268bb6b0b1956cc183705606306b52e9a5b006329be5dd25d3f101a6caa7b745c57085038860a87db62e7fd4c7369533df20902b380b8180cc09f7d67e1060e5e755df12b01d335cb6bb7f0a8dab683083b1608bf17acef41a71211cd86ad1921314a70768e8102b1f6a4246b39d377d9ef752482a8ff66ed01031d40e640785384a84f3fedb8bc317f660f0bce9e1c68cc5acbeda83d4c99aa7f00155ea1a41610bd342ae3d840d50cb548396f3617f01ce34f84a055481f2f8e4f0a9cae0aa8047327cf53ce3d5cd2eec2adf5b32069be955f539e1ce5a70475810a7caa4516a7c6e6707023112210b5629f831e681cab0804c0a424c658444729ad779225618dc20716a54527319a4043b40f52006652a55b587e92e52484ca8fee16cbaca3cacd4059d12c655b1709aeb60f8ddce6cfae3bd7d9aecbd3e62474939d1", 0x1000}, {&(0x7f0000000440)="8dfb65a65f6c7961e0a4b2fb8fbf3aed0cf6a3a7e0d296c7bc73bcfee88bf747daa6d22ac8c0c278f9ec290ae270a79ac468587ce21d7a54c167c79a6437a76203fdd757272bc0dbbcd079db909a80794e5d7a2baf33968038421decf187c43ff75c7e69d1", 0x65}, {&(0x7f0000001980)="19ef82d8de7c2dfda7c43b29f4bf3269ce665a4ba6dfa8b36d9e0377ecc0dae09976e63e6a0d515eddd82eff2087366dfd8be2cca669f0406be4125387f69815f77482c17252d2a32bdf2f15cac40d92ebea726bb655b4f0de0bc4f084301ba6ab7917582001cc3220ad7cc6f0c06a2ca617570ff11835c09bdccf58bed2f7b358fdff454b2ff5a26547ae00072627a85aadaca80b00922a7ddb95a4a406a9212855266c54ac95e00e32eb56d66a28af135d7503a813e5c5a3bda83913a155071ec3a42850d131a74d0d42b807ee93b37aa0b6d0c12836", 0xd7}, {&(0x7f0000001a80)="f0b8255fd4a9d4952ffd309717c8f22e35e3d8a8f7cad3934e893c7581d558600e975e0cea510042cfc954210a769f824ef937c5c5fbf936c7eda9708f41a5af2d233a20df9dab141af783237d9f06b6c9926e5a90ea116e854b45f0459be3d0d6098be39e2cceed48ccad6df5b5ed29be962850903f05f8ca6ddbb4b4dd776d8e6c9ad815d8e76f8065cc36568324d756ca450523138a9b22e238cb8214659da3b9aac68d9919d0f6b242f8b31f169016b12718423f0c68a5c9ea9d9a7110cd4fb1311a4832fe83", 0xc8}], 0x7, &(0x7f0000001e80)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r2, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r7, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r10, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="1c00000000000000010000000200000068b0f4cb144b2a8e638777e3b04b015b8d0122d3ad72a237c4a47c44c8671890f4aacc8779c3b824f50b48a00979772dfa7874b73c31b8e49aa6caf393d135a2508f3e918d5517287366faaacbcf15d91663096132440d40", @ANYRES32=r12, @ANYRES32=0xee00, @ANYRES32=r14, @ANYBLOB='\x00\x00\x00\x00'], 0xc0, 0x20000000}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1a, 0x4, 0x93, &(0x7f0000000040)) 810.673793ms ago: executing program 2 (id=7419): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x33, &(0x7f00000000c0)=[{}], 0x8, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x10001, 0x4, 0xfffffff8, 0x800, 0xffffffffffffffff, 0x8001, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1, 0x1, 0x9}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb1, &(0x7f0000000580)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x90, 0x8, 0x8, &(0x7f0000000640)}}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x195}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x2}, @alu={0x4, 0x1, 0x6, 0x7, 0x0, 0x7fffffffffffff50}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffa}, @cb_func={0x18, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5d, 0x6d, &(0x7f0000000440)=""/109, 0x41000, 0xa, '\x00', r2, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x4, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000800), &(0x7f0000000840)=[{0x1, 0x4, 0xa, 0xb}, {0x2, 0x4, 0x6, 0x2}, {0x2, 0x4, 0x0, 0xe}, {0x5, 0x2, 0x3, 0x4}, {0x4, 0x4, 0x10, 0x6}], 0x10, 0x8}, 0x90) r4 = openat$cgroup(r1, &(0x7f0000000980)='syz1\x00', 0x200002, 0x0) r5 = perf_event_open$cgroup(&(0x7f00000009c0)={0x0, 0x80, 0x81, 0x9, 0x69, 0x17, 0x0, 0x7, 0x90000, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0xe5a9dcb, 0x7ff}, 0x1000a, 0x0, 0x9cd2, 0x2, 0xf6d5, 0xaa, 0xff, 0x0, 0x8000, 0x0, 0x188000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a80)={0x0, r5, 0x0, 0xa, &(0x7f0000000a40)='syzkaller\x00'}, 0x30) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000ac0)={0xffffffffffffffff}) r7 = openat$cgroup_devices(r4, &(0x7f0000000b00)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r7, &(0x7f0000000b40)={'a', ' *:* ', 'rwm\x00'}, 0xa) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x7, 0x0, 0x1, 0x5, '\x00', r0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000e00)={{r1, 0xffffffffffffffff}, &(0x7f0000000d80), &(0x7f0000000dc0)=r3}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000e40)={&(0x7f0000000c00)="614b31ea71db7757758d90644921cebc9acb4e0bad99b47c6f24", &(0x7f0000000c40)=""/125, &(0x7f0000000cc0)="ad9e7479f2b96d41ea76d1050f6f22ec5c0e9ae03e994314f5fd42f2c532b9d5167f84e51564b46bec548d98b638816d49e327b248a3899e7be18bc839bcf94393236454785f17eb4e2c7c616ed8c1d3dba3a349dfbc07dae9b995762506a3bfd5678c990dea5e4cc9e2f6be1dc6173bf9819d1fdc9782145208", &(0x7f0000000d40)="e528023c6bbb30f322a9c44e51be4d29933d043f10417f47bd04ef", 0xc3dd, r9}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f00)={r9, 0x58, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001040)={&(0x7f0000000f40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1, 0xffffffff}}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x68, 0x2}, @ptr={0x10, 0x0, 0x0, 0x2, 0x1}, @fwd={0x10}, @const={0x3}, @restrict={0x4, 0x0, 0x0, 0xb, 0x4}, @ptr={0x1, 0x0, 0x0, 0x2, 0x2}, @union={0x5, 0x1, 0x0, 0x5, 0x0, 0x6, [{0x2, 0x1}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x0, 0x2e, 0x2e]}}, &(0x7f0000001000)=""/57, 0x9c, 0x39, 0x0, 0xf}, 0x20) r13 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001080)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6, '\x00', r11, r12, 0x0, 0x1, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001300)={r12, 0x20, &(0x7f00000012c0)={&(0x7f0000001100)=""/236, 0xec, 0x0, &(0x7f0000001200)=""/137, 0x89}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001540)={r12, 0x20, &(0x7f0000001500)={&(0x7f0000001340)=""/175, 0xaf, 0x0, &(0x7f0000001400)=""/223, 0xdf}}, 0x10) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001700)={&(0x7f0000001580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x5, [@const={0x5, 0x0, 0x0, 0xa, 0x2}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}, @var={0xa, 0x0, 0x0, 0xe, 0x4}, @ptr={0x9, 0x0, 0x0, 0x2, 0x4}, @var={0x3, 0x0, 0x0, 0xe, 0x5, 0x1}, @fwd={0x5}, @var={0x4, 0x0, 0x0, 0xe, 0x2, 0x1}, @int={0x1, 0x0, 0x0, 0x1, 0x0, 0x7d, 0x0, 0x7f, 0x1}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000001640)=""/130, 0x8d, 0x82, 0x1, 0x95}, 0x20) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=@bloom_filter={0x1e, 0x5, 0x5, 0xff, 0x800, r8, 0x1, '\x00', r11, r14, 0x5, 0x0, 0x0, 0xb}, 0x48) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000017c0)={r10, 0x1000, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001880)={{r16, 0xffffffffffffffff}, &(0x7f0000001800), &(0x7f0000001840)}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001a40)={0x6, 0x0}, 0x8) r19 = bpf$ITER_CREATE(0x21, &(0x7f0000001a80)={r8}, 0x8) r20 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b00)=@o_path={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x4000, r13}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001b80)={0x13, 0x9, &(0x7f00000018c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @exit, @map_fd={0x18, 0x9, 0x1, 0x0, r17}, @alu={0x7, 0x1, 0x3, 0xb, 0x6, 0xfffffffffffffff0, 0xfffffffffffffff0}]}, &(0x7f0000001940)='syzkaller\x00', 0x1, 0x71, &(0x7f0000001980)=""/113, 0x41100, 0x3, '\x00', r0, 0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001a00)={0x2, 0x10, 0x2, 0x101}, 0x10, r18, 0xffffffffffffffff, 0x0, &(0x7f0000001b40)=[r8, r9, r1, r19, r20, r15, r13, r13, r15, 0x1], 0x0, 0x10, 0x8}, 0x90) mkdirat$cgroup(r6, &(0x7f0000001c40)='syz0\x00', 0x1ff) write$cgroup_int(r19, &(0x7f0000001c80)=0x9, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f40)={0x18, 0x19, &(0x7f0000001cc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7c9, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0xff, 0x4, 0x5, 0xe695, 0xfffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @printk={@d}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x4, 0x33, &(0x7f0000001e00)=""/51, 0x41000, 0xaa7aa24b76cb6b15, '\x00', r11, 0x0, r14, 0x8, &(0x7f0000001e40)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001e80)={0x4, 0xb, 0xcf1, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001ec0), &(0x7f0000001f00)=[{0x2, 0x3, 0x4, 0xb}], 0x10, 0x4ec}, 0x90) recvmsg$unix(r19, &(0x7f0000003440)={&(0x7f0000002000)=@abs, 0x6e, &(0x7f0000003280)=[{&(0x7f0000002080)=""/126, 0x7e}, {&(0x7f0000002100)=""/190, 0xbe}, {&(0x7f00000021c0)=""/189, 0xbd}, {&(0x7f0000002280)=""/4096, 0x1000}], 0x4, &(0x7f00000032c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x150}, 0x80) 748.365458ms ago: executing program 0 (id=7420): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x0, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x200000000000000, 0x4, 0x0, 0x0, 0x3d035cc1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) (async) close(r3) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x19}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) (async) r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x6}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000001000000851000000600000018140000", @ANYRES32=r6, @ANYBLOB="00000000000000003500000000000000180000000000000000000000000000009500000000000000360a000000000000180200002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000720afbff0000000485000000060000009500000000000000d582a27ce32b3947c7c45798672fcaf17e2b51e4404c630e959cc93ee9330cfe642b3f8ba76956f1fc3004640135562bf8621156cc6699e3075b151c08388c0ca3aeff2b52cdca7798f1354cf55fc4a3dcec3062ac8d686ad3dd8a4b4a7fda190a97bea718"], &(0x7f0000000000)='GPL\x00', 0x2, 0xdd, &(0x7f0000000340)=""/221}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x3a}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc4, &(0x7f0000000500)=""/196}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES8=r0, @ANYRESOCT=r7], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) 701.457912ms ago: executing program 2 (id=7421): r0 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000840)=r0, 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000002ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000000900)=""/4090, 0xffa}, {&(0x7f0000001900)=""/245, 0xf5}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x3, &(0x7f0000002a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}, 0x40) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x26e1, 0x0) recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000040), 0x6e, &(0x7f0000000380)=[{&(0x7f0000000100)=""/213, 0xd5}, {&(0x7f0000000200)=""/57, 0x39}], 0x2, &(0x7f0000001a00)=[@rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x1d8}, 0x2020) setsockopt$sock_attach_bpf(r1, 0x1, 0x14, &(0x7f00000000c0), 0x43) recvmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYRES64=r3], &(0x7f0000000180)=""/179, 0x51, 0xb3, 0x1, 0x9}, 0x20) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xb, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x5}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000080000000000850000009700000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200b7bd220600b703000000000000850000009b0000009500000000000000"], &(0x7f0000000240)='syzkaller\x00'}, 0x90) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x80, 0x57c, 0x0, 0x0, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) close(r5) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x200000000000000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000071115f00000000008510000002000000850000000000000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) close(r2) 700.634782ms ago: executing program 3 (id=7422): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=0x0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095", @ANYRES64=r3], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) socketpair(0x1d, 0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='itimer_state\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x248, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r7}, 0x0, &(0x7f0000000040)}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0xc8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 699.823342ms ago: executing program 3 (id=7423): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000000000fc850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r4 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) r5 = gettid() write$cgroup_pid(r4, &(0x7f00000002c0)=r5, 0x12) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x4400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8943, &(0x7f0000000080)) 687.752723ms ago: executing program 1 (id=7424): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400e100000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = syz_clone(0x60021100, &(0x7f00000004c0)="3cae87bb16553a35be0ed18fb6a4aedf2373574878c9810afd1f0faaac0b6cc15bc51ffcac12de3e7dccc85c882eb20c9eaa4fa852020ef10b54fc3b4c31a2ae0f0426710c59e6f48e1b33f8d10cb19c2dd0a58dcd576ff3b2f1fdba6e4458df4af69bd2a62860de7cccdab05a39d439a5bfd080b55cd988d649720af0b0b52eb641f2557709011f2ac80e1f1cf03be27c048ec5320836a2b617af880fae08401d164ed3c96e395032f4eb71a4bc0859476c10ff69e9037d9bcaaf0b9dbf2410ce2c4a6764c94e573bb0b5b366c6e75ea9", 0xd1, &(0x7f00000003c0), &(0x7f00000005c0), &(0x7f0000000600)="e4c7a0e3a6b276626642b0d707ae77a90fe97dd4d0417aa9fa3121c124fb975647187ce9381f29cda5921865c728645a87db212200171dede24e10c9671dc421eec83b9d395a790712f9ceeb786c48e905ccfa65bcf8011a4573231f0f4745d97360b1d66d68f0865491803508edb45d22072c747caa40691d284a6599185ce6dae708be9428cedd185a3a8cd7f8fefa52717adb86e83239c667d61210859617310206b85eab51411a857debd25313a6bd5ab31b8eee280e1024fccab1") syz_open_procfs$namespace(r1, &(0x7f00000006c0)='ns/pid\x00') (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) (async) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) recvmsg(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/249, 0xf9}], 0x1}, 0x0) close(r4) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000740)='fdb_delete\x00', r6}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000700)={'pim6reg1\x00', 0x7101}) (async, rerun: 32) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 32) close(r9) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) ioctl$SIOCSIFHWADDR(r9, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) 678.319664ms ago: executing program 0 (id=7425): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000cc0)={r0, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="83eb01001800000000020000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a021c030300000000000009030000000f0000000400000f01000000000000000100000006000000040000008b000000010000000400000001000100070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000d00)=ANY=[@ANYBLOB="83eb01001800000000020000690000006900000005000000030000000000000e00000000010000000100000000000001000000001a021c030300000000000009030000000f0000000400000f01000000000000000100000006000000040000008b000000010000000400000001000100070000000100000002000000000000000700000000305f0000"], &(0x7f0000000dc0)=""/93, 0x89, 0x5d, 0x1, 0x7}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x40, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x2, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x40, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000e80)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x2, &(0x7f0000000f80), &(0x7f0000000fc0)=[{0x2, 0x3, 0xe, 0x5}, {0x5, 0x4, 0x4, 0x1}]}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], &(0x7f0000000580)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8913, &(0x7f0000000040)={'macsec0\x00', @random="a64beb939b96"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000003c0)='workqueue_queue_work\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, &(0x7f0000000840)='GPL\x00', 0x916f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, 0x0, &(0x7f0000000840)='GPL\x00', 0x916f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 596.39185ms ago: executing program 3 (id=7426): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, 0x2}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000150000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a0000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000007301"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r5}, 0x10) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 595.16183ms ago: executing program 2 (id=7427): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) r2 = getpid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x58, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x18, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x4, 0xb, 0x4, 0x4, 0x4}, @exit, @jmp={0x5, 0x1, 0x6, 0xa, 0xa, 0xfffffffffffffff0, 0x10}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x6}, @alu={0x7, 0x0, 0x9, 0x9, 0x4, 0x50, 0xfffffffffffffff0}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc17}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000180)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x41100, 0x44, '\x00', r3, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x0, 0xb, 0x647, 0x100}, 0x10, 0x0, 0x0, 0x4, 0x0, &(0x7f00000002c0)=[{0x1, 0x2ec4, 0x5, 0x3}, {0x5, 0x4, 0x0, 0x2}, {0x3, 0x2, 0x6, 0x7}, {0x1, 0x5, 0x4, 0x6}], 0x10, 0x9b}, 0x90) write$cgroup_subtree(r1, &(0x7f00000003c0)={[{0x2d, 'cpu'}, {0x2d, 'rlimit'}, {0x2d, 'perf_event'}]}, 0x19) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x4, 0x8, 0xfffffffb, 0x500, r1, 0x77ab, '\x00', r3, r1, 0x0, 0x1}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r1, 0x20, &(0x7f0000000580)={&(0x7f0000000480)=""/44, 0x2c, 0x0, &(0x7f00000004c0)=""/160, 0xa0}}, 0x10) r6 = openat$cgroup_ro(r1, &(0x7f0000000600)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000640)='\x00') r7 = openat$cgroup_ro(r1, &(0x7f0000000680)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg(r6, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000006c0)=""/73, 0x49}, {&(0x7f0000000740)=""/100, 0x64}, {&(0x7f00000007c0)=""/129, 0x81}, {&(0x7f0000000880)=""/112, 0x70}, {&(0x7f0000000900)=""/118, 0x76}, {&(0x7f0000000980)=""/165, 0xa5}], 0x6, &(0x7f0000000ac0)=""/145, 0x91}, 0x40000000) write$cgroup_subtree(r7, &(0x7f0000000bc0)={[{0x2b, 'io'}, {0x2b, 'cpu'}, {0x2d, 'hugetlb'}]}, 0x12) ioctl$TUNSETVNETBE(r6, 0x400454de, &(0x7f0000000c00)) mkdir(&(0x7f0000000c40)='./file0\x00', 0x20) sendmsg$inet(r7, &(0x7f0000000e00)={&(0x7f0000000c80)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000d80)=[{&(0x7f0000000cc0)="cb766d5583ae65b19f54297d4e38b4a53899e6cd92cec36fb46bdbc7d812ae971b8d8aadfe478911b03ea162e816762e43ebd962f5debcc701af412cc58a4a60c4e622dde98fe092f9d3d9052d8eaa5bd725366838bc6bf7c14e82d6fdaff1f49cce2ffff7587a", 0x67}, {&(0x7f0000000d40)="6241057eded06fe3889f98a59903f989a84f0b2ee49af5917beb24dfe686c5f674dbee1a97d893a367", 0x29}], 0x2, &(0x7f0000000dc0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010100, @rand_addr=0x64010101}}}], 0x20}, 0x4008804) r8 = openat$cgroup_int(r1, &(0x7f0000000e40)='memory.min\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001180)={{r7, 0xffffffffffffffff}, &(0x7f0000001100), &(0x7f0000001140)=r1}, 0x20) sendmsg$unix(r1, &(0x7f0000001240)={&(0x7f0000000ec0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000010c0)=[{&(0x7f0000000f40)="65d674cc19a78ce4a403b0985c0e2a508fd7f75a13cbc0a5b74b712e5b8b1dc8b4ade28f5c20d1f5544863e0225c69f3d2b9096d2eb6719d5ba1ed15452d3b7ee8171afefb1a044f764f8128bc8f3d0a3078a9a463f2b83e9ee74837eec0fe43212e4be349f7fbfb8abc9066910eec93166985b23a04517e002d903e3f1a86496009df7d36da98d301805756e65582914ff7abc456b5582e2e5b4a46f60779615d2aed74daa0f4271a9f47992314f1f987dc85beca2902ee69b31080a7e5808f89a0144a929aceafe11984dfbbc44030c449e8faf9a78b1f9d172056cba161de520aee", 0xe3}, {&(0x7f0000001040)="60ad3a71336fc827b837176faca8bd16e4d2d9237497c20f461bcd324452490dff5ce963ae4a16bacd01a36337a16b17cdb31844e882533f148a4cc1851fd4cbabcebd58954f980f201b51192943463e524b9f09cc996b", 0x57}], 0x2, &(0x7f00000011c0)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r0, r9, r4, r1, r0]}}, @rights={{0x1c, 0x1, 0x1, [r0, r0, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r8, r10]}}], 0x80, 0x44010}, 0x2000c890) bpf$PROG_BIND_MAP(0x23, &(0x7f0000001280)={r7, r10}, 0xc) r11 = openat$cgroup_ro(r1, &(0x7f00000012c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001580)={r4, 0x0, 0x95, 0xea, &(0x7f0000001300)="5ccaa9041491e373433b0f5fbbcb7d9cc5aca4f0512af66dbab35e6ab5ada26ef41d9332680eee8e8595d1566c149e879b86a16566d380a499cb8c83944402591346a2c80297f4e9ab29986c7b43b029d764d95dc605b4e9037700ea9703c6ba6253a51451ef7303fce90f8a88a3fe6c78068bb0149da55c699cc7169816154a89cf42c33ca39ccb421f9d9f3b4c6ce82ec9083aa6", &(0x7f00000013c0)=""/234, 0x6, 0x0, 0x67, 0x3b, &(0x7f00000014c0)="bfbe739653408898600df91b251b76222afe49c0421c303a30e7e47b1f761b887afaf1ad3bd51248ec5e56ba815e758913f40ce51291bd5a6a8be809d78878fcb15938c39e9d89d90569fb8faa35d8272296b1fcf2770029a379ec74d37332c8c3c4ad2c52f5a3", &(0x7f0000001540)="9b940eb37609aaf63a1db4f3bc373bd3f17580922a93a454fcc4149dfae80d518c8c82de4c6fb2b510ebc577ba57fb8de27f3405b72b59549d2905", 0x0, 0x0, 0x5bae}, 0x50) perf_event_open(&(0x7f0000001600)={0x5, 0x80, 0x5, 0x2, 0x9, 0x6, 0x0, 0xe, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x5, @perf_config_ext={0x9, 0x1e}, 0x2080, 0x80, 0xe39, 0x8, 0x6, 0x1, 0x17, 0x0, 0x8, 0x0, 0x8000000000000000}, r2, 0xf, r11, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001940)={r7, 0xe0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f00000016c0)=[0x0, 0x0, 0x0], &(0x7f0000001700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x54, &(0x7f0000001740)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000001780), &(0x7f00000017c0), 0x8, 0x18, 0x8, 0x8, &(0x7f0000001800)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001980)=r12, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000019c0)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001a00)=r5, 0x4) syz_open_procfs$namespace(r2, &(0x7f0000001a40)='ns/cgroup\x00') 508.947058ms ago: executing program 3 (id=7428): openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x7, 0xfff, 0x9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x0, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r6 = syz_clone(0xa004000, &(0x7f0000001b80), 0x0, &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000002d00)="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") bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_open_procfs$namespace(r6, &(0x7f0000000180)='ns/user\x00') bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)) 495.004309ms ago: executing program 1 (id=7429): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3}, {0x61}, {}, {}, {0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0xffff, [{0x0, 0x1, 0x2}]}]}}, 0x0, 0x3e}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_type(r8, &(0x7f0000000340), 0x9) r9 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000bc0)=ANY=[@ANYBLOB="18081c02000000000000000000200000181100007fac5cee6418508b50d84d3dffffffffffffffffff1559cb1f11e8f100ada909d601b071fa94461976cbeea1eeda86f98b355b8ff3f7f35ad776f40a87ef992e69ac68bba962ef2949c26ca9e6a09e6f4e49cfa9ba476abc33a78f2228ba3f240ab57990349b06004c837af0deae5bb03aba9ebbdf8ac3eadd9601e53758a618fa997196324257c5a071b4d27db6e1eae34e3f6300fc0814312a634c8827ec969817f9504aefd9272251985b01e1f300000000", @ANYRES8=r6, @ANYBLOB="c3b1323850b87087582421d093e7faf1d7e2c3c2f99d13e951986bb5cb6647ff4d0a5cc9af83e309a0308ae113d2e3fbc1079064b6029d0ff26ebb9f9e955033f2078a46fddb94583890530b9ecc8dccfe4c3de5e78ad26018372ff4b3300ac29b432abb30f455ca7efbafe19ec0c16bef0106419eaa86a4b33c4d6a547a1d92bf3452c8cea4978019ea0d94dfc83c43e188df1b6adf8cc3dcc2017774329e49afbf78304079f45cd3614a5226b4618164decaf49182f538efbc8a71649896562c678877c86e02c7f70341b18743b7512aac82272b37452f00c7c27b45e794e9e01d2e01f811cff8b34a73df0683814593a6674a5c752880f0f2a56448ba", @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000000000000b7000000000000009500000000000000", @ANYRES8, @ANYRES16=r5], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='cachefiles_tmpfile\x00'}, 0x10) 365.290539ms ago: executing program 2 (id=7430): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x5, 0x3, 0x9, 0x200a, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0xe40, 0x1, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000044700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000004, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000, 0x0, 0x25, &(0x7f0000000040)="ded6e0966ec1cf6ba4b897a54e4e062b311453dcbb62932a01105d0a8066ca8e5e1f2f575d0d6e996b57fd408d420abb7337934e59815d75b4eb3e7206afce", &(0x7f0000000380)="af5fa441b438b5156d8a9fcc090f586e979858f64170cde36889dcc8539ffcca62621a4c3ea3f7acee366e6fb0b94314f90931dec60fed6c9fee64af416c29f65e47110b81f6b4da06db5e1aad1f627acb", 0x0, 0x3}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, 0x0, 0x4a}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x40000, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, 0x0) 364.644599ms ago: executing program 4 (id=7431): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x6, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0xf, &(0x7f0000000680)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 356.31227ms ago: executing program 4 (id=7432): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x23, 0x10000, 0x0, 0x1200, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0xb}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x23, 0x10000, 0x0, 0x1200, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0xb}, 0x48) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7280000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00\x00') ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) 253.165009ms ago: executing program 1 (id=7433): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="180000000000000000000000000000009500160000000000e2bac15d3b6641a215f099e26603a050337b2ccc70a9f928ba3c529bb6e7365e7e246317380f5884d79663e7fcaa89795d7b10e88378c33265a7af06040e3d0bbc6a5864dfa023c6ac1da574242785bbb4ece12b11da52496875e1e384042aad63a3094bf3bc0e40a79960f9f1610940e67e30611d9873d1e6cb9c4cce44c999c49ff52a6400192fd021d7158438d7686a6f66778022c93c544189b684754e7e0f77a4f498609e53104c8aa70632fcc58c757bbc06f6472622dce2729d7296959ce003ec84acd015e352484c42fc29e5aea62fb7977813f7254fd6f62fec638abf292e6c33925b29"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) (async) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x4801, 0x0) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000280)={'hsr0\x00', 0x200}) 0s ago: executing program 1 (id=7434): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0xe, 0x5a, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x6, 0x8e, &(0x7f0000003300)=""/142, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xfffffd26) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000380), 0x20000000}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018118000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='sched_switch\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x2, 0x4, 0x0, 0xbaa}, 0x48) (async) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r4, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x9, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x8, 0xf7, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001600)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffff057}, 0x10}, 0x90) kernel console output (not intermixed with test programs): batadv_slave_0: link becomes ready [ 131.223397][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.231989][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.240401][ T3544] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.247265][ T3544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.255007][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.263359][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.271927][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.280212][ T3544] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.287078][ T3544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.294828][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 131.345322][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.368308][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.395498][ T4877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.442919][ T6374] device veth0_vlan entered promiscuous mode [ 131.507995][ T3539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.516089][ T3539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.568872][ T3539] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.747779][ T6374] device veth1_macvtap entered promiscuous mode [ 131.757059][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 131.765019][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.785030][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.823844][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.834172][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.849249][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.866210][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.578427][ T6448] device vlan1 entered promiscuous mode [ 133.227360][ T6465] device veth1_to_bridge entered promiscuous mode [ 134.384280][ T6563] device pim6reg1 entered promiscuous mode [ 134.727774][ T6570] device pim6reg1 entered promiscuous mode [ 136.279639][ T6657] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.286523][ T6657] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.293959][ T6657] device bridge_slave_0 entered promiscuous mode [ 136.300898][ T6657] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.345347][ T6657] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.353006][ T6657] device bridge_slave_1 entered promiscuous mode [ 136.537818][ T6657] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.544685][ T6657] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.551797][ T6657] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.558581][ T6657] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.733909][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.746128][ T3544] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.769521][ T3544] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.801726][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.827298][ T3544] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.834170][ T3544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.903972][ T3544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.946508][ T3544] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.953485][ T3544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.984766][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.996087][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.012964][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 137.080098][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.103788][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 137.120987][ T535] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.161310][ T6657] device veth0_vlan entered promiscuous mode [ 137.187864][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 137.200406][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.231526][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.262436][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.294708][ T718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 137.304250][ T718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.325246][ T6657] device veth1_macvtap entered promiscuous mode [ 137.342545][ T718] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 137.350806][ T718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 137.360059][ T718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.385644][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 137.397302][ T720] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.432007][ T6686] device team_slave_1 entered promiscuous mode [ 137.469488][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 137.489271][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 137.561015][ T6700] device veth1_macvtap left promiscuous mode [ 137.712040][ T6713] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 139.449872][ T6804] device syzkaller0 entered promiscuous mode [ 139.592412][ T6813] device veth1_macvtap left promiscuous mode [ 140.237451][ T6856] bridge0: port 3(veth0_to_batadv) entered disabled state [ 140.245914][ T6856] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.254338][ T6856] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.564135][ T6866] device pim6reg1 entered promiscuous mode [ 140.695364][ T6872] device veth1_macvtap left promiscuous mode [ 140.744733][ T6879] device wg2 left promiscuous mode [ 140.777049][ T6879] device wg2 entered promiscuous mode [ 141.530933][ T6927] syz.3.1787[6927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.531014][ T6927] syz.3.1787[6927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 141.565029][ T6916] device pim6reg1 entered promiscuous mode [ 141.717962][ T6934] tap0: tun_chr_ioctl cmd 1074025675 [ 141.767156][ T6934] tap0: persist enabled [ 141.846045][ T6937] tap0: tun_chr_ioctl cmd 1074025675 [ 141.907128][ T6937] tap0: persist disabled [ 142.136270][ T6945] device pim6reg1 entered promiscuous mode [ 142.952318][ T6981] device syzkaller0 entered promiscuous mode [ 143.072352][ T6990] device sit0 entered promiscuous mode [ 143.847695][ T7056] device syzkaller0 entered promiscuous mode [ 144.823158][ T7169] device syzkaller0 entered promiscuous mode [ 145.167984][ T7185] device pim6reg1 entered promiscuous mode [ 145.720903][ T7227] device sit0 entered promiscuous mode [ 146.334428][ T7246] device syzkaller0 entered promiscuous mode [ 146.547189][ T7270] device wg2 entered promiscuous mode [ 147.261585][ T7299] device syzkaller0 entered promiscuous mode [ 147.311919][ T7302] device pim6reg1 entered promiscuous mode [ 149.913812][ T7434] syz.4.1928[7434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.913881][ T7434] syz.4.1928[7434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.174728][ T7453] device syzkaller0 entered promiscuous mode [ 150.283935][ T7448] device pim6reg1 entered promiscuous mode [ 151.647992][ T7517] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.654968][ T7517] bridge0: port 1(bridge_slave_0) entered disabled state [ 151.704623][ T7517] device bridge_slave_1 left promiscuous mode [ 151.711608][ T7517] bridge0: port 2(bridge_slave_1) entered disabled state [ 151.720778][ T7517] device bridge_slave_0 left promiscuous mode [ 151.727166][ T7517] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.221037][ T7537] device pim6reg1 entered promiscuous mode [ 153.642011][ T7612] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.649038][ T7612] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.678382][ T7612] device bridge_slave_1 left promiscuous mode [ 153.708076][ T7612] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.722489][ T7612] device bridge_slave_0 left promiscuous mode [ 153.728615][ T7612] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.808229][ T7638] device team_slave_1 entered promiscuous mode [ 153.815118][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 153.887015][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 154.050446][ T7659] device syzkaller0 entered promiscuous mode [ 154.320494][ T7683] device sit0 entered promiscuous mode [ 155.004856][ T7705] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.011898][ T7705] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.045713][ T7704] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.052648][ T7704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.061138][ T7704] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.068085][ T7704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.083094][ T7704] device bridge0 entered promiscuous mode [ 155.213087][ T7720] device wg2 left promiscuous mode [ 156.644018][ T24] audit: type=1400 audit(1722067618.820:170): avc: denied { create } for pid=7776 comm="syz.3.2021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 156.652725][ T7777] device veth1_to_batadv entered promiscuous mode [ 156.707616][ T7782] syz.0.2022[7782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.709821][ T7782] syz.0.2022[7782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.106983][ T7825] device pim6reg1 entered promiscuous mode [ 157.125702][ T7824] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.133647][ T7826] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.140526][ T7826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.566173][ T7850] device syzkaller0 entered promiscuous mode [ 158.975238][ T7897] device syzkaller0 entered promiscuous mode [ 159.971594][ T7925] device sit0 entered promiscuous mode [ 160.627469][ T7969] device sit0 entered promiscuous mode [ 161.060159][ T7984] bridge_slave_0: mtu greater than device maximum [ 162.986215][ T8107] device syzkaller0 entered promiscuous mode [ 163.101548][ T8115] device sit0 left promiscuous mode [ 163.320798][ T8114] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.433697][ T8114] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.446745][ T24] audit: type=1400 audit(1722067625.630:171): avc: denied { create } for pid=8120 comm="syz.0.2117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 163.534290][ T8114] device bridge_slave_0 entered promiscuous mode [ 163.635545][ T8114] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.667826][ T24] audit: type=1400 audit(1722067625.650:172): avc: denied { write } for pid=8131 comm="syz.1.2119" name="cgroup.subtree_control" dev="cgroup2" ino=305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 163.711965][ T8114] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.720442][ T8114] device bridge_slave_1 entered promiscuous mode [ 163.736975][ T24] audit: type=1400 audit(1722067625.650:173): avc: denied { open } for pid=8131 comm="syz.1.2119" path="" dev="cgroup2" ino=305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 164.232109][ T8165] device syzkaller0 entered promiscuous mode [ 164.611380][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.661207][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.801738][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.835244][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.916199][ T1447] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.923087][ T1447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.073309][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.117469][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.193030][ T1447] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.199914][ T1447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.343735][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.351572][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.368692][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.385612][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.424696][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.502825][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 165.511755][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 165.562693][ T8114] device veth0_vlan entered promiscuous mode [ 165.589350][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 165.607310][ T8205] syz.1.2138[8205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.607382][ T8205] syz.1.2138[8205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.619170][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 165.681384][ T8114] device veth1_macvtap entered promiscuous mode [ 165.710164][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 165.718638][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 165.725988][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.734488][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.742898][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.754353][ T8210] device veth1_macvtap left promiscuous mode [ 165.760863][ T8210] device macsec0 left promiscuous mode [ 165.823488][ T8214] device veth1_macvtap entered promiscuous mode [ 165.832448][ T8214] device macsec0 entered promiscuous mode [ 165.841063][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.849696][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.868736][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.879570][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.792672][ T8255] device syzkaller0 entered promiscuous mode [ 167.058254][ T8306] syz.3.2162[8306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.058310][ T8306] syz.3.2162[8306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.407507][ T8330] bridge_slave_0: mtu greater than device maximum [ 169.729307][ T8462] device syzkaller0 entered promiscuous mode [ 169.996384][ T8497] device syzkaller0 entered promiscuous mode [ 171.205168][ T8555] device syzkaller0 entered promiscuous mode [ 171.666841][ T8579] device sit0 left promiscuous mode [ 171.724209][ T8579] device sit0 entered promiscuous mode [ 172.025802][ T8602] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.032701][ T8602] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.039888][ T8602] device bridge0 left promiscuous mode [ 172.365406][ T8630] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.372377][ T8630] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.382836][ T8630] device bridge_slave_0 entered promiscuous mode [ 172.390871][ T8630] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.398913][ T8630] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.406439][ T8630] device bridge_slave_1 entered promiscuous mode [ 172.464001][ T8630] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.470879][ T8630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.477987][ T8630] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.484744][ T8630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.514698][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.522743][ T15] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.530161][ T15] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.545804][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.555104][ T3014] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.561976][ T3014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.577867][ T627] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.587084][ T627] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.593920][ T627] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.604137][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.623813][ T8630] device veth0_vlan entered promiscuous mode [ 172.630793][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 172.642890][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 172.651224][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 172.659030][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 172.669658][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.687515][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 172.711113][ T8657] device syzkaller0 entered promiscuous mode [ 172.719353][ T8659] device pim6reg1 entered promiscuous mode [ 172.742841][ T8630] device veth1_macvtap entered promiscuous mode [ 172.753211][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 172.763217][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 173.638851][ T478] device veth0_vlan left promiscuous mode [ 176.511547][ T8848] device syzkaller0 entered promiscuous mode [ 177.837202][ T8899] device syzkaller0 entered promiscuous mode [ 177.855408][ T8899] device pim6reg1 entered promiscuous mode [ 179.062154][ T8942] ªªªªªª: renamed from vlan0 [ 179.071331][ T8941] device pim6reg1 entered promiscuous mode [ 179.519645][ T8959] syz.3.2355[8959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.519717][ T8959] syz.3.2355[8959] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.335220][ T8986] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.353431][ T8986] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.361153][ T8986] device bridge_slave_0 entered promiscuous mode [ 180.368270][ T8986] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.375171][ T8986] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.382560][ T8986] device bridge_slave_1 entered promiscuous mode [ 180.465357][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.472976][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.490923][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.499151][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.508263][ T15] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.515121][ T15] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.522751][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.531521][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 180.539833][ T15] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.546669][ T15] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.564970][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.572469][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 180.580746][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.596501][ T8986] device veth0_vlan entered promiscuous mode [ 180.603553][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.612441][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.620565][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.628830][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.644623][ T8986] device veth1_macvtap entered promiscuous mode [ 180.651964][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.667213][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.675558][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.186577][ T9035] device sit0 entered promiscuous mode [ 181.192655][ T9035] device veth1_macvtap left promiscuous mode [ 181.199304][ T9035] device macsec0 entered promiscuous mode [ 181.236062][ T24] audit: type=1400 audit(1722067643.410:174): avc: denied { getattr } for pid=9036 comm="syz.4.2377" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 181.955261][ T9077] device syzkaller0 entered promiscuous mode [ 182.728475][ T9135] syz.2.2406[9135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.728541][ T9135] syz.2.2406[9135] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.305043][ T9156] IPv6: sit1: Disabled Multicast RS [ 183.518547][ T9177] syz.2.2419[9177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 183.518604][ T9177] syz.2.2419[9177] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.178637][ T9236] device sit0 left promiscuous mode [ 184.231087][ T9236] device sit0 entered promiscuous mode [ 184.322412][ T9207] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.333254][ T9207] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.343572][ T9207] device bridge_slave_0 entered promiscuous mode [ 184.350957][ T9207] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.363403][ T9207] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.374320][ T9207] device bridge_slave_1 entered promiscuous mode [ 184.449375][ T9262] device syzkaller0 entered promiscuous mode [ 184.500377][ T9207] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.507259][ T9207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.514332][ T9207] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.521131][ T9207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.591801][ T1447] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.607553][ T1447] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.627486][ T3043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.634725][ T3043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.721726][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.729910][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.738640][ T1447] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.745496][ T1447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.753146][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.761331][ T1447] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.772594][ T1447] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.779454][ T1447] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.833878][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.842159][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.883502][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.893300][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.004218][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 185.026035][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 185.073637][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 185.082341][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 185.092205][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 185.101249][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.165161][ T9207] device veth0_vlan entered promiscuous mode [ 185.182477][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 185.191778][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 185.263416][ T9207] device veth1_macvtap entered promiscuous mode [ 185.408029][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 185.415454][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 185.425090][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 185.441283][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 185.449737][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.914193][ T9353] device sit0 left promiscuous mode [ 185.954794][ T9353] device sit0 entered promiscuous mode [ 188.334490][ T619] device bridge_slave_1 left promiscuous mode [ 188.367925][ T619] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.457051][ T619] device bridge_slave_0 left promiscuous mode [ 188.520937][ T619] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.610833][ T619] device bridge_slave_1 left promiscuous mode [ 188.668603][ T619] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.869714][ T619] device bridge_slave_0 left promiscuous mode [ 188.875686][ T619] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.884856][ T619] device bridge_slave_1 left promiscuous mode [ 188.890898][ T619] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.898433][ T619] device bridge_slave_0 left promiscuous mode [ 188.904378][ T619] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.913182][ T619] device veth1_macvtap left promiscuous mode [ 188.919286][ T619] device veth0_vlan left promiscuous mode [ 188.925230][ T619] device veth1_macvtap left promiscuous mode [ 189.416274][ T24] audit: type=1400 audit(1722067651.590:175): avc: denied { create } for pid=9505 comm="syz.2.2514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 190.820097][ T9592] device syzkaller0 entered promiscuous mode [ 191.152121][ T9608] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.159135][ T9608] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.242248][ T9610] device bridge_slave_1 left promiscuous mode [ 191.248433][ T9610] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.255812][ T9610] device bridge_slave_0 left promiscuous mode [ 191.268177][ T9610] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.913989][ T9637] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.920993][ T9637] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.931449][ T9637] device bridge_slave_1 left promiscuous mode [ 191.947716][ T9637] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.954939][ T9637] device bridge_slave_0 left promiscuous mode [ 191.966647][ T9637] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.226983][ T9669] syz.2.2561[9669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.227037][ T9669] syz.2.2561[9669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.219406][ T9748] device veth1_macvtap left promiscuous mode [ 193.237422][ T9748] device macsec0 left promiscuous mode [ 193.323704][ T9750] device syzkaller0 entered promiscuous mode [ 195.055465][ T9859] device syzkaller0 entered promiscuous mode [ 196.090748][ T9910] device sit0 left promiscuous mode [ 196.261517][ T9912] syz.1.2635[9912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.261566][ T9912] syz.1.2635[9912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.897640][ T9975] device pim6reg1 entered promiscuous mode [ 197.380532][T10002] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 198.242636][T10039] device veth0_vlan left promiscuous mode [ 198.314513][T10039] device veth0_vlan entered promiscuous mode [ 198.404799][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.418204][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.425765][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.821701][T10150] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.836669][T10150] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.844463][T10150] device bridge_slave_0 entered promiscuous mode [ 199.866651][T10150] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.873793][T10150] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.881550][T10150] device bridge_slave_1 entered promiscuous mode [ 199.961561][T10150] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.968475][T10150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.975527][T10150] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.982340][T10150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.008817][ T4882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.016619][ T4882] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.024970][ T4882] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.049996][ T4882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.060631][ T4882] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.067506][ T4882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.075634][ T4882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.084397][ T4882] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.091282][ T4882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.114451][ T4882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.122412][ T4882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.141781][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.162135][T10150] device veth0_vlan entered promiscuous mode [ 200.179530][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.192425][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.200405][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.213631][T10150] device veth1_macvtap entered promiscuous mode [ 200.251426][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.310530][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.372473][ T4890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.532329][T10202] device sit0 left promiscuous mode [ 200.580410][T10202] device sit0 entered promiscuous mode [ 200.661680][T10209] device syzkaller0 entered promiscuous mode [ 202.121900][T10305] bridge0: port 3(veth0_to_batadv) entered blocking state [ 202.129164][T10305] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 202.137802][T10305] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.144731][T10305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.152385][T10305] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.159772][T10305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.406423][T10305] device bridge0 entered promiscuous mode [ 202.423952][T10319] syz.1.2749[10319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.424010][T10319] syz.1.2749[10319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.547038][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.655975][T10323] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.667381][T10323] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.674765][T10323] device bridge_slave_0 entered promiscuous mode [ 202.682217][T10323] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.696208][T10323] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.797503][T10323] device bridge_slave_1 entered promiscuous mode [ 203.072537][T10344] device syzkaller0 entered promiscuous mode [ 203.118854][T10323] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.125697][T10323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.132856][T10323] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.139699][T10323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.166820][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.184233][ T701] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.193223][ T701] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.211541][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.220939][ T701] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.227801][ T701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.239312][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.247800][ T701] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.254636][ T701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.277771][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.285960][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.293834][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.309310][ T4877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 203.317596][ T4877] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 203.324812][ T4877] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 203.333246][T10323] device veth0_vlan entered promiscuous mode [ 203.349943][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.359360][T10323] device veth1_macvtap entered promiscuous mode [ 203.369464][ T4877] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.383441][ T4877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 203.449218][T10376] syz.0.2765[10376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.449276][T10376] syz.0.2765[10376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.477490][T10379] syz.4.2766[10379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.477554][T10380] syz.4.2766[10380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.489627][T10379] syz.4.2766[10379] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.886613][T10399] device syzkaller0 entered promiscuous mode [ 203.917095][T10405] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.924125][T10405] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.947385][T10407] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.954342][T10407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.963024][T10407] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.970013][T10407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.980751][T10407] device bridge0 entered promiscuous mode [ 204.033126][T10410] device syzkaller0 entered promiscuous mode [ 204.437682][T10453] device wg2 entered promiscuous mode [ 204.866248][T10472] device syzkaller0 entered promiscuous mode [ 205.061503][T10489] device veth1_macvtap left promiscuous mode [ 205.139115][T10495] device wg2 entered promiscuous mode [ 205.154798][T10497] device sit0 entered promiscuous mode [ 205.983506][T10547] syz.3.2818[10547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.983556][T10547] syz.3.2818[10547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.475919][T10585] device sit0 entered promiscuous mode [ 207.544510][T10661] pim6reg: tun_chr_ioctl cmd 1074025677 [ 207.549905][T10661] pim6reg: linktype set to 780 [ 207.849190][T10685] device syzkaller0 entered promiscuous mode [ 208.006117][T10714] device sit0 left promiscuous mode [ 209.556591][T10792] device syzkaller0 entered promiscuous mode [ 210.083208][T10832] device pim6reg1 entered promiscuous mode [ 210.194184][T10842] device pim6reg1 entered promiscuous mode [ 210.281294][T10846] device pim6reg1 entered promiscuous mode [ 210.550473][ T7] device bridge_slave_1 left promiscuous mode [ 210.577018][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.652902][ T7] device bridge_slave_0 left promiscuous mode [ 210.714290][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.753382][ T93] udevd[93]: worker [2476] terminated by signal 33 (Unknown signal 33) [ 210.815088][ T93] udevd[93]: worker [2476] failed while handling '/devices/virtual/block/loop0' [ 210.854351][ T7] device veth0_vlan left promiscuous mode [ 210.908932][ T7] device veth1_macvtap left promiscuous mode [ 210.961175][ T7] device veth0_vlan left promiscuous mode [ 210.970147][ T7] device veth1_macvtap left promiscuous mode [ 211.036708][ T7] device veth0_vlan left promiscuous mode [ 211.769207][T10892] device sit0 left promiscuous mode [ 211.829769][T10892] device sit0 entered promiscuous mode [ 212.290480][T10918] device sit0 entered promiscuous mode [ 214.804546][T11075] device veth0_to_batadv left promiscuous mode [ 214.820704][T11075] bridge0: port 3(veth0_to_batadv) entered disabled state [ 214.845232][T11071] device syzkaller0 entered promiscuous mode [ 215.162276][T11108] device syzkaller0 entered promiscuous mode [ 215.527322][T11126] device syzkaller0 entered promiscuous mode [ 217.027687][T11193] device sit0 left promiscuous mode [ 217.336952][T11219] ªªªªªª: renamed from vlan0 [ 217.396079][T11223] device pim6reg1 entered promiscuous mode [ 218.224419][T11260] device wg2 entered promiscuous mode [ 218.255923][T11262] device veth0_vlan left promiscuous mode [ 218.262045][T11262] device veth0_vlan entered promiscuous mode [ 218.269331][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.280803][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.296681][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.773854][T11286] device syzkaller0 entered promiscuous mode [ 219.129779][T11303] device syzkaller0 entered promiscuous mode [ 219.588690][T11350] device sit0 left promiscuous mode [ 219.678712][T11352] device pim6reg1 entered promiscuous mode [ 220.176472][T11389] device pim6reg1 entered promiscuous mode [ 220.432670][T11409] device pim6reg1 entered promiscuous mode [ 220.938079][T11440] bridge0: port 3(vlan1) entered blocking state [ 220.951341][T11440] bridge0: port 3(vlan1) entered disabled state [ 220.965624][T11440] device vlan1 entered promiscuous mode [ 222.696066][T11483] device syzkaller0 entered promiscuous mode [ 224.386928][T11548] device syzkaller0 entered promiscuous mode [ 224.438161][T11569] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.445124][T11569] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.476983][T11569] device bridge0 left promiscuous mode [ 224.518316][T11569] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.525194][T11569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.532314][T11569] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.539065][T11569] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.589543][T11569] device bridge0 entered promiscuous mode [ 224.997667][T11596] cgroup: fork rejected by pids controller in /syz3 [ 226.883732][ T9] device bridge_slave_1 left promiscuous mode [ 226.897504][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.964949][ T9] device bridge_slave_0 left promiscuous mode [ 227.016121][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.072288][ T9] device veth1_macvtap left promiscuous mode [ 227.096940][ T9] device veth0_vlan left promiscuous mode [ 227.428587][T11795] device syzkaller0 entered promiscuous mode [ 227.572025][T11793] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.599147][T11793] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.639976][T11793] device bridge_slave_0 entered promiscuous mode [ 227.661813][T11793] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.707483][T11793] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.745249][T11793] device bridge_slave_1 entered promiscuous mode [ 228.116626][T11793] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.123512][T11793] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.130605][T11793] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.137384][T11793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.439719][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.461527][ T4871] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.477928][ T4871] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.563569][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.583483][ T4871] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.590373][ T4871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.642382][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.657340][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.675652][ T1107] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.682524][ T1107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.707021][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.714961][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.737160][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.745065][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.789253][T11875] device syzkaller0 entered promiscuous mode [ 228.861682][ T4874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.870848][ T4874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.885635][T11793] device veth0_vlan entered promiscuous mode [ 228.893429][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.901458][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.924294][T11879] device pim6reg1 entered promiscuous mode [ 228.965912][T11793] device veth1_macvtap entered promiscuous mode [ 228.973285][T11022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.980949][T11022] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.988420][T11022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.996415][T11022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.005506][T11022] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.157020][ T4874] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.165319][ T4874] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.210001][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.218270][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.113968][T11936] device pim6reg1 entered promiscuous mode [ 230.445094][T11944] device syzkaller0 entered promiscuous mode [ 230.598800][T11953] device syzkaller0 entered promiscuous mode [ 230.606293][T11951] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 231.878491][T11977] device syzkaller0 entered promiscuous mode [ 231.950924][T11997] device pim6reg1 entered promiscuous mode [ 231.957942][T11999] device sit0 left promiscuous mode [ 232.567821][T12037] device syzkaller0 entered promiscuous mode [ 233.529914][T12086] device syzkaller0 entered promiscuous mode [ 234.348130][T12144] device pim6reg1 entered promiscuous mode [ 234.530590][T12165] device team_slave_1 entered promiscuous mode [ 234.536995][ T703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.547504][ T703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.806547][T12198] Â: renamed from pim6reg1 [ 234.882246][T12222] device syzkaller0 entered promiscuous mode [ 234.949028][T12230] device syzkaller0 entered promiscuous mode [ 236.010346][T12307] device syzkaller0 entered promiscuous mode [ 236.084355][T12315] device pim6reg1 entered promiscuous mode [ 236.404367][T12347] : renamed from ipvlan1 [ 236.704859][T12371] syz.1.3307[12371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.704917][T12371] syz.1.3307[12371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.777111][T12371] syz.1.3307[12371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.840313][T12375] device syzkaller0 entered promiscuous mode [ 236.874970][T12371] syz.1.3307[12371] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.563524][T12408] device pim6reg1 entered promiscuous mode [ 237.779705][T12421] device pim6reg1 entered promiscuous mode [ 238.673205][T12477] device veth0_vlan left promiscuous mode [ 238.740522][T12477] device veth0_vlan entered promiscuous mode [ 238.861870][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 238.875877][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 238.891207][ T1107] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 238.908149][T12488] syz.3.3339[12488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.908204][T12488] syz.3.3339[12488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.229353][T12504] device sit0 entered promiscuous mode [ 239.541725][T12520] device wg2 left promiscuous mode [ 239.851544][T12557] pim6reg0: tun_chr_ioctl cmd 1074025680 [ 239.979552][T12562] device veth1_macvtap left promiscuous mode [ 240.153417][T12570] device sit0 left promiscuous mode [ 240.433943][T12580] device syzkaller0 entered promiscuous mode [ 240.592781][T12591] device sit0 entered promiscuous mode [ 240.769811][T12618] device pim6reg1 entered promiscuous mode [ 240.905182][T12634] ªªªªªª: renamed from vlan0 [ 241.032103][T12672] device sit0 left promiscuous mode [ 241.056513][T12678] device sit0 entered promiscuous mode [ 242.171767][T12746] device pim6reg1 entered promiscuous mode [ 242.453616][T12771] syz.4.3412[12771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.453666][T12771] syz.4.3412[12771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.465500][T12773] Â: renamed from pim6reg1 [ 242.741688][T12790] device pim6reg1 entered promiscuous mode [ 242.816961][T12793] device sit0 entered promiscuous mode [ 243.370484][T12810] device syzkaller0 entered promiscuous mode [ 243.654291][T12832] syz.3.3432[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.654354][T12832] syz.3.3432[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.722123][T12832] syz.3.3432[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.743952][T12832] syz.3.3432[12832] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.002713][T12854] device pim6reg1 entered promiscuous mode [ 244.514047][T12874] syz.1.3445[12874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.514110][T12874] syz.1.3445[12874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.593660][T12874] syz.1.3445[12874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.697204][T12874] syz.1.3445[12874] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.882320][T12900] device sit0 left promiscuous mode [ 244.916401][T12900] device sit0 entered promiscuous mode [ 245.826634][T12936] device syzkaller0 entered promiscuous mode [ 247.534408][T13037] device syzkaller0 entered promiscuous mode [ 248.186116][T13057] device syzkaller0 entered promiscuous mode [ 248.285985][T13065] device pim6reg1 entered promiscuous mode [ 248.338091][T13071] device veth1_macvtap entered promiscuous mode [ 248.343157][T13073] bpf_get_probe_write_proto: 6 callbacks suppressed [ 248.343169][T13073] syz.0.3503[13073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.344539][T13071] device macsec0 entered promiscuous mode [ 248.357060][T13073] syz.0.3503[13073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.371985][ T4891] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 248.385431][T13073] syz.0.3503[13073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.390691][T13073] syz.0.3503[13073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.587606][T13111] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.606493][T13111] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.647438][T13114] geneve1: tun_chr_ioctl cmd 2147767521 [ 249.729542][ T93] udevd[93]: worker [2474] terminated by signal 33 (Unknown signal 33) [ 249.788280][ T93] udevd[93]: worker [2474] failed while handling '/devices/virtual/block/loop1' [ 249.825909][T13145] syz.0.3524[13145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.825968][T13145] syz.0.3524[13145] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.174665][T13182] syz.0.3537[13182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.175329][T13183] syz.0.3537[13183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.186278][T13182] syz.0.3537[13182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.511990][T13232] device syzkaller0 entered promiscuous mode [ 252.245810][T13304] bridge0: port 3(dummy0) entered blocking state [ 252.253134][T13304] bridge0: port 3(dummy0) entered disabled state [ 252.272712][T13304] device dummy0 entered promiscuous mode [ 252.298944][T13304] bridge0: port 3(dummy0) entered blocking state [ 252.305146][T13304] bridge0: port 3(dummy0) entered forwarding state [ 254.876650][T13422] device syzkaller0 entered promiscuous mode [ 257.000670][T13549] device pim6reg1 entered promiscuous mode [ 257.601548][T13617] device veth0_vlan left promiscuous mode [ 257.622806][T13617] device veth0_vlan entered promiscuous mode [ 257.651516][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.664455][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.673313][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.932782][T13743] device pim6reg1 entered promiscuous mode [ 259.510247][T13783] device sit0 entered promiscuous mode [ 261.074531][T13859] device wg2 entered promiscuous mode [ 261.334707][T13872] syz.1.3722[13872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.334765][T13872] syz.1.3722[13872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.417765][T13879] syz.1.3722[13879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.468728][T13872] syz.1.3722[13872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.525912][T13879] syz.1.3722[13879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.538250][T13872] syz.1.3722[13872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.753905][T13945] syz.2.3745[13945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.783031][T13945] syz.2.3745[13945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.773561][T13985] device sit0 left promiscuous mode [ 264.636115][T14035] device syzkaller0 entered promiscuous mode [ 264.870942][T14091] device pim6reg1 entered promiscuous mode [ 265.293601][T14149] device sit0 left promiscuous mode [ 265.337504][T14147] device pim6reg1 entered promiscuous mode [ 265.374479][T14149] device sit0 entered promiscuous mode [ 265.614180][T14175] device syzkaller0 entered promiscuous mode [ 265.973447][T14210] device wg2 left promiscuous mode [ 266.168339][T14228] device syzkaller0 entered promiscuous mode [ 267.450976][T14286] device syzkaller0 entered promiscuous mode [ 267.460623][T14280] device sit0 left promiscuous mode [ 267.491026][T14293] device sit0 entered promiscuous mode [ 267.543559][T14297] syz.0.3846[14297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.543617][T14297] syz.0.3846[14297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.605768][T14297] syz.0.3846[14297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.640930][T14297] syz.0.3846[14297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.390131][T14342] device veth0_vlan left promiscuous mode [ 268.499137][T14342] device veth0_vlan entered promiscuous mode [ 268.539437][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.559755][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 268.609318][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 269.278348][T14385] device syzkaller0 entered promiscuous mode [ 269.415966][T14412] syz.0.3876[14412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.416020][T14412] syz.0.3876[14412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.520759][T14425] device sit0 left promiscuous mode [ 269.698471][T14433] device sit0 entered promiscuous mode [ 269.883067][T14440] device pim6reg1 entered promiscuous mode [ 269.966556][T14450] device veth1_macvtap entered promiscuous mode [ 269.974776][T14450] device macsec0 entered promiscuous mode [ 270.010640][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.339056][T14480] device pim6reg1 entered promiscuous mode [ 270.372228][T14481] device syzkaller0 entered promiscuous mode [ 271.441852][T14537] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.448869][T14537] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.456234][T14537] device bridge_slave_0 entered promiscuous mode [ 271.467666][T14537] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.476418][T14537] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.487042][T14537] device bridge_slave_1 entered promiscuous mode [ 271.509437][T14558] device pim6reg1 entered promiscuous mode [ 271.522186][T14556] ¯Ê®¸}p: renamed from pim6reg1 [ 271.738203][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.758580][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.814651][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.886705][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.954787][T11005] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.961696][T11005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.020857][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.030294][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.055093][T11005] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.062077][T11005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.088271][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.096283][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.127076][T11017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.154564][ T4866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.181486][T14537] device veth0_vlan entered promiscuous mode [ 272.211323][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.222603][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 272.245694][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.279268][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.297757][T14537] device veth1_macvtap entered promiscuous mode [ 272.332705][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.359063][T11016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 272.949128][T14685] device veth0_vlan left promiscuous mode [ 272.972762][T14685] device veth0_vlan entered promiscuous mode [ 273.001890][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.011810][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 273.019947][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.039500][ T619] device veth0_vlan left promiscuous mode [ 273.543860][T14739] device veth0_vlan left promiscuous mode [ 273.560588][T14739] device veth0_vlan entered promiscuous mode [ 273.609703][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.618604][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.625820][T11005] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.688813][T14862] device syzkaller0 entered promiscuous mode [ 275.768575][T14875] device sit0 left promiscuous mode [ 276.125237][T14924] device syzkaller0 entered promiscuous mode [ 276.146644][T14925] device pim6reg1 entered promiscuous mode [ 277.164187][T14983] device syzkaller0 entered promiscuous mode [ 278.201593][T15078] device syzkaller0 entered promiscuous mode [ 278.220406][T15079] device veth1_to_bond entered promiscuous mode [ 279.026097][T15159] device pim6reg1 entered promiscuous mode [ 279.414095][T15176] device pim6reg1 entered promiscuous mode [ 279.476417][T15178] device syzkaller0 entered promiscuous mode [ 279.538195][T15180] device syzkaller0 entered promiscuous mode [ 279.777249][T15212] device syzkaller0 entered promiscuous mode [ 279.841776][T15217] device syzkaller0 entered promiscuous mode [ 279.850096][T11018] syzkaller0: tun_net_xmit 48 [ 279.865300][T15217] syzkaller0: create flow: hash 2903172898 index 0 [ 279.927281][T15217] syzkaller0 (unregistered): delete flow: hash 2903172898 index 0 [ 280.458978][T15280] device veth0_vlan left promiscuous mode [ 280.487764][T15280] device veth0_vlan entered promiscuous mode [ 280.538040][T11017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 280.598128][T11017] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 280.605497][T11017] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 280.858423][T15295] device syzkaller0 entered promiscuous mode [ 283.091357][T15428] : renamed from ipvlan1 [ 284.141617][T15497] device vxcan1 entered promiscuous mode [ 285.401464][T15580] syz.1.4210[15580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.401524][T15580] syz.1.4210[15580] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.574121][T15608] device syzkaller0 entered promiscuous mode [ 286.381051][T15640] device syzkaller0 entered promiscuous mode [ 286.510135][ T711] syzkaller0: tun_net_xmit 48 [ 286.514849][T15650] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 286.524784][T15640] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 286.539860][T15640] syzkaller0: Linktype set failed because interface is up [ 286.656894][T15640] syzkaller0: tun_net_xmit 1280 [ 287.110050][ T24] audit: type=1400 audit(1722067749.290:176): avc: denied { create } for pid=15660 comm="syz.3.4240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 288.060672][T15727] device syzkaller0 entered promiscuous mode [ 289.163309][T15807] device veth1_to_hsr entered promiscuous mode [ 290.161646][T15853] Â: renamed from pim6reg1 [ 290.253560][T15879] device pim6reg1 entered promiscuous mode [ 290.505200][T15895] device syzkaller0 entered promiscuous mode [ 290.528478][T15901] device veth1_to_hsr entered promiscuous mode [ 290.598146][T15910] device syzkaller0 entered promiscuous mode [ 293.023672][T16053] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 293.038123][T16053] device syzkaller0 entered promiscuous mode [ 293.055395][ T3043] syzkaller0: tun_net_xmit 48 [ 293.513050][T16123] device veth1_macvtap entered promiscuous mode [ 293.520197][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.480253][T16184] device syzkaller0 entered promiscuous mode [ 295.357545][T16259] device pim6reg1 entered promiscuous mode [ 295.430734][T16263] device veth1_macvtap left promiscuous mode [ 295.477270][T16293] device pim6reg1 entered promiscuous mode [ 295.849527][T16326] device syzkaller0 entered promiscuous mode [ 296.061870][T16361] device veth0_to_bond entered promiscuous mode [ 296.570724][T16403] device veth0_vlan left promiscuous mode [ 296.636067][T16403] device veth0_vlan entered promiscuous mode [ 296.784677][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 296.792972][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 296.802811][ T701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 299.204560][T16552] device syzkaller0 entered promiscuous mode [ 299.251582][T16559] device sit0 entered promiscuous mode [ 299.869489][T16581] device syzkaller0 entered promiscuous mode [ 300.558960][ T9] device bridge_slave_1 left promiscuous mode [ 300.581013][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.632721][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.630442][T16752] ªªªªªª: renamed from vlan0 [ 304.640376][T16773] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.647406][T16773] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.654784][T16773] device bridge_slave_0 entered promiscuous mode [ 304.662456][T16773] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.669614][T16773] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.678469][T16773] device bridge_slave_1 entered promiscuous mode [ 304.831947][T16773] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.839183][T16773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.846278][T16773] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.853253][T16773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.953704][ T697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.963770][ T697] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.979926][ T697] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.069908][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.087102][ T707] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.093991][ T707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.116977][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.135296][ T707] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.142172][ T707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.159760][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.177614][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.316267][T16798] device syzkaller0 entered promiscuous mode [ 305.643393][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 305.655104][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.665772][T16773] device veth0_vlan entered promiscuous mode [ 305.697418][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 305.718107][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.732577][T16773] device veth1_macvtap entered promiscuous mode [ 305.743445][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.751807][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.761553][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.772382][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.785121][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.861314][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.879065][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.903388][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.915003][ T708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 307.449305][T16885] device veth0_vlan left promiscuous mode [ 307.455577][T16885] device veth0_vlan entered promiscuous mode [ 307.463306][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.477577][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 307.518640][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 307.712565][T16888] device syzkaller0 entered promiscuous mode [ 307.779643][T16881] device pim6reg1 entered promiscuous mode [ 308.350284][T16921] device pim6reg1 entered promiscuous mode [ 308.415077][T16918] device pim6reg1 entered promiscuous mode [ 308.504408][T16927] device veth1_macvtap left promiscuous mode [ 308.608661][T16932] syz.3.4578[16932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.608747][T16932] syz.3.4578[16932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.610725][T16936] syz.3.4578[16936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.638920][T16935] device syzkaller0 entered promiscuous mode [ 310.372039][T16978] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.449841][T16978] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.539100][T16978] device bridge_slave_0 entered promiscuous mode [ 310.554059][T16978] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.592665][T16978] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.611690][T16978] device bridge_slave_1 entered promiscuous mode [ 310.745438][T17032] device wg2 left promiscuous mode [ 311.070653][ T4886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 311.085730][ T4886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 311.124599][T16083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 311.169880][T16083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 311.227169][T16083] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.234062][T16083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.241724][T16083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 311.250266][T16083] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 311.259301][T16083] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.266156][T16083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.294521][T17054] device syzkaller0 entered promiscuous mode [ 311.304304][T16082] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 311.317639][T16082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 311.329815][T16082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 311.361176][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 311.394200][T16978] device veth0_vlan entered promiscuous mode [ 311.404100][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.418864][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.434973][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 311.463618][T16978] device veth1_macvtap entered promiscuous mode [ 311.481979][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 311.501367][ T3041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 311.540334][T16082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 311.603312][T17064] bridge_slave_0: mtu greater than device maximum [ 311.989569][T17102] bridge0: port 3(gretap0) entered blocking state [ 312.016948][T17102] bridge0: port 3(gretap0) entered disabled state [ 312.105971][T17102] device gretap0 entered promiscuous mode [ 312.133507][T17102] bridge0: port 3(gretap0) entered blocking state [ 312.139905][T17102] bridge0: port 3(gretap0) entered forwarding state [ 312.300282][T17121] device syzkaller0 entered promiscuous mode [ 312.419390][T17140] syz.4.4638[17140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.419447][T17140] syz.4.4638[17140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.437806][T17140] syz.4.4638[17140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.450550][T17140] syz.4.4638[17140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.970303][T17186] device syzkaller0 entered promiscuous mode [ 313.497629][ T9] device vlan1 left promiscuous mode [ 313.502922][ T9] bridge0: port 3(vlan1) entered disabled state [ 313.572108][ T9] device bridge_slave_1 left promiscuous mode [ 313.588229][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.672027][ T9] device bridge_slave_0 left promiscuous mode [ 313.720222][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.732786][ T9] device veth1_macvtap left promiscuous mode [ 313.750282][ T9] device veth0_vlan left promiscuous mode [ 314.624259][T17234] device pim6reg1 entered promiscuous mode [ 314.850655][T17266] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 315.050418][T17275] device syzkaller0 entered promiscuous mode [ 316.025664][T17304] device pim6reg1 entered promiscuous mode [ 316.058145][ T24] audit: type=1400 audit(1722067778.240:177): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 316.208166][T17321] device pim6reg1 entered promiscuous mode [ 316.336627][T17338] device pim6reg1 entered promiscuous mode [ 316.346362][T17336] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.355220][T17336] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.473079][T17339] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.479963][T17339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.487094][T17339] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.493949][T17339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.546951][T17339] device bridge0 entered promiscuous mode [ 316.639622][T17348] syz.2.4704[17348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.639689][T17348] syz.2.4704[17348] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.167073][T17369] device syzkaller0 entered promiscuous mode [ 317.607127][T17389] device syzkaller0 entered promiscuous mode [ 318.646503][T17414] device syzkaller0 entered promiscuous mode [ 318.889854][T17434] device pim6reg1 entered promiscuous mode [ 318.980294][T17437] device sit0 left promiscuous mode [ 320.515757][T17484] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.539348][T17484] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.566310][T17484] device bridge_slave_0 entered promiscuous mode [ 320.630465][T17484] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.705158][T17484] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.776944][T17484] device bridge_slave_1 entered promiscuous mode [ 321.820729][ T4893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.842385][ T4893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.917216][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.925859][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.984625][ T4889] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.991535][ T4889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.083952][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.100295][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.109187][ T4889] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.116046][ T4889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.136504][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.145273][ T4889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.167398][ T4893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 322.176745][ T4893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.216348][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.245699][T17484] device veth0_vlan entered promiscuous mode [ 322.305792][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.325954][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.368208][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.419025][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.483337][T17591] device syzkaller0 entered promiscuous mode [ 322.520750][T17484] device veth1_macvtap entered promiscuous mode [ 322.602621][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 322.635166][ T1463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 322.719887][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 322.749015][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.014530][T17657] device syzkaller0 entered promiscuous mode [ 324.573316][T17681] device syzkaller0 entered promiscuous mode [ 325.467966][ T9] device bridge_slave_1 left promiscuous mode [ 325.476745][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.537033][ T9] device bridge_slave_0 left promiscuous mode [ 325.576327][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.633011][ T9] device veth0_vlan left promiscuous mode [ 326.338835][T17772] device syzkaller0 entered promiscuous mode [ 326.815122][T17797] device veth1_macvtap left promiscuous mode [ 326.834164][T17797] device macsec0 left promiscuous mode [ 326.891660][T17797] device veth1_macvtap entered promiscuous mode [ 326.922136][T17797] device macsec0 entered promiscuous mode [ 326.950032][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 327.012074][T17807] device syzkaller0 entered promiscuous mode [ 327.038066][T17814] bridge0: port 3(gretap0) entered disabled state [ 327.044409][T17814] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.051262][T17814] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.096961][T17814] device bridge0 left promiscuous mode [ 327.117959][T17818] bridge0: port 3(gretap0) entered blocking state [ 327.124255][T17818] bridge0: port 3(gretap0) entered forwarding state [ 327.130752][T17818] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.137786][T17818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 327.144880][T17818] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.151675][T17818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 327.263296][T17818] device bridge0 entered promiscuous mode [ 327.748269][T17848] ÿÿÿÿÿÿ: renamed from vlan0 [ 327.784267][T17859] device pim6reg1 entered promiscuous mode [ 328.316413][T17898] device sit0 entered promiscuous mode [ 328.755870][T17945] device pim6reg1 entered promiscuous mode [ 329.354231][T18023] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.361262][T18023] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.475219][T18026] ªªªªªª: renamed from vlan0 [ 330.577152][T18080] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.584074][T18080] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.596717][T18080] device bridge_slave_0 entered promiscuous mode [ 330.604644][T18080] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.611774][T18080] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.717333][T18080] device bridge_slave_1 entered promiscuous mode [ 331.381854][T18101] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.415020][T18101] bridge0: port 1(bridge_slave_0) entered disabled state [ 331.425120][T18101] device bridge_slave_0 entered promiscuous mode [ 331.547231][T18101] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.555549][T18101] bridge0: port 2(bridge_slave_1) entered disabled state [ 331.568827][T18101] device bridge_slave_1 entered promiscuous mode [ 331.688327][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.696229][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.708094][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.716747][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.725847][ T530] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.733751][ T530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.741137][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.753089][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.762446][ T530] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.769497][ T530] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.806748][T18153] device syzkaller0 entered promiscuous mode [ 331.813943][ T526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 331.837211][ T526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 331.845449][ T526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 331.866518][T18080] device veth0_vlan entered promiscuous mode [ 331.901544][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.911178][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 331.919769][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 331.930888][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 331.969309][T18080] device veth1_macvtap entered promiscuous mode [ 331.986707][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 331.995815][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.004902][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 332.153925][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.187744][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 332.227138][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 332.235288][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 332.254640][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.278830][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.367871][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.409396][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.633484][ T528] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.641380][ T528] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.662526][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.461355][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.469843][ T712] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.478101][ T712] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.485392][ T712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.500709][T18188] device pim6reg1 entered promiscuous mode [ 333.540520][T18192] device pim6reg1 entered promiscuous mode [ 333.557300][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.567572][ T15] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.593041][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.674717][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.682941][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.692137][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.700874][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.709229][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.763169][T18101] device veth0_vlan entered promiscuous mode [ 333.787868][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.807383][ T3014] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.846523][T18101] device veth1_macvtap entered promiscuous mode [ 333.905122][ T526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.917315][ T526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.926327][ T526] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 334.047539][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.056742][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 334.066070][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 334.074925][ T3009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.438486][ T9] device bridge_slave_1 left promiscuous mode [ 334.447996][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.476378][ T9] device bridge_slave_0 left promiscuous mode [ 334.498953][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.545228][ T9] device veth1_macvtap left promiscuous mode [ 335.120605][T18269] device syzkaller0 entered promiscuous mode [ 335.439276][T18278] device sit0 entered promiscuous mode [ 336.410202][ T9] device dummy0 left promiscuous mode [ 336.417049][ T9] bridge0: port 3(dummy0) entered disabled state [ 336.438571][ T9] device bridge_slave_1 left promiscuous mode [ 336.445071][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.454216][ T9] device bridge_slave_0 left promiscuous mode [ 336.461304][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.471700][ T9] device veth0_vlan left promiscuous mode [ 336.602820][T18331] device veth1_macvtap left promiscuous mode [ 336.610146][T18331] device macsec0 entered promiscuous mode [ 338.354116][T18475] device syzkaller0 entered promiscuous mode [ 339.438313][T18552] device wg2 entered promiscuous mode [ 339.769538][T18576] syz.4.5061[18576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.769597][T18576] syz.4.5061[18576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.352528][T18682] device macsec0 left promiscuous mode [ 341.409415][T18682] device veth0_vlan left promiscuous mode [ 341.429603][T18682] device veth0_vlan entered promiscuous mode [ 341.507395][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.522790][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 341.537539][ T3004] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.566378][T18682] device veth1_macvtap entered promiscuous mode [ 341.576381][T18682] device macsec0 entered promiscuous mode [ 341.629842][T16082] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.729522][T18716] device syzkaller0 entered promiscuous mode [ 341.868162][T18734] device syzkaller0 entered promiscuous mode [ 341.991991][T18749] syz.4.5108[18749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.992043][T18749] syz.4.5108[18749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.005039][T18749] device pim6reg1 entered promiscuous mode [ 342.270419][T18775] device pim6reg1 entered promiscuous mode [ 342.302105][T18778] device syzkaller0 entered promiscuous mode [ 342.506575][T18806] geneve1: tun_chr_ioctl cmd 1074025692 [ 342.541216][T18808] device syzkaller0 entered promiscuous mode [ 342.579301][T18808] device pim6reg1 entered promiscuous mode [ 342.860799][T18843] device syzkaller0 entered promiscuous mode [ 342.928083][T18852] device pim6reg1 entered promiscuous mode [ 344.662141][T18984] ªªªªªª: renamed from vlan0 [ 344.968600][T19019] syz.2.5187[19019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.968658][T19019] syz.2.5187[19019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.990338][T19020] syz.2.5187[19020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.013955][T19020] syz.2.5187[19020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.388968][T19076] syz.1.5198[19076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.411668][T19076] syz.1.5198[19076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.447555][T19076] syz.1.5198[19076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.490743][T19076] syz.1.5198[19076] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.543296][T19086] device veth1_macvtap left promiscuous mode [ 345.566960][T19084] device pim6reg1 entered promiscuous mode [ 345.604641][T19086] device veth1_macvtap entered promiscuous mode [ 345.628524][T19086] device macsec0 entered promiscuous mode [ 345.654565][T11022] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 346.488396][T19179] device syzkaller0 entered promiscuous mode [ 346.527582][T19181] device pim6reg1 entered promiscuous mode [ 346.921478][T19206] ÿÿÿÿÿÿ: renamed from vlan0 [ 346.996541][T19213] device syzkaller0 entered promiscuous mode [ 347.084414][T19215] device sit0 entered promiscuous mode [ 347.442732][T19262] device syzkaller0 entered promiscuous mode [ 347.569202][T19266] device veth0_vlan left promiscuous mode [ 347.632859][T19266] device veth0_vlan entered promiscuous mode [ 347.752545][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 347.793493][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 347.892377][ T2932] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.802591][T19343] device syzkaller0 entered promiscuous mode [ 348.944885][T19362] device veth0_vlan left promiscuous mode [ 348.965740][T19362] device veth0_vlan entered promiscuous mode [ 349.040167][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 349.048877][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 349.093766][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 349.554034][T19394] device pim6reg1 entered promiscuous mode [ 350.024590][T19412] ÿÿÿÿÿÿ: renamed from vlan0 [ 351.255916][T19501] device veth1_to_hsr entered promiscuous mode [ 351.390080][T19508] device veth0_vlan left promiscuous mode [ 351.425113][T19508] device veth0_vlan entered promiscuous mode [ 351.493252][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 351.513121][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 351.532193][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.573258][T19519] device syzkaller0 entered promiscuous mode [ 351.675683][T19526] device syzkaller0 entered promiscuous mode [ 351.686064][T19546] device sit0 left promiscuous mode [ 351.715477][T19546] device sit0 entered promiscuous mode [ 351.749369][T19553] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.758909][T19553] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.838874][T19561] device sit0 entered promiscuous mode [ 351.907675][T19568] syz.3.5336[19568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.907800][T19568] syz.3.5336[19568] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.093693][T19627] device syzkaller0 entered promiscuous mode [ 353.491384][T19674] device sit0 left promiscuous mode [ 353.742128][T19679] device sit0 entered promiscuous mode [ 355.238372][T19746] device syzkaller0 entered promiscuous mode [ 355.800376][T19768] device pim6reg1 entered promiscuous mode [ 355.972677][T19780] device syzkaller0 entered promiscuous mode [ 356.021215][T19796] device veth1_macvtap left promiscuous mode [ 356.027192][T19796] device macsec0 entered promiscuous mode [ 356.788856][T19842] syz.4.5415[19842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.788914][T19842] syz.4.5415[19842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.877634][T19852] device pim6reg1 entered promiscuous mode [ 357.008388][T19863] syz.2.5421[19863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.008448][T19863] syz.2.5421[19863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.495359][T19887] device syzkaller0 entered promiscuous mode [ 357.904785][T19928] device syzkaller0 entered promiscuous mode [ 357.928220][T19936] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.935242][T19936] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.980047][T19936] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.987123][T19936] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.996422][T19936] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.003666][T19936] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.013837][T19936] device bridge0 entered promiscuous mode [ 358.205624][T19950] device wg2 entered promiscuous mode [ 358.394349][T19978] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.401374][T19978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.410499][T19978] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.417489][T19978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.438548][T19978] device bridge0 entered promiscuous mode [ 358.493830][T19993] device syzkaller0 entered promiscuous mode [ 358.567134][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.498277][T20040] device sit0 left promiscuous mode [ 360.195875][T20087] device veth0_vlan left promiscuous mode [ 360.229967][T20087] device veth0_vlan entered promiscuous mode [ 360.305346][ T4872] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 360.327615][ T4872] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 360.350050][ T4872] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 361.015223][T20151] device syzkaller0 entered promiscuous mode [ 361.716123][T20174] device syzkaller0 entered promiscuous mode [ 362.276361][T20194] device syzkaller0 entered promiscuous mode [ 362.412323][T20209] device pim6reg1 entered promiscuous mode [ 362.808180][T20239] device sit0 left promiscuous mode [ 363.036848][T20264] bridge0: port 3(gretap0) entered disabled state [ 363.043184][T20264] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.050040][T20264] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.111725][T20264] device bridge0 left promiscuous mode [ 363.154376][T20266] device veth0_vlan left promiscuous mode [ 363.161048][T20266] device veth0_vlan entered promiscuous mode [ 363.191857][ T24] audit: type=1400 audit(1722067825.370:178): avc: denied { create } for pid=20265 comm="syz.3.5545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 363.507224][T20310] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 363.528462][T20310] device syzkaller0 entered promiscuous mode [ 363.673852][T20291] device syzkaller0 entered promiscuous mode [ 363.758249][T20327] tap0: tun_chr_ioctl cmd 21731 [ 364.248484][T20353] device syzkaller0 entered promiscuous mode [ 364.687613][T20361] device syzkaller0 entered promiscuous mode [ 365.334279][T20398] device bridge0 entered promiscuous mode [ 365.827232][T20430] device syzkaller0 entered promiscuous mode [ 365.958708][T20463] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.965671][T20463] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.992674][T20463] device bridge0 left promiscuous mode [ 366.036913][T20470] device bridge_slave_1 left promiscuous mode [ 366.085540][T20470] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.160966][T20470] device bridge_slave_0 left promiscuous mode [ 366.222422][T20470] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.498683][T20596] syz.3.5632[20596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.736467][T20604] device syzkaller0 entered promiscuous mode [ 368.270215][T20668] syz.4.5655[20668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.272445][T20668] syz.4.5655[20668] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.719539][T20680] device pim6reg1 entered promiscuous mode [ 368.947638][T20688] device syzkaller0 entered promiscuous mode [ 369.600664][T20728] device pim6reg1 entered promiscuous mode [ 369.632610][T20737] device pim6reg1 entered promiscuous mode [ 369.691752][T20746] device pim6reg1 entered promiscuous mode [ 369.779081][T20756] device pim6reg1 entered promiscuous mode [ 370.074496][T20795] device veth0_vlan left promiscuous mode [ 370.080749][T20795] device veth0_vlan entered promiscuous mode [ 370.088164][ T1457] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 370.099822][ T1457] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 370.117518][ T1457] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.381223][T20819] device pim6reg1 entered promiscuous mode [ 372.109478][T20928] device pim6reg1 entered promiscuous mode [ 372.341508][T20950] device syzkaller0 entered promiscuous mode [ 373.475365][T21009] device gretap0 left promiscuous mode [ 373.484019][T21009] bridge0: port 3(gretap0) entered disabled state [ 373.490941][T21009] device bridge_slave_1 left promiscuous mode [ 373.497261][T21009] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.504411][T21009] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.247419][T21058] device pim6reg1 entered promiscuous mode [ 374.589329][T21071] device veth0_vlan left promiscuous mode [ 374.595232][T21071] device veth0_vlan entered promiscuous mode [ 376.745777][T21174] syz.2.5812[21174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.745840][T21174] syz.2.5812[21174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 379.260347][T21264] device syzkaller0 entered promiscuous mode [ 379.511415][T21269] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.518358][T21269] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.525591][T21269] device bridge0 left promiscuous mode [ 379.540224][T21269] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.547112][T21269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.554265][T21269] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.561067][T21269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.568905][T21269] device bridge0 entered promiscuous mode [ 379.666709][T21276] device syzkaller0 entered promiscuous mode [ 380.026722][ T24] audit: type=1400 audit(1722067842.200:179): avc: denied { attach_queue } for pid=21286 comm="syz.1.5847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 380.150177][T21291] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.166894][T21291] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.174234][T21291] device bridge_slave_0 entered promiscuous mode [ 380.240109][T21291] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.247346][T21291] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.254617][T21291] device bridge_slave_1 entered promiscuous mode [ 380.276003][T21300] device syzkaller0 entered promiscuous mode [ 380.714749][ T9] device veth1_macvtap left promiscuous mode [ 380.746955][ T9] device veth0_vlan left promiscuous mode [ 381.234533][T21316] device pim6reg1 entered promiscuous mode [ 381.251621][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 381.262854][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 381.270861][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 381.279607][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 381.288715][ T726] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.295553][ T726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 381.302981][ T726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 381.315984][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 381.324881][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 381.332997][ T3011] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.339861][ T3011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 381.348034][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 381.355997][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 381.373921][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 381.382528][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 381.391167][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 381.399420][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 381.507279][T21324] device syzkaller0 entered promiscuous mode [ 381.523768][T21291] device veth0_vlan entered promiscuous mode [ 381.548379][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 381.556476][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 381.567503][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.574747][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.591118][T21291] device veth1_macvtap entered promiscuous mode [ 381.599292][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 381.607766][ T3012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 381.630059][T21330] device syzkaller0 entered promiscuous mode [ 381.667894][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 381.676572][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 381.685234][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 381.693592][ T4873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 382.643950][T21434] syz.0.5888[21434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.644006][T21434] syz.0.5888[21434] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 382.683856][T21430] device syzkaller0 entered promiscuous mode [ 382.961757][T21462] device pim6reg1 entered promiscuous mode [ 383.559859][T21533] bridge0: port 3(veth0_to_batadv) entered blocking state [ 383.567378][T21533] bridge0: port 3(veth0_to_batadv) entered disabled state [ 383.586093][T21533] device veth0_to_batadv entered promiscuous mode [ 383.604591][T21533] bridge0: port 3(veth0_to_batadv) entered blocking state [ 383.611842][T21533] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 383.631241][T21556] device veth0_to_batadv left promiscuous mode [ 383.641825][T21556] bridge0: port 3(veth0_to_batadv) entered disabled state [ 383.869500][T21574] device pim6reg1 entered promiscuous mode [ 384.573663][T21619] syz.1.5941[21619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.573722][T21619] syz.1.5941[21619] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.812257][T21651] device sit0 left promiscuous mode [ 384.907916][T21649] device pim6reg1 entered promiscuous mode [ 384.953352][T21649] device syzkaller0 entered promiscuous mode [ 385.179244][T21689] device sit0 entered promiscuous mode [ 386.155025][T21765] device pim6reg1 entered promiscuous mode [ 386.301647][T21783] device veth1_macvtap left promiscuous mode [ 386.317330][T21783] device macsec0 left promiscuous mode [ 387.065469][T21814] syz.1.6001[21814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.065853][T21814] syz.1.6001[21814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.767244][T21906] device syzkaller0 entered promiscuous mode [ 390.715345][T21998] syz.2.6055[21998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.715403][T21998] syz.2.6055[21998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.462677][T22038] device pim6reg1 entered promiscuous mode [ 391.521562][T22047] syz.2.6067[22047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.521605][T22047] syz.2.6067[22047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.719636][T22060] device syzkaller0 entered promiscuous mode [ 391.737956][T22060] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 391.912979][T22079] device vxcan1 entered promiscuous mode [ 391.957927][T22081] syz.2.6079[22081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 391.958314][T22081] syz.2.6079[22081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 392.067425][T22087] device sit0 entered promiscuous mode [ 393.023343][T22152] syz.0.6101[22152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.023400][T22152] syz.0.6101[22152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.057491][T22154] syz.0.6101[22154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.086891][T22154] syz.0.6101[22154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 393.317842][T22174] device syzkaller0 entered promiscuous mode [ 393.365328][T22184] device veth1_macvtap left promiscuous mode [ 393.372491][T22184] device macsec0 entered promiscuous mode [ 393.489474][T22184] device veth1_macvtap entered promiscuous mode [ 394.162580][T22276] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.169553][T22276] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.192870][T22276] device bridge0 left promiscuous mode [ 394.208081][T22276] device bridge_slave_1 left promiscuous mode [ 394.219586][T22276] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.235495][T22276] device bridge_slave_0 left promiscuous mode [ 394.248073][T22276] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.692659][T22316] device pim6reg1 entered promiscuous mode [ 395.231979][T22369] device sit0 left promiscuous mode [ 395.610836][T22389] device sit0 entered promiscuous mode [ 396.275600][T22393] device syzkaller0 entered promiscuous mode [ 396.562547][T22420] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.593468][T22420] bridge0: port 1(bridge_slave_0) entered disabled state [ 396.602838][T22420] device bridge_slave_0 entered promiscuous mode [ 396.671057][T22420] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.686831][T22420] bridge0: port 2(bridge_slave_1) entered disabled state [ 396.724759][T22420] device bridge_slave_1 entered promiscuous mode [ 396.894732][T22480] device wg2 left promiscuous mode [ 397.029318][T22484] device wg2 entered promiscuous mode [ 397.199753][T22420] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.206607][T22420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.213770][T22420] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.220634][T22420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.586606][ T4871] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.593867][ T4871] bridge0: port 2(bridge_slave_1) entered disabled state [ 397.601870][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 397.609569][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 397.658750][T22511] device syzkaller0 entered promiscuous mode [ 397.718458][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 397.727338][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 397.736621][ T4871] bridge0: port 1(bridge_slave_0) entered blocking state [ 397.743508][ T4871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 397.751313][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 397.759624][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 397.768251][ T4871] bridge0: port 2(bridge_slave_1) entered blocking state [ 397.775083][ T4871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 397.847685][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 397.868751][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 397.876484][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 397.889007][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 397.896724][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 397.904863][ T4871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 397.937120][T22420] device veth0_vlan entered promiscuous mode [ 397.937734][T22523] bpf_get_probe_write_proto: 6 callbacks suppressed [ 397.937746][T22523] syz.3.6197[22523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.949559][T22523] syz.3.6197[22523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.014182][T22523] syz.3.6197[22523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.025525][T22523] syz.3.6197[22523] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 398.037016][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 398.056836][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 398.065070][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 398.072802][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 398.144673][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 398.153445][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 398.163750][T22420] device veth1_macvtap entered promiscuous mode [ 398.213941][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 398.221640][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 398.231495][ T530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 398.279232][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 398.315645][ T528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 398.629083][T22538] device veth1_macvtap left promiscuous mode [ 398.645263][T22538] device macsec0 left promiscuous mode [ 399.441673][T22589] device syzkaller0 entered promiscuous mode [ 400.181777][T22611] device syzkaller0 entered promiscuous mode [ 400.638128][T22652] device veth1_macvtap left promiscuous mode [ 400.765481][T22657] device sit0 entered promiscuous mode [ 400.973089][T22661] device syzkaller0 entered promiscuous mode [ 401.760510][T22720] syz.2.6251[22720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 401.760568][T22720] syz.2.6251[22720] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.393404][T22735] syz.0.6256[22735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.468675][T22735] syz.0.6256[22735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.470102][T22736] syz.0.6256[22736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 402.491531][T22729] device sit0 left promiscuous mode [ 402.502818][T22736] syz.0.6256[22736] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.018457][T22818] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.036654][T22818] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.044048][T22818] device bridge_slave_0 entered promiscuous mode [ 403.067706][T22818] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.074706][T22818] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.082142][T22818] device bridge_slave_1 entered promiscuous mode [ 403.159956][T22818] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.166843][T22818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.173949][T22818] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.180838][T22818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.212144][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 403.221334][ T696] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.228865][ T696] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.247256][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 403.255198][ T707] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.262069][ T707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.269671][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 403.278904][ T707] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.285751][ T707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.294553][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 403.302611][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 403.324668][T22818] device veth0_vlan entered promiscuous mode [ 403.331037][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 403.339838][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 403.349160][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 403.356575][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 403.373036][T22818] device veth1_macvtap entered promiscuous mode [ 403.381098][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 403.394662][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 403.415934][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 403.913507][T22853] device syzkaller0 entered promiscuous mode [ 403.966273][T22862] device sit0 entered promiscuous mode [ 404.244697][ T9] device bridge_slave_1 left promiscuous mode [ 404.250940][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.259210][ T9] device bridge_slave_0 left promiscuous mode [ 404.265144][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.273477][ T9] device veth0_vlan left promiscuous mode [ 404.377535][T22889] Â: renamed from pim6reg1 [ 404.785119][T22922] device veth1_macvtap left promiscuous mode [ 404.835771][T22922] device macsec0 left promiscuous mode [ 405.177456][T22949] device syzkaller0 entered promiscuous mode [ 405.320028][T22980] device syzkaller0 entered promiscuous mode [ 405.580092][T23001] device sit0 left promiscuous mode [ 405.637544][T23001] device sit0 entered promiscuous mode [ 406.907980][T23053] device vxcan1 entered promiscuous mode [ 407.366110][T23086] device syzkaller0 entered promiscuous mode [ 407.955376][T23147] device veth1_macvtap left promiscuous mode [ 407.964106][T23147] device macsec0 entered promiscuous mode [ 410.383662][T23241] device syzkaller0 entered promiscuous mode [ 414.036532][T23415] device syzkaller0 entered promiscuous mode [ 414.499895][T23445] bpf_get_probe_write_proto: 4 callbacks suppressed [ 414.499907][T23445] syz.0.6459[23445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.514037][T23445] syz.0.6459[23445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.077527][T23472] syz.4.6470[23472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.131497][T23472] syz.4.6470[23472] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.114459][T23492] device veth0_vlan left promiscuous mode [ 416.174211][T23492] device veth0_vlan entered promiscuous mode [ 416.464133][T23524] syz.0.6484[23524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.464193][T23524] syz.0.6484[23524] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.963972][T23544] device pim6reg1 entered promiscuous mode [ 417.040996][T23548] : renamed from ipvlan1 [ 417.573449][T23572] device syzkaller0 entered promiscuous mode [ 417.743085][T23600] device syzkaller0 entered promiscuous mode [ 417.927465][T23617] device sit0 left promiscuous mode [ 418.013098][T23615] device sit0 entered promiscuous mode [ 418.023239][T23619] device sit0 entered promiscuous mode [ 418.367531][T23650] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.374688][T23650] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.487753][T23654] device bridge_slave_1 left promiscuous mode [ 418.494877][T23654] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.539730][T23654] device bridge_slave_0 left promiscuous mode [ 418.552233][T23654] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.808771][T23667] device syzkaller0 entered promiscuous mode [ 419.121646][T23686] ¯Ê®¸}p: renamed from pim6reg1 [ 419.860115][T23744] device veth1_macvtap left promiscuous mode [ 419.866232][T23744] device macsec0 entered promiscuous mode [ 420.323871][T23797] device veth0_vlan left promiscuous mode [ 420.378496][T23797] device veth0_vlan entered promiscuous mode [ 420.523730][T23807] device veth0_vlan left promiscuous mode [ 420.540897][T23807] device veth0_vlan entered promiscuous mode [ 420.558021][T11018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 420.566152][T11018] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 420.593245][T11018] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 420.626248][T23808] device wg2 entered promiscuous mode [ 421.000246][T23837] syz.2.6581[23837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.000305][T23837] syz.2.6581[23837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.027585][T23837] syz.2.6581[23837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.122935][T23837] syz.2.6581[23837] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 421.889806][T23880] device syzkaller0 entered promiscuous mode [ 422.003728][T23882] device wg2 left promiscuous mode [ 422.018964][T23884] device wg2 entered promiscuous mode [ 422.386391][T23929] device wg2 entered promiscuous mode [ 422.403329][T23926] device pim6reg1 entered promiscuous mode [ 422.416636][T23920] device veth0_vlan left promiscuous mode [ 422.434051][T23920] device veth0_vlan entered promiscuous mode [ 422.915084][T23968] device pim6reg1 entered promiscuous mode [ 422.963372][T23974] device syzkaller0 entered promiscuous mode [ 423.818874][T24020] device syzkaller0 entered promiscuous mode [ 424.259836][T24048] device sit0 left promiscuous mode [ 424.505303][T24053] device syzkaller0 entered promiscuous mode [ 424.701893][T24091] device pim6reg1 entered promiscuous mode [ 425.023840][T24122] device wg2 left promiscuous mode [ 425.102982][T24131] device wg2 entered promiscuous mode [ 425.305750][T24158] device syzkaller0 entered promiscuous mode [ 425.776098][T24201] device veth0_vlan left promiscuous mode [ 425.864557][T24201] device veth0_vlan entered promiscuous mode [ 425.981209][ T3043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 426.002028][ T3043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 426.062741][ T3043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 426.387078][T24222] device pim6reg1 entered promiscuous mode [ 426.520743][T24224] device pim6reg1 entered promiscuous mode [ 427.386957][T24311] device macsec0 entered promiscuous mode [ 427.554624][T24324] syz.3.6706[24324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.554674][T24324] syz.3.6706[24324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.596710][T24380] device sit0 left promiscuous mode [ 428.992251][T24393] device pim6reg1 entered promiscuous mode [ 429.094564][T24418] device syzkaller0 entered promiscuous mode [ 429.213675][T24427] device syzkaller0 entered promiscuous mode [ 429.325151][T24437] device syzkaller0 entered promiscuous mode [ 429.948635][T24493] device syzkaller0 entered promiscuous mode [ 430.062367][T24500] syz.3.6759[24500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.062844][T24500] syz.3.6759[24500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.145990][T24503] syz.3.6759[24503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.170165][T24500] syz.3.6759[24500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.225827][T24503] syz.3.6759[24503] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.244408][T24505] device pim6reg1 entered promiscuous mode [ 431.628640][T24609] device vxcan1 entered promiscuous mode [ 432.749103][T24662] device veth0_vlan left promiscuous mode [ 432.755175][T24662] device veth0_vlan entered promiscuous mode [ 432.778216][T16292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 432.786308][T16292] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 432.799720][T16292] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 432.818998][T24665] Â: renamed from pim6reg1 [ 434.604695][T24821] device syzkaller0 entered promiscuous mode [ 434.926557][T24838] device veth1_macvtap entered promiscuous mode [ 434.971725][T24838] device macsec0 entered promiscuous mode [ 435.016470][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 436.024229][T24915] device macsec0 left promiscuous mode [ 436.097944][T24915] device veth1_macvtap entered promiscuous mode [ 436.104578][T24915] device macsec0 entered promiscuous mode [ 436.124932][ T4888] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 436.398219][T24962] device veth0_vlan left promiscuous mode [ 436.409930][T24962] device veth0_vlan entered promiscuous mode [ 436.450552][ T741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.459606][ T741] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 436.469118][ T741] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 436.629063][T24981] device syzkaller0 entered promiscuous mode [ 437.744480][T25020] device syzkaller0 entered promiscuous mode [ 439.407975][T25137] device syzkaller0 entered promiscuous mode [ 439.472050][T25148] device syzkaller0 entered promiscuous mode [ 441.814750][T25288] device veth0_vlan left promiscuous mode [ 441.856278][T25288] device veth0_vlan entered promiscuous mode [ 441.936054][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.949669][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.986493][ T696] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.133917][T25363] device pim6reg1 entered promiscuous mode [ 445.471846][T25407] device pim6reg1 entered promiscuous mode [ 446.011615][T25421] device syzkaller0 entered promiscuous mode [ 446.429594][T25465] device veth1_macvtap entered promiscuous mode [ 446.469911][ T4888] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 447.366103][T25568] geneve1: tun_chr_ioctl cmd 1074025672 [ 447.372141][T25568] geneve1: ignored: set checksum enabled [ 447.595073][T25606] Â: renamed from pim6reg1 [ 448.060933][T25635] device sit0 left promiscuous mode [ 448.420230][T25663] syz.1.7071[25663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.420290][T25663] syz.1.7071[25663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.434520][T25663] syz.1.7071[25663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.445843][T25663] syz.1.7071[25663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.869789][T25690] device syzkaller0 entered promiscuous mode [ 449.283207][T25711] device sit0 left promiscuous mode [ 449.861962][T25793] device sit0 entered promiscuous mode [ 450.849083][T25854] device bridge_slave_1 left promiscuous mode [ 450.855339][T25854] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.864189][T25854] device bridge_slave_0 left promiscuous mode [ 450.870254][T25854] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.522403][T25899] device vxcan1 entered promiscuous mode [ 453.076793][T25977] lo: mtu less than device minimum [ 453.263332][T25992] device pim6reg1 entered promiscuous mode [ 453.411917][T26008] syz.2.7164[26008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.411974][T26008] syz.2.7164[26008] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.423663][T26007] syz.2.7164[26007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.448390][T26007] syz.2.7164[26007] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.714636][T26108] device pim6reg1 entered promiscuous mode [ 454.754758][T26113] ¯Ê®¸}p: renamed from pim6reg1 [ 455.336637][T26157] ¯Ê®¸}p: renamed from pim6reg1 [ 455.732421][T26174] syz.4.7218[26174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.732474][T26174] syz.4.7218[26174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 455.745181][T26175] syz.4.7218[26175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.552482][T26308] device pim6reg1 entered promiscuous mode [ 457.611918][T26314] syz.0.7255[26314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.612382][T26314] syz.0.7255[26314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 457.626273][T26314] syz.0.7255[26314] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 458.885590][T26373] device syzkaller0 entered promiscuous mode [ 459.647879][T26423] device veth0_vlan left promiscuous mode [ 459.697700][T26423] device veth0_vlan entered promiscuous mode [ 459.754343][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 459.780917][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 459.843159][ T702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 460.905308][T26484] device syzkaller0 entered promiscuous mode [ 460.978286][T26491] device macsec0 left promiscuous mode [ 461.507970][T26510] device syzkaller0 entered promiscuous mode [ 461.862025][T26560] device lo entered promiscuous mode [ 462.054524][T26586] device syzkaller0 entered promiscuous mode [ 462.078860][T26599] device sit0 entered promiscuous mode [ 462.912885][ T24] audit: type=1400 audit(1722067925.090:180): avc: denied { create } for pid=26671 comm="syz.4.7346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 465.517907][T26764] device syzkaller0 entered promiscuous mode [ 465.713905][T26786] device sit0 left promiscuous mode [ 465.819469][T26790] device sit0 entered promiscuous mode [ 466.548101][T26836] device sit0 entered promiscuous mode [ 467.367566][T26894] device veth1_macvtap left promiscuous mode [ 467.374886][T26894] device macsec0 left promiscuous mode [ 467.746907][T26933] device pim6reg1 entered promiscuous mode [ 467.886233][T26921] device pim6reg1 entered promiscuous mode [ 468.405674][T27001] syz.3.7428[27001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.405753][T27001] syz.3.7428[27001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 468.643171][T27014] ------------[ cut here ]------------ [ 468.779458][T27014] kernel BUG at kernel/bpf/arraymap.c:977! [ 468.819569][T27014] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 468.825471][T27014] CPU: 1 PID: 27014 Comm: syz.4.7432 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 468.836660][T27014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 468.846560][T27014] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 468.852630][T27014] Code: 93 e8 ff eb 05 e8 01 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff <0f> 0b e8 da 92 e8 ff 0f 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f [ 468.872070][T27014] RSP: 0018:ffffc90001197720 EFLAGS: 00010293 [ 468.877974][T27014] RAX: ffffffff8182161f RBX: 00000000fffffff0 RCX: ffff88814887e2c0 [ 468.885779][T27014] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 468.893596][T27014] RBP: ffffc900011977b8 R08: ffffffff818212c2 R09: fffffbfff0cdd669 [ 468.901401][T27014] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a7d9700 [ 468.909218][T27014] R13: 0000000000000000 R14: ffff8881220b1800 R15: dffffc0000000000 [ 468.917029][T27014] FS: 00007f4bfeccb6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 468.925793][T27014] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 468.932215][T27014] CR2: 00007fcef8db29c8 CR3: 000000011776a000 CR4: 00000000003506a0 [ 468.940130][T27014] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 468.947936][T27014] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 468.955744][T27014] Call Trace: [ 468.958877][T27014] ? __die_body+0x62/0xb0 [ 468.963036][T27014] ? die+0x88/0xb0 [ 468.966590][T27014] ? do_trap+0x1a4/0x310 [ 468.970673][T27014] ? notify_die+0x1b0/0x280 [ 468.975015][T27014] ? prog_array_map_poke_run+0x68f/0x6b0 [ 468.980479][T27014] ? handle_invalid_op+0x95/0xc0 [ 468.985251][T27014] ? prog_array_map_poke_run+0x68f/0x6b0 [ 468.990729][T27014] ? exc_invalid_op+0x32/0x50 [ 468.995233][T27014] ? asm_exc_invalid_op+0x12/0x20 [ 469.000098][T27014] ? prog_array_map_poke_run+0x332/0x6b0 [ 469.005565][T27014] ? prog_array_map_poke_run+0x68f/0x6b0 [ 469.011036][T27014] ? prog_array_map_poke_run+0x68f/0x6b0 [ 469.016504][T27014] bpf_fd_array_map_update_elem+0x201/0x310 [ 469.022228][T27014] bpf_map_update_value+0xbc/0x420 [ 469.027173][T27014] __se_sys_bpf+0x7687/0x11cb0 [ 469.031778][T27014] ? __kasan_check_read+0x11/0x20 [ 469.036638][T27014] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 469.042449][T27014] ? __x64_sys_bpf+0x90/0x90 [ 469.046880][T27014] ? __mod_memcg_lruvec_state+0x131/0x310 [ 469.052432][T27014] ? __mod_node_page_state+0xac/0xf0 [ 469.057551][T27014] ? lru_cache_add+0x15e/0x380 [ 469.062154][T27014] ? __lru_cache_add_inactive_or_unevictable+0x37/0x160 [ 469.068923][T27014] ? _raw_spin_unlock+0x4d/0x70 [ 469.073610][T27014] ? handle_pte_fault+0x1472/0x3e30 [ 469.078657][T27014] ? vmf_allows_speculation+0x6f0/0x6f0 [ 469.084032][T27014] ? __kasan_check_write+0x14/0x20 [ 469.088966][T27014] ? put_vma+0x8f/0xb0 [ 469.092888][T27014] ? __handle_speculative_fault+0x10c1/0x1e90 [ 469.098864][T27014] ? finish_fault+0xaf0/0xaf0 [ 469.103385][T27014] ? set_current_blocked+0x40/0x40 [ 469.108329][T27014] ? __kasan_check_write+0x14/0x20 [ 469.113270][T27014] ? __se_sys_rt_sigprocmask+0x30a/0x380 [ 469.118740][T27014] ? debug_smp_processor_id+0x17/0x20 [ 469.123947][T27014] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 469.129845][T27014] ? irqentry_exit_to_user_mode+0x41/0x80 [ 469.135401][T27014] __x64_sys_bpf+0x7b/0x90 [ 469.139652][T27014] do_syscall_64+0x34/0x70 [ 469.143910][T27014] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 469.149639][T27014] RIP: 0033:0x7f4c0008d299 [ 469.153887][T27014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 469.173329][T27014] RSP: 002b:00007f4bfeccb048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 469.181572][T27014] RAX: ffffffffffffffda RBX: 00007f4c0021c130 RCX: 00007f4c0008d299 [ 469.189381][T27014] RDX: 0000000000000020 RSI: 00000000200005c0 RDI: 0000000000000002 [ 469.197195][T27014] RBP: 00007f4c000fa8e6 R08: 0000000000000000 R09: 0000000000000000 [ 469.205005][T27014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 469.212817][T27014] R13: 000000000000000b R14: 00007f4c0021c130 R15: 00007ffda0d58838 [ 469.220633][T27014] Modules linked in: [ 469.356813][T27014] ---[ end trace 6a55db38f499af96 ]--- [ 469.362178][T27014] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 469.368560][T27014] Code: 93 e8 ff eb 05 e8 01 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff <0f> 0b e8 da 92 e8 ff 0f 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f [ 469.388710][T27014] RSP: 0018:ffffc90001197720 EFLAGS: 00010293 [ 469.398551][T27014] RAX: ffffffff8182161f RBX: 00000000fffffff0 RCX: ffff88814887e2c0 [ 469.408037][T27014] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 469.415811][T27014] RBP: ffffc900011977b8 R08: ffffffff818212c2 R09: fffffbfff0cdd669 [ 469.423701][T27014] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810a7d9700 [ 469.431564][T27014] R13: 0000000000000000 R14: ffff8881220b1800 R15: dffffc0000000000 [ 469.440016][T27014] FS: 00007f4bfeccb6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 469.448813][T27014] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 469.455270][T27014] CR2: 00007f4c7f625178 CR3: 000000011776a000 CR4: 00000000003506b0 [ 469.463020][T27014] DR0: 0000000000000000 DR1: 0000000020000300 DR2: 0000000000000000 [ 469.470934][T27014] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 469.478736][T27014] Kernel panic - not syncing: Fatal exception [ 469.484930][T27014] Kernel Offset: disabled [ 469.489077][T27014] Rebooting in 86400 seconds..