last executing test programs: 1.128209038s ago: executing program 3 (id=8507): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x20000000000001b9, &(0x7f0000000a00)=@raw=[@printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7fffffff}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x93, 0x9, 0x9, 0xf2eb, 0x1}, @alu={0x7, 0x0, 0x4, 0x7, 0x4, 0x20, 0x4}], 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) (async, rerun: 64) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) (async) write$cgroup_subtree(r3, &(0x7f0000000000), 0xe) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x80) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r5}, 0x8) (async, rerun: 64) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x5}, 0x90) (rerun: 64) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500040000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='sched_process_wait\x00', r8}, 0x10) r10 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r9}, 0x8) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000008000000000000005805000018100000", @ANYRES32=r11, @ANYBLOB="000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r10) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={r10, r12, 0x4, r7}, 0x10) (async, rerun: 32) close(r6) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000d2098a52bb54ec0f01deb8c961ca6869f21a1eecbfb3b7b612cac122edef1bb035f29d956892271c206b277b9350f4a457335a0ae086e725194373c50adfed29e22f10f14e259d25236e3f667a2cf6056d72e1840e0ba429822674035f2944cc3ba1a80f1644a9062ddf9670371404f9511e92e5c3c604ef1076e0e4be82ef3dbd9e25"], &(0x7f0000000180)='GPL\x00'}, 0x3c) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) recvmsg(r10, &(0x7f00000005c0)={&(0x7f0000000440)=@can, 0x80, &(0x7f00000008c0)=[{&(0x7f00000006c0)=""/215, 0xd7}, {&(0x7f0000000540)=""/83, 0x53}, {&(0x7f00000007c0)=""/99, 0x63}, {&(0x7f00000004c0)=""/8, 0x8}, {&(0x7f0000000840)=""/83, 0x53}], 0x5}, 0x40000000) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) 899.269717ms ago: executing program 3 (id=8510): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (rerun: 32) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRES64=r2, @ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async, rerun: 64) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43451) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b40)={{r5, 0xffffffffffffffff}, &(0x7f0000000a00), 0x0}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_ext={0x1c, 0x16, &(0x7f00000006c0)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x97d4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}], &(0x7f00000007c0)='syzkaller\x00', 0x21, 0x0, 0x0, 0x40f00, 0x44, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002140)={0x2, 0x6, 0x81, 0x99}, 0x10, 0x2fcbf, r4, 0x2, &(0x7f00000021c0)=[0xffffffffffffffff, 0xffffffffffffffff, r7, 0x1, r6, r6, r2, r3, r7, r6], &(0x7f0000002200)=[{0x0, 0x1, 0xf, 0x9}, {0x0, 0x5, 0xc, 0x2}], 0x10, 0xffff0000}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) (async, rerun: 32) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000800)='ipi_raise\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r8}, 0x10) syz_clone(0x92104000, &(0x7f00000004c0)="024a803cd2578a84b1542c0ab90d983896d6326ab302c85b5cc2", 0x1a, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f00000006c0)) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xb, &(0x7f0000000d80)=@raw=[@call={0x85, 0x0, 0x0, 0x69}, @generic={0x8, 0x2, 0x0, 0x7, 0xd7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}}], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) (async) close(0xffffffffffffffff) 898.388907ms ago: executing program 1 (id=8511): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x7, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x1ff}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000792ba1abce2d20260f8e1fbffffb703000008000000b704000000000000000000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001b80)={{r3}, &(0x7f0000001b00), &(0x7f0000001b40)=r4}, 0x20) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r6, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r6, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r6, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x20048845) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) recvmsg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000340)='ext4_fc_replay\x00', r8}, 0x10) 875.955389ms ago: executing program 1 (id=8512): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x18, 0x1c, &(0x7f00000013c0)=ANY=[@ANYBLOB="18000000000000000000000000086d009500000000000000183800000100000000000000000002001850000009000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000d86b00010c000000b7080000000000007b8af8ff00000000b7080000030000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000000134ff01090000009500000000000000"], &(0x7f0000000400)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x32, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x3, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000010c0)=[0x1, 0x1], 0x0, 0x10, 0xffff}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001080), 0x4) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xe) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000007c0)={@cgroup, 0xf, 0x1, 0x6, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000680)=[0x0], &(0x7f00000006c0)=[0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0}, 0xfffffffffffffe42) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000800)={@ifindex, r1, 0x1c, 0x0, 0xffffffffffffffff, @link_fd, r2}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000011c0)={@ifindex, 0xffffffffffffffff, 0x2e, 0xc, 0x0, @prog_fd=r0, r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x31}, 0x3f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000058f70000000000001811", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a6558", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001200)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='io_uring_cqe_overflow\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) 799.111355ms ago: executing program 3 (id=8513): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7fffffffffffffff}, 0x14, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.parent_freezing\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r2, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc, 0x8}}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0xe, 0x0, r0, 0x4, '\x00', r1, r2, 0x2, 0x2, 0x4}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 796.846285ms ago: executing program 1 (id=8515): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1, 0xb, 0x103ba, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x6, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000018000000bca30000000000002403000040feffff720af0ff0000000071a4f0ff000000001f030000000000002e0a0200000000002604fdffffff000061140400000000001d430000000000007a0a00fe0000001f6114000000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a8642e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f30002af51efd601b6bf01c8e8b1fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06ad9ff616236fd9aa58f0177184b6a89adaf17b0a6041bdef728f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee389dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566de74e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48b936e6f9e0fcda88fe4413537528fd79153baae244e7bf573eac34b781337ad5901a4cad2422ee965a38f7defbd2960242b104e20dc2d9b00300000002ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec1aeaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab51380d7b4ead35a385e0b4a26b602396d0300c1e02b88c114f200000000f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb1188883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcc536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d648532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2654026c6ea08b83b123145ab5703dad844ceb201efeb6dc5f6a9037d2283c42efc54dd84323afc4c10eff462c8843187f1dd48ef0900000000000000ff0f4000000000f00700003c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fcdb4c1011e32f808890205f0e6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963442aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2869291b7d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e637d4219ef7ec61261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ecab5d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addbc4b3093c91b8068c5adfcb0d7fd8499045689166940600000000000000f520310a1e9fdc18cde98d662eee077515d0a881192292ffff53929a3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f0100e0eda300a43a13bd1b9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf699b3746979f99f6a1527f004f37e84fb478199dc1020f4beb98b8074bf7df8b5e783637daf121f175a81cffff4ac55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a4a274000000000000000000000000000000000000000000000009dd14b3892f5426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4120260ffcd030000006d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad64f50c1acb3928143be1c1023a375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10b0a1fcb1f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d3b332240d450fdb0a9a69f432e277f3a0386eb2bd1305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07e18b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e8c0a0d213c3ffad44d2a376def42e41e9fc3167a257e040fa7cf32c221aaac6cfdeb33c27500001a0000000000000000000017350000c11ae694b0c69c2c03f6790044a357e785af6e153d6f1ea460af92c7cbbd6295afe740f5e154346d483e0d10522a7a945993fb705b95b6aae27a8fab1e6984c8bdc12360627137ab6737b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481ffe46a4ce86be0b1f8eee42a611a35cb62c8f76040a08a7935414f262d44ca450b14586ed63dd92005c79e4a8ab8a94f0b74903580ac98708007c80d6c7d0de4614195e40d797c0348dd70f36a220e8b3710fb5358c27e90793bcb9ee6319342c4b239ca8cbc6fc83d32e6eb62ad92e43991f2447be9c2a1ae1119eafb901a43d57e885116d19aa152bfb89f8d0b2516f80120a1cddff771657f3d0288ec3899f1e3ba0151c4037148fb479de703f06000000349c28d1b107d859b4961324c17756dde99de1924a1d2b7095d34a55060f47f4407d89acf9f285b20c2e6b3d0491d0d3591b0d94713332b6b79c8297117b0d14eff64e0aca8a4b4aa773d8fba1217ea619952419bb9dd998d0ec870ff00b6d556018602738fbc6cec89d6dd13cf55b96f6fe9a137d2d6a56ad78e52c23ed080000000000002bc261a781fd14126c146a0aac4221839a4b9bbf61e4bba695a41e2109eba8e40c0400000051ffadbd15cafc97a4d3edfdcb9b5729307c6bdaf7b69325fb05fa8a9869de0600ee477d71bf3e36d1d9019edfa27aae24b632f251df210c86a18fae731ecb8b0d48357378caf2b6789509b1bacfd4fa812dc341875cfa5e798bbf59770000000000000000c8a594ea3c3347962d9113b1fecdfad5a8da641053f02e49456f5d21674521e67a5b18ea451eccf69dd6af928d2d68da9304a296c22fdcea26498d26229110b1aade386b113045033a6188d56e675564d8cb8d5b40114b0f5bf15dd64c9ece60b8588ee8777d0ea8f4713b258427c7d90f9efffffffffffffff78ae790f74cc41ae5795835f3cec40dff485d2802c08611454d9ea784a205bcc07ec26f906f3cf45bb37014ab6f22af6213618e242b283ea9d3f0677ee598072ec06f7170009d92bb7ed9d12c378dfd3e74ec056ee83eef666423d934fc5908c9ff98715218a5964f1e00000000426ac9588e27aefe307f49662990ee823568bbc2f89596ced7c6c52d76b8096f1848410843b93fd404f535be474f456778b5ef85abb8fc2336abd5ea64a6efea8a5aca0015499b88ae780a7bae4df603bd3c72808cf300440b1b638a6640f7de8d0d82f359ca2f779cd48cd8d3603f4f69e47f386988c9b7b5d6dd3d48a1fdca780049d7c87bea42161a4c0d7cf0125b43dc9d8845f3c05a08acda647e7143d0e0aee2949a45e2848890522c2288072467d2afe269f589fb7e034b92d3ca245b16b71998711bfe206c9690b6d0eebb06a29349229eb45ff15c63aa2c82c56d7420738cd1b04eb16e87cb524315d7361ea3635d3799bb7fcc56aa5e1dbe031a7a12554dee6754b72f43a6fddf427f32ec3df274a88097725679769beebf1aa6eb09d5154e4900000000000d0f7160a05911d969879953d3d4702b78825d5ed789711b77d40dc31e0b8fc651b45559da463f0000000000000000000000000052d42124e9c26aba885015e69d42ecd710342ac597ebea576ae15fdf611356f622e831741ab15549e0d7a2bd0324e2b3b48a10551607492c19eaf58485feb4cab19c303b30ba2ddea0d792d77724c9fa4ed58b93668fc20484f141ee2b6a0029e88fdc853189b4dafd36ff23b11967090e508f45e3f10857038a52ef275cf9e3e4b5d30b12d138dfa70930c603b5e3f4b7be67be3dba3cbd8d4d143195af0697d779445d67dcfbd922d12a8b49f93eac7a72faacf80346b3b6000000000000000000000093f4713ae4578f6b8c2db36802bf47511b4f66b32e0b100a14b8e02d791cdeb30951aed3589df3dfaa64f96842797f45129d1092408a09609d3a619ee9da19cd8cccb34b2c1456cb2e5bcb9b4f7f48afda72204c97a25bf1653845c090260fcc39eb91151c4c31777d512e7bf0e61dbdcb20d981ffeec3a5461b92dfaebbcf801ffbee82a1631218c103ccbf67d98ed078b3a3aa0e40279bab29ecfc49939bb5440b1dc2952a621b189d137081fd7ed30c983849b2382af9ffd1c1c351d4392364e6d3294096c42a95fd03200a21681509e1a9499a46d2762fce4ebb69142d47f171729e6c0bf18e253e9d120e0b4f665ad67ec403b516d2548c0062880bd2a8808ceab03da88a59e55effde33960fbad03c55dc4db0ac7972c9f3e75a590a4077d4f7cf9741eeb9fe9c90d6cdce0161a992d63e"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffff8, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='ext4_es_find_extent_range_enter\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) socketpair(0xe, 0x6, 0x3, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x28}, @call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 663.919486ms ago: executing program 3 (id=8517): close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x93, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xd, 0x3, &(0x7f0000000200)=@framed={{0x85, 0x0, 0x0, 0x0, 0x90, 0x4}}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000800)='&,\\(\xcc.)\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x6b, 0x11, 0x1c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x16}, 0x70) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000040)='memory.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r2, &(0x7f0000000080)={'full'}, 0xd) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001380)={0xffffffffffffffff, 0x58, &(0x7f0000001300)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000013c0), 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000feffffff850000007100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffff65) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x5, 0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0xc}, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x40305839, &(0x7f0000000540)={'\x00', @link_local={0x1, 0x80, 0xc2, 0x5}}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, 0x0, 0x26}, 0x20) gettid() 653.610477ms ago: executing program 4 (id=8487): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x0, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r3, &(0x7f0000001a40), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x3, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000002) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000300)=':\x7f]!]\x00'}, 0x30) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2300f6"], 0xffdd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 600.986691ms ago: executing program 0 (id=8519): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x8400, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000480)={{0x1, 0xffffffffffffffff}, &(0x7f0000000400), &(0x7f0000000440)='%pK \x00'}, 0x20) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x1}, 0x48) r7 = syz_clone(0x844000, &(0x7f0000000540)="a8b2ed7aa7015312f0d8546133a68da0958014ba4e1bb61f4fe61298cabe5bb05887365db26e17a7504a4977d3b842e2ae384de822580dc5773bf94260dfec74677eb38580fcd134ab8d068274ca1e6c8d0ce4e5d61d54ef517fd42bec901d0551c0ef984ceee4931b947af15333d815ff98ff97865eeee038d401c9b796fae55a66d1c309e5633933ad283241825ec2d7de6d", 0x93, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="9855cf8958c601267e50bb461ae476dbaf61518fdead56d526aff0814e8a0447258f54832e01484d81a5444aff3b5d7b4c527b7b31e2c031b7657827d51573931410") r8 = syz_clone(0x5000, &(0x7f0000000700)="2bd61ea770b4c648b990681b9baa24ecb988b69a0b822bac", 0x18, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)="02cfb5ce6d41608fce7353b0854b7aee15ccc38a0cf71d6a8442af924590a8190066275e95ef37ae425d706c23d428a957d5223fcc8b6e8b78095191df190ba8669cb55bfc8f7ef9982b62586e96898f39d12d3980b8aa423f8ebe3e2af1b4ca619eb42e7064a141a8f5f3cf9e3c3d81ba1283534735c5f9a5e3556d034b3f6f7fad26ad923fa07d946e1dff05ef2d1d97a25fb76ae8cb4fad737d270911e28569a4eb4ea240c31f93f6fce0e40a3c6f91ab959f073e2ada789f034eaff50591f8b8f0069dbffd035754c4ac136facfaa7afc0960c19406fa15484962f10a03cb8") r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000001540)=[{0x0}, {&(0x7f00000013c0)=""/232, 0xe8}, {0x0}], 0x3, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYRESHEX, @ANYBLOB="d2c1a087ccc839339a987a844b7454caecdb99766d21a63d9148d0f541472bc8180957d6d852301df4a1d28a81c35a0257bc3d0db8bf9253301114741ed45097f5e670a0ed072916d39b4a85248d49fb3a5330c309fd8f5d5eb9fdeb2938690ead567ffc8008206c17a07c5a7e8e18f4b56d3801f14605d2daefe42df02f301ae3852a150fbdc4be3cd8e0d26678bcc7a85f", @ANYRES32, @ANYRES16=r9, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r10, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX], 0xe0, 0x20000001}, 0x4d803) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.kill\x00', 0x0, 0x0) recvmsg$unix(r11, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f00000004c0)=""/136, 0x88}, {&(0x7f0000000580)=""/124, 0x7c}, {&(0x7f0000000c80)=""/118, 0x76}, {&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000800)=""/151, 0x97}, {&(0x7f00000017c0)=""/4096, 0x1000}], 0x7, &(0x7f0000000a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100}, 0x40000002) r24 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9020, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r25 = getpid() perf_event_open(0xfffffffffffffffe, r25, 0x9, r24, 0x1) sendmsg$unix(r21, &(0x7f0000000d00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000b40)="d83f015fba490f60aa1c040a6b8d645d52c4fffed428fb7822c3bb2cfdb6f656d6dbb75ad4d9905a90ef2cac25a0c361868e7864fd358fea192252e83d22f1aad6ab02bab4814c1c83d6fbb693217f", 0x4f}], 0x1, &(0x7f0000000d40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r23, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r12, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r18, @ANYRES32=r13, @ANYRES32=r15, @ANYRES8=r22, @ANYRES32, @ANYRES32=r19, @ANYRES32, @ANYRES32, @ANYRES32=r11, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r18, @ANYRES32=r14, @ANYBLOB="000000001c00000000000000908f69799ec534bd", @ANYRES32=r18, @ANYRES32=r13, @ANYRES32=0x0, @ANYBLOB="00000000e60951c91c000000000000000100000002000000", @ANYRES32=r25, @ANYRES32=0xee00, @ANYRES32=r17, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r20, @ANYRES8=r17], 0xf8, 0x4000040}, 0xef9ef537f58a42da) r26 = syz_clone(0x1040a00, &(0x7f00000008c0)="8c3b628d5dcbb3e2c6158085657b20a03f064e4032bc0759b829e48b4f5c", 0x1e, &(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)="a321ba1ee1ab3a4ad16fb4174402394860f7e2d54cf57752b017cde50139ca9b69d95a9020e0479576a2645c345499cf325e4958d16dde19fb0bf5026894f9035796f40f20d4d70d4281f0cbd2e5614a439457c11ac23accc890f5aae18ed3455a745d35b03e65f60255d9213c7e96f3bc00aafe5d44bcdce0085af33fda67ecff8972") r27 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r27}, {0x7, 0x0, 0xb, 0x6}, {}, {0x85, 0x0, 0x0, 0x8a}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r28 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r29, &(0x7f0000002ac0)={&(0x7f0000000880)=@abs, 0x6e, &(0x7f0000002a00)=[{&(0x7f0000000900)=""/4090, 0xffa}, {&(0x7f0000001900)=""/245, 0xf5}, {&(0x7f0000002b00)=""/4096, 0x1000}], 0x3, &(0x7f0000002a40)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYRES64=r30], &(0x7f0000000180)=""/179, 0x51, 0xb3, 0x1, 0x9}, 0x20) sendmsg$unix(r0, &(0x7f0000000b00)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000200)="cf265055c21bba9fa33ee933b395720e61c42fed4d5a87a9e56dac75c7c2735e91784a53ecbe3d2e11bff1540a0ae8e090044e86f52d6bc3f7fe0f8ef489fd126115c8becf4cef62bbb26a4985054b841029922b", 0x54}, {&(0x7f0000000280)="64f6ca347c6b9d8a22", 0x9}], 0x2, &(0x7f0000000a40)=[@rights={{0x28, 0x1, 0x1, [r1, r2, r3, r4, r5, r6]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r8, r10, r17}}}, @cred={{0x1c, 0x1, 0x2, {r26, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r27]}}, @cred={{0x1c, 0x1, 0x2, {r28, 0x0, r30}}}], 0xc0, 0x49c1}, 0x2048010) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x3, 0x3, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) 599.952382ms ago: executing program 2 (id=8434): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000aecd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000020000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662db1c9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafedcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd89346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12282ce24463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f09000000000000004fc4bda3453602004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0731c4b839688b22c4da2a6bc4cf45854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da75561173fa186cb7ee86dd4285c4721eb428c953296bb2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e6742c2ddc3a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e96ae2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc0cb64b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33af000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x6, 0xff, 0x81, 0x9, 0x0, 0xffffffffffff0bce, 0x4000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0xfff}, 0x10c84a, 0x6, 0x20, 0x1, 0x7f, 0x6, 0xff, 0x0, 0x7ff, 0x0, 0x9fdd}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xc000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x0, 0x2, 0x0, 0xf, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x46}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x1a, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) 511.840839ms ago: executing program 1 (id=8520): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000080), &(0x7f00000004c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)=ANY=[@ANYBLOB='1-2:C'], 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x7}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0xfffffffc, 0x7, 0xff, 0xa2c, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='jbd2_handle_stats\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000000006c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000b49b008500000006000000850000002300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='jbd2_handle_stats\x00', r7}, 0x10) unlink(&(0x7f0000000080)='./cgroup\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="0c02"], 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x8, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000300)={r8, &(0x7f0000000000), 0x20000000}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) 508.700769ms ago: executing program 4 (id=8487): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x0, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r3, &(0x7f0000001a40), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x3, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000002) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000300)=':\x7f]!]\x00'}, 0x30) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2300f6"], 0xffdd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 489.266461ms ago: executing program 0 (id=8521): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x18900, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'team_slave_1\x00', @link_local}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000100)={'c', ' *:* ', 'rwm\x00'}, 0xa) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='devices.list\x00', 0x0, 0x0) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='./file0\x00'}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0x12, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xda, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@map_fd={0x18, 0x8, 0x1, 0x0, r3}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xa1608b8094c37d85}}}, &(0x7f0000000280)='GPL\x00', 0x3, 0x72, &(0x7f00000002c0)=""/114, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x10, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x4, &(0x7f0000000440)=[r3, r4, r3], &(0x7f0000000480)=[{0x5, 0x1, 0x3, 0xc}, {0x3, 0x2, 0x10}, {0x0, 0x2, 0x4, 0x3}, {0x3, 0x5, 0xb, 0xa}], 0x10, 0x6}, 0x90) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000580)={'syzkaller0\x00', 0x400}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000600)) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000640)={'veth0_to_team\x00', 0x4000}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='module_free\x00', r3}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x129202, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000740)={r3}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='xen_mmu_set_p4d\x00', r5}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000840)=[0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x4d, &(0x7f00000008c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x5e, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000b00)='signal_deliver\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000b80)={0x0, r6}, 0x10) (async) write$cgroup_int(r3, &(0x7f0000000bc0)=0x9, 0x12) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000c00)) (async) openat$cgroup_ro(r2, &(0x7f0000000c40)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) r8 = syz_clone(0x100, &(0x7f0000000d40)="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", 0x1000, &(0x7f0000001d40), &(0x7f0000001d80), &(0x7f0000001dc0)="c36163b3224a6d84c8eab021423ac41dd8614e254aafe8b5ca19026cd8c604a903c8f259427badbb33f186d5c290ccd3caf710e62b979a87a0c9dfe1f304c07fdb520e3d487f4fe659a88789982d969c4ae0a94ceac4636ef1cb15b61256272e1f122c3b3d4051194cbc6e542c1c5541961f89") perf_event_open(&(0x7f0000000cc0)={0x3, 0x80, 0xe, 0x2, 0x0, 0x80, 0x0, 0xffffffffffffff24, 0x51114, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000c80), 0x9}, 0x100, 0x1, 0x0, 0x5, 0x1, 0x8001, 0x0, 0x0, 0x1, 0x0, 0x6}, r8, 0xa, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000020c0)={0x6, 0x2, &(0x7f0000001e40)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xc000000}], &(0x7f0000001e80)='syzkaller\x00', 0x1, 0xb5, &(0x7f0000001ec0)=""/181, 0x100, 0x10, '\x00', r7, 0x25, r3, 0x8, &(0x7f0000001f80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000001fc0)={0x2, 0x5, 0x8, 0x9}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000002000), &(0x7f0000002040)=[{0x1, 0x3, 0x3, 0xa}, {0x5, 0x2, 0x5, 0x6}, {0x5, 0x5, 0x10}, {0x1, 0x5, 0x2, 0x7}, {0x0, 0x3, 0x10}, {0x4, 0x1, 0x6, 0xb}], 0x10, 0x5}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000002180)=@base={0x14, 0x8, 0xff, 0x3, 0x848, r3, 0x2, '\x00', r7, r3, 0x1, 0x3, 0x5}, 0x48) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000002200), 0x90000, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002240)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002280)) 488.30235ms ago: executing program 2 (id=8434): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x6, 0xff, 0x81, 0x9, 0x0, 0xffffffffffff0bce, 0x4000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0xfff}, 0x10c84a, 0x6, 0x20, 0x1, 0x7f, 0x6, 0xff, 0x0, 0x7ff, 0x0, 0x9fdd}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xc000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x0, 0x2, 0x0, 0xf, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x46}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x1a, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) 402.209008ms ago: executing program 3 (id=8522): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x8, 0x8, 0x8, 0x8, 0x24a, 0x1}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYRESOCT=r0, @ANYRES64=r3, @ANYBLOB="00000000fb854903ffc6b8a0f924df7500000000b7080000000000f8798af8ff00000000bfa200000000000007020000f8fff88c597637143e4ab2ffffb719feffffff0000b703fd00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_sync_file_exit\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000000b7030000b2f17db98500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000280)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8b64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r9, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/60, 0x3c}], 0x1}, 0x40fd) close(r9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000a40)) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='ext4_forget\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x245}, 0x10, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000b40)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000600)=r4, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) 398.623688ms ago: executing program 4 (id=8487): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x0, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r3, &(0x7f0000001a40), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x3, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000002) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000300)=':\x7f]!]\x00'}, 0x30) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2300f6"], 0xffdd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 336.887443ms ago: executing program 0 (id=8523): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0xe) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xb, 0x1b, &(0x7f0000000140)=@ringbuf={{}, {}, {}, [@ringbuf_query={{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}}, @printk={@llx}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x4, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000005c0)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0x4, '\x00', 0x0, r0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000010000000004000800000000085001ef929833a6651363a6011f36d8053f32831961c034b6246c6fe9f538723829c67bd1747"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000200), 0x6e, 0x0}, 0x400100a0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0x3a, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000071120e00000000009500000000869100"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) close(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xffffffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) 335.068533ms ago: executing program 2 (id=8434): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x6, 0xff, 0x81, 0x9, 0x0, 0xffffffffffff0bce, 0x4000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0xfff}, 0x10c84a, 0x6, 0x20, 0x1, 0x7f, 0x6, 0xff, 0x0, 0x7ff, 0x0, 0x9fdd}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xc000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x0, 0x2, 0x0, 0xf, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x46}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x1a, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) 289.863516ms ago: executing program 1 (id=8524): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='module_request\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x12, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x8c}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) openat$cgroup_freezer_state(r2, &(0x7f0000000000), 0x2, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) 289.325627ms ago: executing program 4 (id=8487): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x0, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r3, &(0x7f0000001a40), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x3, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000002) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000300)=':\x7f]!]\x00'}, 0x30) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2300f6"], 0xffdd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 227.177732ms ago: executing program 0 (id=8525): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x894a, &(0x7f0000000040)={'veth0_to_bridge\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x8c}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 225.691452ms ago: executing program 2 (id=8434): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x6, 0xff, 0x81, 0x9, 0x0, 0xffffffffffff0bce, 0x4000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0xfff}, 0x10c84a, 0x6, 0x20, 0x1, 0x7f, 0x6, 0xff, 0x0, 0x7ff, 0x0, 0x9fdd}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xc000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x0, 0x2, 0x0, 0xf, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x46}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x1a, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) 177.140276ms ago: executing program 1 (id=8526): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000000400000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000023850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) (async, rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000001c0)) (rerun: 32) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async, rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) (async, rerun: 64) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_freezer_state(r8, &(0x7f0000002b00), 0x2, 0x0) close(r9) (async, rerun: 32) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) (async) sendmsg$tipc(r4, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r4, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) (rerun: 32) sendmsg$tipc(r4, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) setsockopt$sock_attach_bpf(r3, 0x1, 0x21, &(0x7f0000000040), 0x4) (rerun: 32) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x7, &(0x7f0000000340)=ANY=[@ANYRESOCT=r6, @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdd8, 0x0, 0x0, 0x0, 0x4}, 0x90) (async) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xe, 0x6, 0x2, 0x3, 0x2800, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r11, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r11}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x19, 0xd, &(0x7f0000000380)=ANY=[@ANYRES8=r2, @ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=0x0], &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd5d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 175.887736ms ago: executing program 4 (id=8487): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x0, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r3, &(0x7f0000001a40), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x3, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000002) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000300)=':\x7f]!]\x00'}, 0x30) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2300f6"], 0xffdd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 104.452652ms ago: executing program 0 (id=8527): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xb, &(0x7f0000000400)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4ab}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x2, &(0x7f0000000000)=@raw=[@generic={0x6, 0x7, 0x0, 0x2, 0x8}, @jmp={0x5, 0x0, 0x8, 0x8, 0xb, 0xfffffffffffffffc}], &(0x7f0000000200)='GPL\x00', 0x10007, 0x44, &(0x7f0000000280)=""/68, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x3, 0x9, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2, r2, r2, r2, r2, r2], 0x0, 0x10, 0xb1c}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x9, 0x4, 0x1000, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r9) close(r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00', r6}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000380)={'dummy0\x00', 0x2}) write$cgroup_int(r5, &(0x7f0000000b00), 0x12) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8912, &(0x7f0000000080)) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='sys_enter\x00', r12}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) 97.336172ms ago: executing program 2 (id=8434): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="850000002a00000025000000000000009500000000000000aecd48d6494d614dcc6fab5335ec470db2c6161dba392176dd2963038e1d69ba7ea94c500dc4ef2fad96ed406f21caf5adcf920569c00cc1199684fa7c93836d9ea2cfb0e60436e05425cc4686b066707de94a4f4d5fc79c1faca0f9d9924be41a9169bdfaf16da915b2e249ee1c6eee84309e7a23c19a39484809539fca4e0b6fab1aa7d55545a34effa077faa55c59e88254f54077f799bf168301000000bf2255d6a0244d35b213bda84cc172afd8cc2e47a7d8b85a5e3d77ac463920e231b7ae0da8616d2b79db2e3d5986c82b5aa94e539b204d58f91f5da6c025d060ab186d94af98af1da2b5952eb15855933a212304e035f7a35dfc72c81256a55a25f8fe3b28d7e53c78fbfe5ab0255f347160ec83070000020000004015cf10453f6c0b973b81a484ebad04859d928365a7ea3fab8b4b380a00d72b0000000000001cf555c14d56b51c2298237bebfc08e0d5976a942b846970cfd98b9d4139f1111f2cc5e46ac1c60a9b030074bfbcd4b09012175484135f0e519f0b1e4aaa026d570ecb5e8cddbed65ff702000000a3ff4f8a4cf796b07a6ff61c5552417fd703f7f14d8b78ac02ca3cdf6a662db1c9c89c9120072a5d00dcdd8595356c9b2492aaf1264d4ef4a410c882834867bcd2b6e559d17879570c8ad943e392955f4f979ea13201bafedcd2063d11dd665647223c78a996810000000571cbb17d9f37282462f0e9c147c0d497c61433c6ccc35601eef97ee611be8c97f4151ffdf6f7820549cda6cb799c6e924966a7f90bf8fd1e75ee76bd89346cfbb5567e54d3504723177d356c4604b7a492ecec37e83efceefd7ca2533659edc8be05cc85451c6a14507434eb54b6f43caea5c4bf690441974b155f5adc681a03c0bbb8358856175e2ce8b0cbbbe3c033e54ffca9ec9a7a3755e0f209150a07682c4e14e3a83558df6f3fc97f1730a136bdee07e98cb984b2e2304a1b63afefdb636e56bbaae4e62136574bc6371a0bb2be1a962aae9c1258da6ef590e1d85ea9e12b3025f43e7e08ccffc5064dea4c39cf4b98e1fc6efb5978f51e16b678eca0b658a56008948e561a9845e4ff29e2bdb1d0b923b272341c5e093fd66a294351c5356c1d06c92cf8ce3c7c56cd31121624d74517fd3666277f670e812b28e2f30d035cee5d0e77a3c7220000000000000005a474816bc59d2e2a00092419304b338a987e9d3044d856ce24f370030be3b5f79f034b8d3ebce68663ef5af469abe75b314fae31a0445859a5ece8fb11a4ee8e46354c9c3a041e12282ce24463aaf28345bd168b4177ce37ed85464c31679053e7f9d04bb5cb51da0b7958989fd70f09000000000000004fc4bda3453602004535a976eacd3adaa4d2ee6fe0d072ccd44341f7fd53df58ae791ee8b489a7c9efe3625a9d971b5997485d6a063dc6f7359e2eccc2fb39d401adf59d44e58eb1c60b3475be31a9b7cf42b6402312d2725b8d9fa700a86407e79ae29d2c117ca65fc86c2dce97aa03279a66ec87122219b0f796ab92b1adecae50fdb40f7f02f750d6c977a191852c9ae031db044b2353199546609f9f69a6cfefdf879d447df53f3b9b70d10355b00300000000000000553d18a6cc50feeb7bfad9b7be3283b6450d264e7712d2f1d7004548b19162cef04d18d4f5987baab97a9bfbd8f185b5631820420bf5b6522c0e21c882c66f4f25ffb6d95e07de02205fca4f18a2eb5b63e45d5d80fe527340935aa3c0b4f3f45bfff2418a18217747ae442e31560e5b741445ea2a1acee2a81425ff000000d2a0a765d20b30f87af976a46f9a9a1ac7dea1ea6845f9aa6623920dacc107f532348cc21164efe794874eac73381e961f3d9c8c21578fe3245097c280abe51427b9f6cd72b5da6d0252803c66730cd5eac907f09b9695906313f88735fce5115dc83ed73d8ee4a91322608c6fc01e1b9e16587bb5f721303e6b89e5c54d680ac66d09af90dbf5000000000000fa08ad0731c4b839688b22c4da2a6bc4cf45854d221a2d5f96bc64647f15daa2ba79cd0f4254ed55217912ef84bd2927df82fc061aef2920c49b2a90886da75561173fa186cb7ee86dd4285c4721eb428c953296bb2f5d825da54dbef07c1b349b4901e093d13e6b9a0000009b5b22e887bc061d40bcaf0aa18623fd9b7179ccc692ba74b531b65c4decf9d080a8ac7e82d4cde1267aa64b2a94fd87a009e6742c2ddc3a9d7eccbb1831b1fa218277c2814a91cab7cb59c697166d6f1bb1a360470000000000000000000000000000000000000000000000000000f9f9b4ce7e871f507084c8c88e0652decbe579b03ed84ea94597dd1059620a050f69ea03b99b4e19d35f4a3b54e96ae2172effecec80f6baa4bf69a6ebf5392882df78b0983e662dc0cb64b77f3f006b6b25443197ae93f0be6de5a703d003f00720943c0e4b33af000000000000000000"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x6, 0xff, 0x81, 0x9, 0x0, 0xffffffffffff0bce, 0x4000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0xfff}, 0x10c84a, 0x6, 0x20, 0x1, 0x7f, 0x6, 0xff, 0x0, 0x7ff, 0x0, 0x9fdd}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xc000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x0, 0x2, 0x0, 0xf, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x46}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x1a, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) 46.540097ms ago: executing program 3 (id=8528): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x4, 0x6, 0x6, 0x4, 0x0, 0x1, 0x2422a, 0x6, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20000, 0x6, 0x1, 0x5, 0x4, 0x2, 0x7, 0x0, 0xfb57, 0x0, 0x6}, r0, 0xa, 0xffffffffffffffff, 0x5) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) 44.047447ms ago: executing program 4 (id=8487): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x0, 0x8}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4}, 0x48) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0xa, 0x4, 0x1, 0x0, r2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001b00)={r3, &(0x7f0000001a40), 0x0}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x3, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x40000002) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000300)=':\x7f]!]\x00'}, 0x30) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) (async) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1b2300f6"], 0xffdd) (async) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.69244ms ago: executing program 0 (id=8529): r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000001a00)=ANY=[@ANYBLOB="850000002e0000003500000000000000850000007d0000009500000000000000f4670880271e3503200ffa9585fba2c8c037c5a142dfa8d76287066c5197fabd5f98cd34d5aeed8d38e65cb6e22fd7dde54704d25c79949c23e2eb15d755a22400a7c09cc28d7673294f42a5f0a8320e13822c45c0f8612c10b100000000b0d3712c93363af3c075ff1e23166a32d954ffbb755a2dd576090c4867a7b6393e366c6386d5ec7209d031576e51a8f57846c74481f3803a195cc037102124d85cec074c6949e1298901ebb39522f6649dd76d047a82f5fe47fe5f17f9ab800f4104dbaba46aa43a815b1e5c6d1d224b64be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea760c1f2c221c110ef4b253d110ee282ab76f5939928cf95846be6277c04b4c5324812696a623cd8a4f8dc8dcba00b1b2d2747c45b0c52087b5efabf8496b9a951667d510ba0e37b56c0ebfb19a34268335648e1f844ce328c10752a42dca52fb9481452b6518a6ed7297f9b2744419a2f238f173d0cd46dafc6ac5500f53e5309d891d83cf4fbd775d9c07d8d591a4dac60ff000000b78863e6b41c70aa00000000000000000000449c810d3174c87ee545867a7a8b2074009a3b54026e2e613814c66686b201abb3db4f8acdce6b3a7a4908a365d6788c75149b6f1f2395d97b59c4d095eec1c274e143c30f72b5ac2ce03c8ea8239ab03ce67c0e41ffea99e36a63a7785086b3b95038fde89f0751819ecb4565529a99b15d54d0ace0e05de6b42429aa68209b7b0d1cd172f49b11b11e75eac0153ca8e7576ebb57fd919b2027cfaf70a4b6390d3cc6d21452d659731d78ef2f0fe56b54b18f93d9abf3831eb28ca735e0414315969dda6265e7a4be91a63eec42b9e599e0dbccbf55bd628a773bb6a1a2644ec629e125083dfbe978a2e675a3a125d0659c81f8ba370d45c95869eab7a61c73bd194ebb9d90b5ecb25f65629b91d4257e7d035e8e203b754e8c700b64106650d4b383c08fd2c8cfb93ee8ea9390f341c86be2cb000055a5362e836f9d8a8b38ba5f880dcc07cabcfe3f8b8ee32f7da1839c300b700e08ad43fa92b6b0fee33d9206e25437cd11209fd28aedcb81b11c4addbdace5381fba093573b3b99fcc24dabd835e3fb3c2be6eb6b17fa663f7a250a4d374f14e52b49fd37a7fa1fe04d8c18f2d8e631ba3041d5ecf344b6a0aaf221536a154106f42600c438bef9432f746c60a6874326425f11ec93003f9dda34c69880292da580d94dcbea3455e46cfce2936fe2509a874522745c77cecd1455195b9d10af5b84034be19289fa8abcdcad69b9b6209480e0811091c29e9efb8107d430a7b8474f524a8b7521818b531b70b4f35864f96f28607402b7aac2e25ad813556358939aeb52a5bf58006c13e47abf72932c1c34f2beaa221bf9a73ea08eb68ce445e9a2f3e3c14f2d12aa63b6ae30000000000"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff002, 0xe, 0x0, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x1e, 0x0, 0x0, 0x16, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdf1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) close(r1) (async, rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x20, &(0x7f0000000040)={&(0x7f0000000000)=""/62, 0x3e, 0x0, &(0x7f0000000300)=""/209, 0xd1}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) (rerun: 64) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4000000000000007911a80000000000009500740004000000000000000000004a2ac6fbd9be3b53c517fb3cd42e56d32f0dffea6ae0eece0cdb5ee11d4fbad9cfcad9bd8f4cf76777b89e8b65"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 0s ago: executing program 2 (id=8434): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x6, 0xff, 0x81, 0x9, 0x0, 0xffffffffffff0bce, 0x4000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x3, 0xfff}, 0x10c84a, 0x6, 0x20, 0x1, 0x7f, 0x6, 0xff, 0x0, 0x7ff, 0x0, 0x9fdd}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) r4 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0xc000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x1}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@struct={0x0, 0x2, 0x0, 0xf, 0x0, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x46}, 0x20) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0x1a, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x48, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x8, 0x0, 0x1000, 0xffffffffffffffff, 0x0, '\x00', r6}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) r7 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) gettid() write$cgroup_pid(r7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000), 0x48) kernel console output (not intermixed with test programs): slave_0) entered forwarding state [ 161.468363][T11385] device bridge0 entered promiscuous mode [ 161.630559][T11450] device pim6reg1 entered promiscuous mode [ 161.906780][T11492] syz.4.3208[11492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.906842][T11492] syz.4.3208[11492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.966335][T11485] device syzkaller0 entered promiscuous mode [ 162.204958][T11515] geneve1: tun_chr_ioctl cmd 35111 [ 162.283476][T11520] device syzkaller0 entered promiscuous mode [ 162.968868][T11597] €Â: renamed from pim6reg1 [ 163.373481][T11631] device syzkaller0 entered promiscuous mode [ 163.574703][T11642] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.581901][T11642] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.589745][T11642] device bridge_slave_0 entered promiscuous mode [ 163.659818][T11642] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.697689][T11642] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.797402][T11642] device bridge_slave_1 entered promiscuous mode [ 164.342892][ T24] audit: type=1400 audit(1720838469.380:172): avc: denied { create } for pid=11687 comm="syz.4.3275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 164.460979][T11688] device syzkaller0 entered promiscuous mode [ 164.639092][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.646963][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.668065][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.676231][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.684959][ T665] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.692032][ T665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.699720][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.708124][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.716261][ T665] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.723323][ T665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.731099][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.739056][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.747104][ T658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.863779][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.880269][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.894855][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.904023][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.913274][T11642] device veth0_vlan entered promiscuous mode [ 165.029667][ T7604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.039874][ T7604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.051218][T11642] device veth1_macvtap entered promiscuous mode [ 165.059863][T11718] syz.4.3282[11718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.059947][T11718] syz.4.3282[11718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.061740][T11719] syz.4.3282[11719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.084622][T11719] syz.4.3282[11719] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.173760][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.198065][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.206826][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.216909][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.226094][ T665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.727907][ T9] device bridge_slave_1 left promiscuous mode [ 165.733999][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.799733][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.831268][ T9] device veth1_macvtap left promiscuous mode [ 165.857869][ T9] device veth0_vlan left promiscuous mode [ 166.922832][T11783] device sit0 left promiscuous mode [ 166.955567][T11787] syz.0.3304[11787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.955657][T11787] syz.0.3304[11787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.210128][T11783] device sit0 entered promiscuous mode [ 168.636367][T11943] device syzkaller0 entered promiscuous mode [ 170.589169][T12128] device syzkaller0 entered promiscuous mode [ 170.595501][ T665] syzkaller0: tun_net_xmit 48 [ 170.608746][T12128] syzkaller0: create flow: hash 3604184541 index 2 [ 170.643144][T12127] syzkaller0: delete flow: hash 3604184541 index 2 [ 170.761851][T12156] Â: renamed from pim6reg1 [ 170.767087][T12154] syz.0.3401[12154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.772752][T12154] syz.0.3401[12154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.250334][T12215] syz.0.3418[12215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.299304][T12215] syz.0.3418[12215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.890756][T12260] syz.2.3433[12260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.902684][T12260] syz.2.3433[12260] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.183605][T12276] cgroup: fork rejected by pids controller in /syz1 [ 172.321090][T12340] device sit0 entered promiscuous mode [ 173.675627][T12390] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 173.687299][T12390] device syzkaller0 entered promiscuous mode [ 173.819292][T12420] syz.4.3465[12420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.819352][T12420] syz.4.3465[12420] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.420423][T12439] device pim6reg1 entered promiscuous mode [ 174.611032][T12450] syz.2.3474[12450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.611082][T12450] syz.2.3474[12450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.682141][T12450] syz.2.3474[12450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.693725][T12450] syz.2.3474[12450] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.837317][T12462] device veth0_to_hsr entered promiscuous mode [ 174.890838][T12470] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.897952][T12470] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.179636][T12533] O3ãc¤±: renamed from bridge_slave_0 [ 175.832931][T12618] device syzkaller0 entered promiscuous mode [ 175.885143][T12613] device syzkaller0 entered promiscuous mode [ 176.665150][T12725] device pim6reg1 entered promiscuous mode [ 176.795063][T12745] device syzkaller0 entered promiscuous mode [ 177.083543][T12764] device pim6reg1 entered promiscuous mode [ 177.963167][T12845] syz.2.3571[12845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.963231][T12845] syz.2.3571[12845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.368212][T12860] device pim6reg1 entered promiscuous mode [ 179.709963][T12933] syz.3.3601[12933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.710055][T12933] syz.3.3601[12933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.809612][T12933] device pim6reg1 entered promiscuous mode [ 179.895603][T12941] device dummy0 entered promiscuous mode [ 179.984429][T12946] device bridge0 entered promiscuous mode [ 180.860343][T13001] device pim6reg1 entered promiscuous mode [ 182.305410][T13052] device pim6reg1 entered promiscuous mode [ 182.750247][T13051] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.766534][T13051] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.774121][T13051] device bridge_slave_0 entered promiscuous mode [ 182.781014][T13071] device pim6reg1 entered promiscuous mode [ 182.800740][T13051] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.817896][T13051] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.825375][T13051] device bridge_slave_1 entered promiscuous mode [ 182.947076][T13051] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.954012][T13051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.961091][T13051] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.968046][T13051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.142592][ T3500] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.156415][ T3500] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.314189][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.328512][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.423855][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.459546][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.526021][ T3508] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.532931][ T3508] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.640110][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.652695][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.682038][ T3508] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.689027][ T3508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.730550][ T803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.747515][ T803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.767265][T13094] device pim6reg1 entered promiscuous mode [ 183.777799][ T803] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.794937][ T803] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.834601][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.847100][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.856503][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.865297][ T792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.873319][T13051] device veth0_vlan entered promiscuous mode [ 183.880458][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.888234][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.960642][T13120] device pim6reg1 entered promiscuous mode [ 184.009739][T13051] device veth1_macvtap entered promiscuous mode [ 184.027485][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 184.035494][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 184.044466][ T307] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 184.147525][ T673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 184.155678][ T673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 184.227504][ T673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 184.235590][ T673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 185.261089][ T110] device bridge_slave_1 left promiscuous mode [ 185.272748][ T110] ÿÿÿÿÿÿ: port 2(bridge_slave_1) entered disabled state [ 185.280448][ T110] device O3ãc¤± left promiscuous mode [ 185.285772][ T110] ÿÿÿÿÿÿ: port 1(O3ãc¤±) entered disabled state [ 185.999236][T13272] syz.0.3700[13272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 185.999285][T13272] syz.0.3700[13272] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.109312][T13271] syz.0.3700[13271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.157445][T13271] syz.0.3700[13271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.183053][T13295] device veth1_macvtap left promiscuous mode [ 186.211992][T13295] device macsec0 left promiscuous mode [ 188.086622][T13451] device pim6reg1 entered promiscuous mode [ 188.642035][T13513] syzkaller0: refused to change device tx_queue_len [ 188.669459][T13543] device syzkaller0 entered promiscuous mode [ 190.403909][T13638] device sit0 left promiscuous mode [ 190.454621][T13638] device sit0 entered promiscuous mode [ 190.660108][T13646] device pim6reg1 entered promiscuous mode [ 191.776130][T13699] device syzkaller0 entered promiscuous mode [ 191.840595][T13709] device pim6reg1 entered promiscuous mode [ 192.945658][T13795] device syzkaller0 entered promiscuous mode [ 193.676691][T13848] device wg2 left promiscuous mode [ 194.444385][T13969] device pim6reg1 entered promiscuous mode [ 194.900976][T14003] : renamed from syzkaller0 [ 195.154930][T14031] device pim6reg1 entered promiscuous mode [ 195.990114][T14067] device syzkaller0 entered promiscuous mode [ 196.347728][T14096] geneve1: tun_chr_ioctl cmd 2148553947 [ 196.539229][T14122] device syzkaller0 entered promiscuous mode [ 196.697974][T14132] device syzkaller0 entered promiscuous mode [ 196.874169][T14137] device pim6reg1 entered promiscuous mode [ 197.213149][T14193] syz.1.3958[14193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.213211][T14193] syz.1.3958[14193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.332533][T14196] device veth0_vlan left promiscuous mode [ 197.363953][T14196] device veth0_vlan entered promiscuous mode [ 197.430755][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.442410][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 197.464423][ T663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 197.699556][T14221] bridge0: port 4(veth0_to_batadv) entered blocking state [ 197.752176][T14221] bridge0: port 4(veth0_to_batadv) entered disabled state [ 197.760681][T14221] device veth0_to_batadv entered promiscuous mode [ 197.767406][T14221] bridge0: port 4(veth0_to_batadv) entered blocking state [ 197.774362][T14221] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 197.907803][T14238] device veth0_vlan left promiscuous mode [ 197.915498][T14238] device veth0_vlan entered promiscuous mode [ 197.926039][ T671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 197.934432][ T671] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 197.945024][ T671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.013117][T14258] ªªªªªª: renamed from vlan0 [ 198.593714][T14347] bridge0: port 3(veth0_to_batadv) entered blocking state [ 198.601134][T14347] bridge0: port 3(veth0_to_batadv) entered disabled state [ 198.608649][T14347] device veth0_to_batadv entered promiscuous mode [ 198.624220][T14347] bridge0: port 3(veth0_to_batadv) entered blocking state [ 198.631225][T14347] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 198.645112][T14347] device veth0_to_batadv left promiscuous mode [ 198.661541][T14347] bridge0: port 3(veth0_to_batadv) entered disabled state [ 198.782605][T14362] device veth1_macvtap left promiscuous mode [ 198.941503][T14382] bridge0: port 3(veth0_to_batadv) entered blocking state [ 198.948861][T14382] bridge0: port 3(veth0_to_batadv) entered disabled state [ 198.956101][T14382] device veth0_to_batadv entered promiscuous mode [ 199.150403][T14382] device veth0_to_batadv left promiscuous mode [ 199.162820][T14382] bridge0: port 3(veth0_to_batadv) entered disabled state [ 199.230435][T14409] device wg2 entered promiscuous mode [ 199.329138][T14433] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.336164][T14433] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.346839][T14433] device bridge0 left promiscuous mode [ 199.361214][T14434] device bridge_slave_1 left promiscuous mode [ 199.377928][T14434] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.393468][T14434] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.458161][T14452] device pim6reg1 entered promiscuous mode [ 199.500618][T14462] device syzkaller0 entered promiscuous mode [ 201.426456][T14626] device syzkaller0 entered promiscuous mode [ 201.600195][T14640] device pim6reg1 entered promiscuous mode [ 201.930049][T14667] device syzkaller0 entered promiscuous mode [ 203.047844][T14744] device pim6reg1 entered promiscuous mode [ 203.714539][T14825] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.721668][T14825] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.814438][T14842] device pim6reg1 entered promiscuous mode [ 204.875075][T14873] device syzkaller0 entered promiscuous mode [ 205.490436][T14916] device syzkaller0 entered promiscuous mode [ 205.913886][T14986] device pim6reg1 entered promiscuous mode [ 207.420304][T15051] device syzkaller0 entered promiscuous mode [ 208.139349][T15075] device syzkaller0 entered promiscuous mode [ 208.286633][T15095] device wg2 entered promiscuous mode [ 208.412488][T15094] tap0: tun_chr_ioctl cmd 1074025677 [ 208.419278][T15094] tap0: linktype set to 704 [ 208.451058][T15098] device pim6reg1 entered promiscuous mode [ 208.819291][T15106] device syzkaller0 entered promiscuous mode [ 209.665528][T15127] device lo entered promiscuous mode [ 210.969814][T15176] device pim6reg1 entered promiscuous mode [ 211.638261][T15206] device syzkaller0 entered promiscuous mode [ 211.802039][T15232] device pim6reg1 entered promiscuous mode [ 211.819868][T15224] syzkaller0: refused to change device tx_queue_len [ 212.891306][T15301] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.898984][T15301] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.906616][T15301] device bridge_slave_0 entered promiscuous mode [ 212.916724][T15301] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.925028][T15301] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.940717][T15301] device bridge_slave_1 entered promiscuous mode [ 213.050195][T15301] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.057056][T15301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.064197][T15301] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.071049][T15301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.113340][T15317] device syzkaller0 entered promiscuous mode [ 213.128466][T15317] device pim6reg1 entered promiscuous mode [ 213.189776][ T7592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.198289][ T7592] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.207860][ T7592] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.246916][ T7592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.258491][ T7592] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.265377][ T7592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.295236][ T7592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.316517][ T7592] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.325511][ T7592] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.422983][ T436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.431956][ T436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.464335][T15301] device veth0_vlan entered promiscuous mode [ 213.471450][ T7590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.484418][ T7590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.514051][ T7590] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.534086][ T7590] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.554454][T15386] : renamed from ipvlan1 [ 213.693140][T15301] device veth1_macvtap entered promiscuous mode [ 213.760718][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.771905][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 213.790385][ T3508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.364578][T15409] device veth0_vlan left promiscuous mode [ 214.378264][T15409] device veth0_vlan entered promiscuous mode [ 214.430061][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.442249][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 214.452585][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.678527][T15462] : renamed from syzkaller0 [ 215.278602][T15494] Â: renamed from pim6reg1 [ 215.871688][T15530] device veth0_to_team entered promiscuous mode [ 216.728974][T15607] device syzkaller0 entered promiscuous mode [ 217.349765][T15675] device pim6reg1 entered promiscuous mode [ 217.669381][T15735] syz.4.4393[15735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.669442][T15735] syz.4.4393[15735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.237051][T15786] device bridge_slave_1 left promiscuous mode [ 218.262729][T15786] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.271477][T15786] device bridge_slave_0 left promiscuous mode [ 218.277680][T15786] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.625361][T15888] syz.3.4423[15888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 218.625426][T15888] syz.3.4423[15888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.309535][T15953] device pim6reg1 entered promiscuous mode [ 219.820595][T15977] syz.4.4436[15977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.820659][T15977] syz.4.4436[15977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.962926][T16050] device veth1_macvtap left promiscuous mode [ 221.006207][T16050] device veth1_macvtap entered promiscuous mode [ 221.041803][ T7588] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.263945][T16071] device syzkaller0 entered promiscuous mode [ 222.181781][T16160] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 222.192859][T16160] pim6reg0: linktype set to 769 [ 222.292129][T16174] device pim6reg1 entered promiscuous mode [ 223.709877][T16256] device wg2 left promiscuous mode [ 224.072573][T16288] device syzkaller0 entered promiscuous mode [ 224.206231][ T24] audit: type=1400 audit(1720838529.240:173): avc: denied { create } for pid=16284 comm="syz.2.4531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 225.430494][T16372] device vxcan1 entered promiscuous mode [ 225.808156][T16414] device pim6reg1 entered promiscuous mode [ 226.972347][T16478] device syzkaller0 entered promiscuous mode [ 227.013516][T16514] geneve1: tun_chr_ioctl cmd 1074025672 [ 227.019708][T16514] geneve1: ignored: set checksum enabled [ 227.098267][T16514] device pim6reg1 entered promiscuous mode [ 227.559699][T16556] syz.0.4614[16556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.559760][T16556] syz.0.4614[16556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.712398][T16560] device pim6reg1 entered promiscuous mode [ 227.884954][T16595] geneve1: tun_chr_ioctl cmd 1074025672 [ 227.891747][T16595] geneve1: ignored: set checksum enabled [ 227.962046][T16609] syz.0.4629[16609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.432144][T16622] device syzkaller0 entered promiscuous mode [ 228.964192][T16626] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.971190][T16626] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.980108][T16626] device bridge_slave_0 entered promiscuous mode [ 228.987068][T16650] device sit0 left promiscuous mode [ 229.002528][T16658] tap0: tun_chr_ioctl cmd 1074025677 [ 229.011275][T16658] tap0: linktype set to 776 [ 229.058895][T16626] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.066217][T16626] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.074729][T16626] device bridge_slave_1 entered promiscuous mode [ 229.513575][T16667] device syzkaller0 entered promiscuous mode [ 229.526008][T16626] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.532897][T16626] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.540135][T16626] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.546999][T16626] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.571209][ T7588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.579201][ T7588] bridge0: port 1(bridge_slave_0) entered disabled state [ 229.604122][ T7588] bridge0: port 2(bridge_slave_1) entered disabled state [ 229.634220][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.652221][ T3496] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.659120][ T3496] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.670125][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.678326][ T3496] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.685201][ T3496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.704778][T16674] device syzkaller0 entered promiscuous mode [ 229.727975][ T3507] syzkaller0: tun_net_xmit 48 [ 229.740020][ T4484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.779014][ T4484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.795783][ T4484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.827160][ T4484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.936503][ T2590] device veth1_macvtap left promiscuous mode [ 230.012252][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.020970][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.035504][T16626] device veth0_vlan entered promiscuous mode [ 230.051272][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.059177][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.068038][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.076207][ T3496] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.118792][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.126889][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.137974][T16626] device veth1_macvtap entered promiscuous mode [ 230.159845][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.168032][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.178999][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.202484][ T3497] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.216445][ T3497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 230.303616][T16729] syz.1.4663[16729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.303678][T16729] syz.1.4663[16729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.692266][T16752] device pim6reg1 entered promiscuous mode [ 231.680918][T16786] device syzkaller0 entered promiscuous mode [ 232.081095][T16805] device pim6reg1 entered promiscuous mode [ 232.418834][T16824] device pim6reg1 entered promiscuous mode [ 233.616896][T16920] device pim6reg1 entered promiscuous mode [ 233.696838][T16918] device syzkaller0 entered promiscuous mode [ 233.709822][T16924] device pim6reg1 entered promiscuous mode [ 233.876674][T16949] device syzkaller0 entered promiscuous mode [ 234.139636][T16985] device syzkaller0 entered promiscuous mode [ 234.250865][T16987] device pim6reg1 entered promiscuous mode [ 234.443952][T16993] tap0: tun_chr_ioctl cmd 1074025677 [ 234.449364][T16993] tap0: linktype set to 704 [ 234.518324][T16995] device syzkaller0 entered promiscuous mode [ 234.708996][T17004] device lo entered promiscuous mode [ 235.465725][T17075] device veth0_vlan left promiscuous mode [ 235.475059][T17075] device veth0_vlan entered promiscuous mode [ 235.500630][ T7587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 235.510777][ T7587] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 235.520708][ T7587] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 235.643225][T17091] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 235.649846][T17091] pim6reg0: linktype set to 769 [ 235.845283][T17120] syz.4.4782[17120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.845323][T17120] syz.4.4782[17120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.959252][T17135] device sit0 entered promiscuous mode [ 236.833538][T17166] device pim6reg1 entered promiscuous mode [ 237.019797][T17188] geneve1: tun_chr_ioctl cmd 1074025681 [ 237.247858][T17201] device pim6reg1 entered promiscuous mode [ 238.559024][T17281] device pim6reg1 entered promiscuous mode [ 238.730640][T17297] device syzkaller0 entered promiscuous mode [ 238.811349][T17305] device syzkaller0 entered promiscuous mode [ 238.998800][T17328] syz.0.4850[17328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.001083][T17328] syz.0.4850[17328] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 239.490215][T17344] device veth0_vlan left promiscuous mode [ 239.658040][T17344] device veth0_vlan entered promiscuous mode [ 239.850180][T17360] device syzkaller0 entered promiscuous mode [ 240.210257][T17379] device pim6reg1 entered promiscuous mode [ 240.744757][T17418] syz.2.4876[17418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.744818][T17418] syz.2.4876[17418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.790675][T17418] syz.2.4876[17418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 240.847938][T17418] syz.2.4876[17418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.071018][T17437] device sit0 entered promiscuous mode [ 241.413500][T17462] syz.3.4889[17462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.413557][T17462] syz.3.4889[17462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.518590][T17462] syz.3.4889[17462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.589731][T17477] device wg2 entered promiscuous mode [ 241.680497][T17462] syz.3.4889[17462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.714497][T17491] device syzkaller0 entered promiscuous mode [ 241.809390][T17523] device sit0 left promiscuous mode [ 242.002898][T17521] device pim6reg1 entered promiscuous mode [ 242.035764][T17527] device sit0 entered promiscuous mode [ 242.600608][T17587] device macsec0 entered promiscuous mode [ 242.728191][T17589] device sit0 entered promiscuous mode [ 243.402973][T17648] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.410330][T17648] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.517294][T17657] device bridge_slave_1 left promiscuous mode [ 243.537889][T17657] bridge0: port 2(bridge_slave_1) entered disabled state [ 243.552796][T17657] device bridge_slave_0 left promiscuous mode [ 243.558939][T17657] bridge0: port 1(bridge_slave_0) entered disabled state [ 243.867767][T17669] syz.2.4936[17669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.867828][T17669] syz.2.4936[17669] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.447826][T17771] device pim6reg1 entered promiscuous mode [ 245.823628][T17845] device wg2 entered promiscuous mode [ 246.244887][T17893] Â: renamed from pim6reg1 [ 247.374940][T17949] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.382253][T17949] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.390423][T17949] device bridge_slave_0 entered promiscuous mode [ 247.398033][T17949] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.404887][T17949] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.412343][T17949] device bridge_slave_1 entered promiscuous mode [ 247.631760][ T5296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.640137][ T5296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.650768][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.661923][ T7595] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 247.671669][ T7595] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.678559][ T7595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 247.697736][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 247.706758][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 247.715444][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 247.724246][ T7585] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.731100][ T7585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 247.739956][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 247.797916][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 247.819014][T18001] device syzkaller0 entered promiscuous mode [ 247.841052][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 247.885599][T17949] device veth0_vlan entered promiscuous mode [ 247.892611][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 247.900723][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 247.909007][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 247.954100][T17949] device veth1_macvtap entered promiscuous mode [ 247.961466][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 247.975196][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 247.990152][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 248.061331][T18022] device pim6reg1 entered promiscuous mode [ 248.116315][T18036] device syzkaller0 entered promiscuous mode [ 248.298412][ T2590] device bridge_slave_1 left promiscuous mode [ 248.306755][ T2590] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.342903][ T2590] device bridge_slave_0 left promiscuous mode [ 248.392560][ T2590] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.442454][ T2590] device veth1_macvtap left promiscuous mode [ 248.484356][ T2590] device veth0_vlan left promiscuous mode [ 249.092242][ T24] audit: type=1400 audit(1720838554.130:174): avc: denied { create } for pid=18140 comm="syz.2.5063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 250.126361][T18213] syz.3.5079[18213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.126424][T18213] syz.3.5079[18213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.990694][T18264] device pim6reg1 entered promiscuous mode [ 251.207178][T18282] device vxcan1 entered promiscuous mode [ 251.897402][T18319] device syzkaller0 entered promiscuous mode [ 253.583135][T18408] device pim6reg1 entered promiscuous mode [ 253.754087][T18412] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.782544][T18412] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.793920][T18412] device bridge_slave_0 entered promiscuous mode [ 253.824391][T18412] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.877190][T18412] bridge0: port 2(bridge_slave_1) entered disabled state [ 253.912927][T18412] device bridge_slave_1 entered promiscuous mode [ 254.126964][T18412] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.133968][T18412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.141056][T18412] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.147819][T18412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.162521][ T3481] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.178626][ T3481] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.264820][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.272488][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.298516][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.307053][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.315809][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.322695][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.417336][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.425655][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.437523][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.444484][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.454111][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.462207][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.470604][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.485501][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.512130][T18482] syz.1.5159[18482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.512194][T18482] syz.1.5159[18482] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.521209][T18412] device veth0_vlan entered promiscuous mode [ 254.547947][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 254.556166][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 254.564761][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.574359][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.638614][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.646052][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.660556][T18412] device veth1_macvtap entered promiscuous mode [ 254.682623][ T7579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.693454][ T7579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.702599][ T7579] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.733932][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.742561][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.751682][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.760106][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.834537][T18538] syz.4.5175[18538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 254.834596][T18538] syz.4.5175[18538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.925158][T18620] device pim6reg1 entered promiscuous mode [ 256.144897][T18649] device vxcan1 entered promiscuous mode [ 256.189123][T18653] device pim6reg1 entered promiscuous mode [ 256.259757][T18623] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.266672][T18623] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.274190][T18623] device bridge_slave_0 entered promiscuous mode [ 256.283566][T18680] bridge0: port 4(veth0_to_batadv) entered disabled state [ 256.290650][T18680] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.299498][T18680] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.306861][T18680] device bridge0 left promiscuous mode [ 256.342457][T18623] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.349797][T18623] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.357220][T18623] device bridge_slave_1 entered promiscuous mode [ 256.377784][T18680] bridge0: port 4(veth0_to_batadv) entered blocking state [ 256.385015][T18680] bridge0: port 4(veth0_to_batadv) entered forwarding state [ 256.392519][T18680] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.399801][T18680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.406846][T18680] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.414136][T18680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.431727][T18680] device bridge0 entered promiscuous mode [ 256.527781][T18690] device veth1_macvtap entered promiscuous mode [ 256.533949][T18690] device macsec0 entered promiscuous mode [ 256.545469][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.651553][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.661050][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.730149][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.778457][ T3492] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.785479][ T3492] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.793282][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.801538][ T3492] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.808584][ T3492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.815771][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.826096][ T3513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.865362][T18623] device veth0_vlan entered promiscuous mode [ 256.881952][T18623] device veth1_macvtap entered promiscuous mode [ 256.891606][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.900963][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.909850][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.917368][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.925409][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.934195][ T3492] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.950162][T18729] device pim6reg1 entered promiscuous mode [ 256.990418][ T7589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.011285][ T7589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.452369][ T2590] device bridge_slave_1 left promiscuous mode [ 257.467340][ T2590] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.580840][ T2590] device bridge_slave_0 left promiscuous mode [ 257.592657][ T2590] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.804180][ T2590] device veth1_macvtap left promiscuous mode [ 257.821233][ T2590] device veth0_vlan left promiscuous mode [ 258.289726][T18810] device sit0 entered promiscuous mode [ 259.130055][T18866] device syzkaller0 entered promiscuous mode [ 259.782393][T18961] device vxcan1 entered promiscuous mode [ 259.968627][T18984] device pim6reg1 entered promiscuous mode [ 260.131817][T19019] syz.2.5308[19019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.131869][T19019] syz.2.5308[19019] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.647832][T19148] device syzkaller0 entered promiscuous mode [ 263.102342][T19160] device sit0 left promiscuous mode [ 263.216554][T19169] device veth0_vlan left promiscuous mode [ 263.236045][T19169] device veth0_vlan entered promiscuous mode [ 263.334975][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.345888][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.353657][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.787683][T19187] syz.0.5352[19187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.787736][T19187] syz.0.5352[19187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.042666][T19196] syz.0.5355[19196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.187673][T19196] syz.0.5355[19196] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.998457][T19213] device syzkaller0 entered promiscuous mode [ 265.496611][T19240] syz.0.5366[19240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.496683][T19240] syz.0.5366[19240] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.517912][T19241] device pim6reg1 entered promiscuous mode [ 265.604424][T19261] syz.2.5370[19261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.604485][T19261] syz.2.5370[19261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.598364][T19326] syz.2.5383[19326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.641477][T19326] syz.2.5383[19326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.840521][T19343] syz.1.5388[19343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.962318][T19343] syz.1.5388[19343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.329588][T19367] bridge0: port 4(veth0_to_batadv) entered disabled state [ 267.350177][T19367] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.357449][T19367] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.471234][T19367] device bridge0 left promiscuous mode [ 268.344133][T19431] device pim6reg1 entered promiscuous mode [ 271.029556][T19587] syz.4.5456[19587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.029610][T19587] syz.4.5456[19587] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.311825][T19636] device veth0_vlan left promiscuous mode [ 271.331683][T19636] device veth0_vlan entered promiscuous mode [ 271.346261][T19618] device macsec0 entered promiscuous mode [ 271.385229][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 271.393459][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 271.401243][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 272.401048][T19730] bridge0: port 5(vlan1) entered blocking state [ 272.408579][T19730] bridge0: port 5(vlan1) entered disabled state [ 272.415223][T19730] device vlan1 entered promiscuous mode [ 272.635513][T19757] syz.4.5499[19757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.635563][T19757] syz.4.5499[19757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.781441][T19811] device wg2 entered promiscuous mode [ 274.278370][T19833] device pim6reg1 entered promiscuous mode [ 274.987761][T19920] device wg2 left promiscuous mode [ 275.110483][T19920] device wg2 entered promiscuous mode [ 275.672850][T19975] syz.1.5563[19975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.672901][T19975] syz.1.5563[19975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.686228][T19975] syz.1.5563[19975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.703456][T19975] syz.1.5563[19975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.724866][T19981] Â: renamed from pim6reg1 [ 275.725131][T19975] syz.1.5563[19975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.741239][T19975] syz.1.5563[19975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.923308][T20007] device pim6reg1 entered promiscuous mode [ 276.061836][T20031] device pim6reg1 entered promiscuous mode [ 276.395484][T20100] device sit0 left promiscuous mode [ 276.460729][T20104] device syzkaller0 entered promiscuous mode [ 276.506279][T20100] device sit0 entered promiscuous mode [ 277.095819][T20194] device veth1_macvtap left promiscuous mode [ 277.311763][T20210] syz.3.5624[20210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.311825][T20210] syz.3.5624[20210] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.363413][T20212] syz.3.5624[20212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.386675][T20212] syz.3.5624[20212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.805330][T20225] device syzkaller0 entered promiscuous mode [ 278.154835][T20229] device syzkaller0 entered promiscuous mode [ 279.682270][T20338] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.690537][T20338] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.698294][T20338] device bridge_slave_0 entered promiscuous mode [ 279.730389][T20338] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.744312][T20338] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.804190][T20338] device bridge_slave_1 entered promiscuous mode [ 280.139690][T20338] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.146804][T20338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.153899][T20338] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.160941][T20338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.483990][ T3517] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.506704][ T3517] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.554200][ T7587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 280.561863][ T7587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 280.597523][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 280.612934][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 280.631498][ T3481] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.639086][ T3481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.649608][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 280.658641][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 280.666651][ T3481] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.674334][ T3481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.750355][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 280.766521][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 280.775637][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 280.783983][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 280.804781][T20338] device veth0_vlan entered promiscuous mode [ 280.872128][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 280.901831][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 280.961861][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 280.981301][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.010179][ T9] device veth1_macvtap left promiscuous mode [ 281.022441][ T9] device veth0_vlan left promiscuous mode [ 281.324772][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 281.338388][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 281.346559][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 281.359449][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.400656][T20338] device veth1_macvtap entered promiscuous mode [ 281.524281][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 281.535214][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 281.570452][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.579846][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 281.588357][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 281.766032][T20457] device syzkaller0 entered promiscuous mode [ 281.993722][T20477] device pim6reg1 entered promiscuous mode [ 282.200530][T20504] device veth0_vlan left promiscuous mode [ 282.206926][T20504] device veth0_vlan entered promiscuous mode [ 282.738941][T20553] syz.4.5720[20553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.739008][T20553] syz.4.5720[20553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.789260][T20553] syz.4.5720[20553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.813548][T20553] syz.4.5720[20553] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.961306][T20565] device syzkaller0 entered promiscuous mode [ 283.422986][T20603] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.477408][T20603] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.484595][T20603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.504304][T20605] device syzkaller0 entered promiscuous mode [ 283.769373][T20657] device veth0_vlan left promiscuous mode [ 283.800736][T20657] device veth0_vlan entered promiscuous mode [ 283.832920][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.849751][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 283.891712][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.094574][T20810] device veth0_vlan left promiscuous mode [ 286.206529][T20810] device veth0_vlan entered promiscuous mode [ 286.290169][T20813] device vlan1 left promiscuous mode [ 286.295460][T20813] bridge0: port 5(vlan1) entered disabled state [ 286.388125][T20813] device veth0_to_batadv left promiscuous mode [ 286.436000][T20813] bridge0: port 4(veth0_to_batadv) entered disabled state [ 286.507370][T20813] device syz_tun left promiscuous mode [ 286.574150][T20813] bridge0: port 3(syz_tun) entered disabled state [ 286.647831][T20813] device bridge_slave_1 left promiscuous mode [ 286.653916][T20813] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.700167][T20813] device bridge_slave_0 left promiscuous mode [ 286.723581][T20813] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.821322][T20817] device sit0 left promiscuous mode [ 286.877010][T20836] device pim6reg1 entered promiscuous mode [ 286.975227][T20853] device pim6reg1 entered promiscuous mode [ 288.111977][T20988] device syzkaller0 entered promiscuous mode [ 288.124550][T20982] device pim6reg1 entered promiscuous mode [ 288.167373][T20988] device vlan1 entered promiscuous mode [ 288.669220][T21065] device pim6reg1 entered promiscuous mode [ 289.114395][T21084] syz.3.5868[21084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.114509][T21084] syz.3.5868[21084] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.161368][T21077] ªªªªªª: renamed from vlan0 [ 289.194498][T21097] device veth1_macvtap left promiscuous mode [ 289.200839][T21097] device macsec0 left promiscuous mode [ 289.281857][T21133] device wg2 left promiscuous mode [ 289.291233][T21114] device pim6reg1 entered promiscuous mode [ 289.326872][T21133] device veth0_vlan left promiscuous mode [ 289.345119][T21133] device veth0_vlan entered promiscuous mode [ 289.361361][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.369840][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 289.378302][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 289.764138][T21168] device syzkaller0 entered promiscuous mode [ 290.402195][T21227] syz.2.5906[21227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.402258][T21227] syz.2.5906[21227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.714594][T21316] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 291.857341][T21316] pim6reg0: linktype set to 773 [ 291.934076][T21334] device syzkaller0 entered promiscuous mode [ 292.353839][T21401] device syzkaller0 entered promiscuous mode [ 292.384608][T21407] syzkaller0: create flow: hash 3531041892 index 0 [ 292.568272][T21412] device sit0 entered promiscuous mode [ 292.587245][T21410] syzkaller0 (unregistered): delete flow: hash 3531041892 index 0 [ 293.110014][T21435] tap0: tun_chr_ioctl cmd 1074025677 [ 293.126924][T21435] tap0: linktype set to 704 [ 293.337923][T21465] device pim6reg1 entered promiscuous mode [ 293.396775][T21470] device syzkaller0 entered promiscuous mode [ 293.427938][T21481] syz.2.5985[21481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.427999][T21481] syz.2.5985[21481] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.480576][T21469] device pim6reg1 entered promiscuous mode [ 293.935960][T21497] device wg2 entered promiscuous mode [ 294.039257][T21501] device veth1_macvtap left promiscuous mode [ 294.067188][T21501] device macsec0 left promiscuous mode [ 294.086359][T21501] device veth1_macvtap entered promiscuous mode [ 294.100336][T21501] device macsec0 entered promiscuous mode [ 295.335875][T21604] device syzkaller0 entered promiscuous mode [ 295.423965][T21613] syz.3.6022[21613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.424033][T21613] syz.3.6022[21613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.567505][T21619] device syzkaller0 entered promiscuous mode [ 295.977487][T21669] device veth0_vlan left promiscuous mode [ 295.984053][T21669] device veth0_vlan entered promiscuous mode [ 296.447137][T21710] device pim6reg1 entered promiscuous mode [ 297.062015][T21755] device syzkaller0 entered promiscuous mode [ 297.166612][T21791] syz.0.6076[21791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.166674][T21791] syz.0.6076[21791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.583151][T21810] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.607831][T21810] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.619576][T21810] device bridge_slave_0 entered promiscuous mode [ 297.638207][T21810] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.647693][T21810] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.655550][T21810] device bridge_slave_1 entered promiscuous mode [ 297.754937][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.762730][ T2683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.798702][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.808465][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.816956][ T7578] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.825195][ T7578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.847564][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.855968][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.864751][ T7578] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.872070][ T7578] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.881042][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.890215][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.911646][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.947755][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.964251][T21810] device veth0_vlan entered promiscuous mode [ 297.976648][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 298.021328][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 298.030930][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 298.111386][ T7586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.263584][T21810] device veth1_macvtap entered promiscuous mode [ 298.406944][ T4483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.462282][ T345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 299.096668][T21913] bridge0: port 3(veth0_to_batadv) entered blocking state [ 299.111893][T21913] bridge0: port 3(veth0_to_batadv) entered disabled state [ 299.156518][T21913] device veth0_to_batadv entered promiscuous mode [ 299.435949][T21950] syz.3.6119[21950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.436012][T21950] syz.3.6119[21950] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.125273][T21980] bridge0: port 3(veth0_to_batadv) entered blocking state [ 300.204119][T21980] bridge0: port 3(veth0_to_batadv) entered disabled state [ 300.257012][T21980] device veth0_to_batadv entered promiscuous mode [ 300.277444][T21980] bridge0: port 3(veth0_to_batadv) entered blocking state [ 300.284978][T21980] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 300.322065][T22003] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.329119][T22003] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.338919][T22001] device veth0_to_batadv left promiscuous mode [ 300.345069][T22001] bridge0: port 3(veth0_to_batadv) entered disabled state [ 300.352980][T22005] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.360069][T22005] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.367568][T22005] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.375830][T22005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.387385][T22005] device bridge0 entered promiscuous mode [ 300.571778][ T2590] device bridge_slave_1 left promiscuous mode [ 300.578315][ T2590] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.610825][ T2590] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.627943][ T2590] device veth0_vlan left promiscuous mode [ 300.785215][T22060] device pim6reg1 entered promiscuous mode [ 300.961479][T22078] geneve1: tun_chr_ioctl cmd 1074025672 [ 300.980994][T22078] geneve1: ignored: set checksum enabled [ 302.275925][T22147] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.282940][T22147] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.369900][T22158] device syzkaller0 entered promiscuous mode [ 302.567621][T22178] syz.0.6185[22178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.567689][T22178] syz.0.6185[22178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.980595][T22247] device pim6reg1 entered promiscuous mode [ 304.105420][T22257] device veth0_vlan left promiscuous mode [ 304.123076][T22257] device veth0_vlan entered promiscuous mode [ 304.197311][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.206047][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 304.216143][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 304.296855][T22272] device sit0 left promiscuous mode [ 304.411795][T22279] device veth0_vlan left promiscuous mode [ 304.443755][T22279] device veth0_vlan entered promiscuous mode [ 304.584819][T22293] device syzkaller0 entered promiscuous mode [ 304.600018][T22303] device veth1_macvtap left promiscuous mode [ 304.844429][T22320] syz.2.6229[22320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.844477][T22320] syz.2.6229[22320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 305.001625][T22331] device veth0_vlan left promiscuous mode [ 305.046076][T22331] device veth0_vlan entered promiscuous mode [ 305.649342][T22366] device veth0_vlan left promiscuous mode [ 305.693285][T22366] device veth0_vlan entered promiscuous mode [ 305.922679][T22374] device syzkaller0 entered promiscuous mode [ 305.936839][T22374] device pim6reg1 entered promiscuous mode [ 306.082101][T22377] device veth1_macvtap entered promiscuous mode [ 306.122267][T22377] device macsec0 entered promiscuous mode [ 306.144041][ T4047] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 306.372164][T22395] device syzkaller0 entered promiscuous mode [ 306.379829][T22397] device sit0 entered promiscuous mode [ 308.469065][T22531] device pim6reg1 entered promiscuous mode [ 309.038684][T22582] device wg2 left promiscuous mode [ 309.057986][T22582] device wg2 entered promiscuous mode [ 309.782210][T22622] device syzkaller0 entered promiscuous mode [ 310.042915][T22639] device sit0 left promiscuous mode [ 310.274922][T22662] syz.0.6328[22662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.274966][T22662] syz.0.6328[22662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.287892][T22662] syz.0.6328[22662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.299503][T22662] syz.0.6328[22662] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.561208][T22710] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.581007][T22710] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.588849][T22710] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.596615][T22710] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.606338][T22710] device bridge0 entered promiscuous mode [ 310.613931][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 310.747507][T22731] device syzkaller0 entered promiscuous mode [ 310.768051][T22731] device wg2 entered promiscuous mode [ 310.775681][T22735] device veth0_vlan left promiscuous mode [ 310.809347][T22735] device veth0_vlan entered promiscuous mode [ 310.825230][T22740] syz.2.6353[22740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.825289][T22740] syz.2.6353[22740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.171317][T22791] device syzkaller0 entered promiscuous mode [ 311.587868][ T24] audit: type=1400 audit(1720838616.630:175): avc: denied { create } for pid=22855 comm="syz.1.6386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 311.666745][T22858] device syzkaller0 entered promiscuous mode [ 312.008554][T22893] device vxcan1 entered promiscuous mode [ 312.584254][T23000] syzkaller0: refused to change device tx_queue_len [ 313.080949][T23024] device veth0_vlan left promiscuous mode [ 313.093284][T23024] device veth0_vlan entered promiscuous mode [ 313.135016][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 313.250077][T23074] device wg2 entered promiscuous mode [ 313.255812][T23074] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 314.120500][T23200] device syzkaller0 entered promiscuous mode [ 314.443501][T23212] device veth1_macvtap left promiscuous mode [ 314.541667][T23214] device veth1_macvtap entered promiscuous mode [ 314.589071][T23214] device macsec0 entered promiscuous mode [ 315.136921][T23237] device syzkaller0 entered promiscuous mode [ 315.215668][T23254] tap0: tun_chr_ioctl cmd 1074025677 [ 315.221192][T23254] tap0: linktype set to 804 [ 315.591090][T23308] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 315.596924][T23308] pim6reg0: linktype set to 773 [ 316.206943][T23342] syz.4.6525[23342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.207168][T23342] syz.4.6525[23342] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 318.997924][T23485] device syzkaller0 entered promiscuous mode [ 320.935918][T23566] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.053669][T23633] device pim6reg1 entered promiscuous mode [ 322.490256][T23667] device pim6reg1 entered promiscuous mode [ 323.433423][T23751] device veth1_macvtap left promiscuous mode [ 323.439304][T23751] device macsec0 left promiscuous mode [ 323.452299][T23751] device veth1_macvtap entered promiscuous mode [ 323.485831][T23751] device macsec0 entered promiscuous mode [ 323.578087][T23777] syz.3.6649[23777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.578136][T23777] syz.3.6649[23777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.611975][T23785] device wg2 left promiscuous mode [ 323.714142][T23806] device vxcan1 entered promiscuous mode [ 323.858696][T23810] device sit0 entered promiscuous mode [ 324.181163][T23820] device syzkaller0 entered promiscuous mode [ 325.738380][T23920] device wg2 left promiscuous mode [ 325.796176][T23920] device wg2 entered promiscuous mode [ 325.965940][T23931] syz.1.6693[23931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.966002][T23931] syz.1.6693[23931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.997685][T23931] syz.1.6693[23931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.009139][T23931] syz.1.6693[23931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.031773][T24038] device wg2 left promiscuous mode [ 328.212088][T24038] device wg2 entered promiscuous mode [ 328.388655][T24051] syz.3.6735[24051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.388715][T24051] syz.3.6735[24051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.388734][T24052] syz.3.6735[24052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.411553][T24052] syz.3.6735[24052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.069329][T24130] syz.0.6760[24130] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.964363][T24202] device sit0 left promiscuous mode [ 331.053867][T24208] device sit0 entered promiscuous mode [ 331.223835][T24214] syz.4.6788[24214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.223894][T24214] syz.4.6788[24214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.741441][T24254] device veth1_macvtap left promiscuous mode [ 331.802755][T24254] device macsec0 left promiscuous mode [ 331.828117][T24258] device veth1_macvtap entered promiscuous mode [ 331.855247][T24258] device macsec0 entered promiscuous mode [ 331.863418][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 331.876752][T24257] device syzkaller0 entered promiscuous mode [ 332.121025][T24268] device syzkaller0 entered promiscuous mode [ 332.662485][T24296] tap0: tun_chr_ioctl cmd 1074025677 [ 332.670367][T24296] tap0: linktype set to 804 [ 333.262004][T24323] device pim6reg1 entered promiscuous mode [ 334.284892][T24389] device syzkaller0 entered promiscuous mode [ 334.554585][T24418] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.574177][T24418] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.581075][T24418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 334.593677][T24418] device bridge0 entered promiscuous mode [ 334.681575][T24424] device syzkaller0 entered promiscuous mode [ 334.818321][ T669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.535685][T24513] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.575891][T24513] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.583837][T24513] device bridge_slave_0 entered promiscuous mode [ 335.641372][T24513] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.686577][T24513] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.704088][T24513] device bridge_slave_1 entered promiscuous mode [ 335.925874][T24557] device wg2 left promiscuous mode [ 335.997626][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.004991][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.022749][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.031285][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.040280][ T1012] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.047156][ T1012] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.055062][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.087443][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 336.102843][ T1012] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.109879][ T1012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.125774][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 336.152876][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 336.164604][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 336.178370][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 336.192867][T24513] device veth0_vlan entered promiscuous mode [ 336.200630][T24564] device pim6reg1 entered promiscuous mode [ 336.216433][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 336.350567][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 336.358417][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 336.372687][T24513] device veth1_macvtap entered promiscuous mode [ 336.402374][ T3481] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 336.417403][T24580] device pim6reg1 entered promiscuous mode [ 336.431050][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 336.455099][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 336.487614][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 336.545890][ T1012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 337.567202][T24647] device syzkaller0 entered promiscuous mode [ 338.190760][T24708] device pim6reg1 entered promiscuous mode [ 338.300782][T24720] geneve1: tun_chr_ioctl cmd 1074025672 [ 338.306545][T24720] geneve1: ignored: set checksum enabled [ 338.365485][T24724] syz.4.6941[24724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.365542][T24724] syz.4.6941[24724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 338.642187][T24754] device wg2 entered promiscuous mode [ 338.672061][T24754] tap0: tun_chr_ioctl cmd 1074025677 [ 338.677349][T24754] tap0: linktype set to 704 [ 339.891900][T24852] device syzkaller0 entered promiscuous mode [ 340.567379][T24923] device wg2 left promiscuous mode [ 340.859151][T24936] device syzkaller0 entered promiscuous mode [ 341.170221][T24949] syz.2.7011[24949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.170281][T24949] syz.2.7011[24949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.369792][T24958] syz.3.7015[24958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.421835][T24958] syz.3.7015[24958] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.487420][T24963] syz.3.7015[24963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.535923][T24963] syz.3.7015[24963] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.258661][T25030] syz.0.7034[25030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.331760][T25030] syz.0.7034[25030] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.029900][T25246] device syzkaller0 entered promiscuous mode [ 346.067167][T25256] device syzkaller0 entered promiscuous mode [ 346.079638][T25234] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.086494][T25234] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.094170][T25234] device bridge_slave_0 entered promiscuous mode [ 346.113418][T25280] device veth0_vlan left promiscuous mode [ 346.120578][T25280] device veth0_vlan entered promiscuous mode [ 346.143591][T25234] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.150533][T25234] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.158873][T25234] device bridge_slave_1 entered promiscuous mode [ 346.276210][T25234] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.283477][T25234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.332867][ T804] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.343492][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.357633][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.393890][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 346.409899][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.419930][ T816] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.427014][ T816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.441337][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.453025][ T816] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.459931][ T816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.512329][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.521233][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.550429][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 346.583000][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 346.596324][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 346.605741][ T24] audit: type=1400 audit(1720838651.650:176): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 346.628510][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 346.636914][T25234] device veth0_vlan entered promiscuous mode [ 346.666477][ T3482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 346.682435][T25234] device veth1_macvtap entered promiscuous mode [ 346.704134][ T3482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 346.746121][ T804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 346.821761][T25326] syz.0.7117[25326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.821824][T25326] syz.0.7117[25326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.199305][ T357] device bridge_slave_1 left promiscuous mode [ 347.378880][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.476854][ T357] device bridge_slave_0 left promiscuous mode [ 347.537261][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.624566][ T357] device veth1_macvtap left promiscuous mode [ 348.159317][T25400] ªªªªªª: renamed from vlan0 [ 348.562883][T25444] device vlan1 entered promiscuous mode [ 348.971929][T25490] device veth0_vlan left promiscuous mode [ 348.980965][T25490] device veth0_vlan entered promiscuous mode [ 350.338540][T25570] device syzkaller0 entered promiscuous mode [ 351.159019][T25666] syz.3.7213[25666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.163739][T25666] syz.3.7213[25666] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.562181][T25728] device syzkaller0 entered promiscuous mode [ 352.793921][T25858] device veth0_vlan left promiscuous mode [ 352.960937][T25858] device veth0_vlan entered promiscuous mode [ 353.030036][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 353.043224][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 353.064487][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 353.177764][T25877] syzkaller0: refused to change device tx_queue_len [ 353.398086][T25915] syz.1.7273[25915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.398166][T25915] syz.1.7273[25915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.449421][T25915] syz.1.7273[25915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.517592][T25915] syz.1.7273[25915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.669932][T25977] syz.3.7290[25977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.707850][T25977] syz.3.7290[25977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.747909][T25981] syz.3.7290[25981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.779895][T25981] syz.3.7290[25981] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.781717][T25984] device pim6reg1 entered promiscuous mode [ 354.816452][T25977] syz.3.7290[25977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 354.816520][T25977] syz.3.7290[25977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.350779][T26033] device syzkaller0 entered promiscuous mode [ 356.838233][T26097] Â: renamed from pim6reg1 [ 357.083067][T26102] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.090658][T26102] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.109570][T26110] device bridge_slave_1 left promiscuous mode [ 357.136515][T26110] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.167725][T26110] device bridge_slave_0 left promiscuous mode [ 357.175890][T26110] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.251930][T26109] device sit0 left promiscuous mode [ 359.852178][T26353] device pim6reg1 entered promiscuous mode [ 359.920102][T26360] device pim6reg1 entered promiscuous mode [ 362.545322][T26580] device pim6reg1 entered promiscuous mode [ 362.918204][T26616] device veth0_vlan left promiscuous mode [ 362.930214][T26616] device veth0_vlan entered promiscuous mode [ 362.956755][T26617] device syzkaller0 entered promiscuous mode [ 363.577886][T26675] Â: renamed from pim6reg1 [ 363.595516][T26675] device veth1_macvtap left promiscuous mode [ 363.607502][T26675] device macsec0 left promiscuous mode [ 363.721175][T26684] ¯Ê®¸}p: renamed from pim6reg1 [ 363.779136][T26675] device veth1_macvtap entered promiscuous mode [ 363.812096][T26675] device macsec0 entered promiscuous mode [ 364.087769][T26721] bpf_get_probe_write_proto: 6 callbacks suppressed [ 364.087778][T26721] syz.0.7507[26721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.102415][T26721] syz.0.7507[26721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.136375][T26724] device syzkaller0 entered promiscuous mode [ 364.168034][T26726] device veth0_to_batadv left promiscuous mode [ 364.174335][T26726] bridge0: port 3(veth0_to_batadv) entered disabled state [ 364.236551][T26734] device syzkaller0 entered promiscuous mode [ 364.262034][T26742] bridge_slave_0: mtu greater than device maximum [ 364.593521][T26788] device syzkaller0 entered promiscuous mode [ 364.764146][T26797] device pim6reg1 entered promiscuous mode [ 364.770200][T26799] syz.3.7531[26799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.770264][T26799] syz.3.7531[26799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.881789][T26808] syz.3.7536[26808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.926918][T26808] syz.3.7536[26808] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.642136][ T24] audit: type=1400 audit(1720838670.680:177): avc: denied { write } for pid=26847 comm="syz.4.7546" name="net" dev="proc" ino=92135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 365.730473][ T24] audit: type=1400 audit(1720838670.740:178): avc: denied { add_name } for pid=26847 comm="syz.4.7546" name="blkio.bfq.io_wait_time" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 365.810083][ T24] audit: type=1400 audit(1720838670.770:179): avc: denied { create } for pid=26847 comm="syz.4.7546" name="blkio.bfq.io_wait_time" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 365.832546][ T24] audit: type=1400 audit(1720838670.780:180): avc: denied { associate } for pid=26847 comm="syz.4.7546" name="blkio.bfq.io_wait_time" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 365.872080][T26865] device pim6reg1 entered promiscuous mode [ 365.898298][T26875] bridge0: port 3(veth1_macvtap) entered blocking state [ 365.944201][T26875] bridge0: port 3(veth1_macvtap) entered disabled state [ 365.976556][T26887] syz.0.7558[26887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.976619][T26887] syz.0.7558[26887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.089463][T27083] device veth1_macvtap left promiscuous mode [ 368.117130][T27083] device macsec0 left promiscuous mode [ 368.201893][T27087] device syzkaller0 entered promiscuous mode [ 368.228959][T27083] device veth1_macvtap entered promiscuous mode [ 368.235087][T27083] device macsec0 entered promiscuous mode [ 368.390851][T27079] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.398107][T27079] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.424601][T27079] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.431520][T27079] bridge0: port 2(bridge_slave_1) entered listening state [ 368.438523][T27079] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.445365][T27079] bridge0: port 1(bridge_slave_0) entered listening state [ 368.465562][T27079] device bridge0 entered promiscuous mode [ 368.591684][T27107] device veth0_vlan left promiscuous mode [ 368.625763][T27107] device veth0_vlan entered promiscuous mode [ 369.168858][T27161] syz.0.7652[27161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.168917][T27161] syz.0.7652[27161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.195077][T27429] device veth0_to_hsr entered promiscuous mode [ 372.315341][T27492] device pim6reg1 entered promiscuous mode [ 373.115332][T27515] ªªªªªªÿÿ: renamed from vlan0 [ 373.413707][T27544] device syzkaller0 entered promiscuous mode [ 374.177485][T27554] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.198741][T27554] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.220691][T27554] device bridge_slave_0 entered promiscuous mode [ 374.283041][T27554] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.303454][T27554] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.326537][T27554] device bridge_slave_1 entered promiscuous mode [ 374.908242][ T2590] device veth1_macvtap left promiscuous mode [ 375.150749][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 375.161013][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 375.198615][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 375.207923][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 375.216747][ T2680] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.223765][ T2680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.231730][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 375.242498][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 375.347439][ T2680] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.354305][ T2680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.361801][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 375.370021][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 375.380631][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 375.403333][ T7599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 375.414356][ T7599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 375.424618][ T7599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.434291][ T7599] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.447232][T27554] device veth0_vlan entered promiscuous mode [ 375.470856][T27554] device veth1_macvtap entered promiscuous mode [ 375.487523][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 375.527766][ T7599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 375.536360][ T7599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 375.843605][T27634] geneve1: tun_chr_ioctl cmd 1074025681 [ 376.266428][T27657] syz.1.7791[27657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 376.266491][T27657] syz.1.7791[27657] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.386412][T27732] device syzkaller0 entered promiscuous mode [ 377.551410][T27757] syz.3.7820[27757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.551471][T27757] syz.3.7820[27757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.591943][T27744] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.613215][T27744] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.622087][T27744] device bridge_slave_0 entered promiscuous mode [ 377.646860][T27744] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.654473][T27744] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.668465][T27744] device bridge_slave_1 entered promiscuous mode [ 377.849965][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.857957][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 377.936412][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 377.956829][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.037352][ T7600] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.044220][ T7600] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.138318][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 378.146746][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.241310][ T7600] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.248212][ T7600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.344869][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.417453][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 378.424994][ T7600] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 378.526045][T27744] device veth0_vlan entered promiscuous mode [ 378.545884][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 378.578536][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 378.599517][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 378.606844][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 378.624910][T27744] device veth1_macvtap entered promiscuous mode [ 378.644506][ T794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 378.702800][ T794] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 378.715172][ T794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 378.756502][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 378.778826][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 379.259118][ T110] device bridge_slave_1 left promiscuous mode [ 379.271236][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.358239][ T110] device bridge_slave_0 left promiscuous mode [ 379.436933][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.459432][ T110] device veth1_macvtap left promiscuous mode [ 379.475776][ T110] device veth0_vlan left promiscuous mode [ 379.863431][T27836] bridge0: port 3(veth0_to_batadv) entered blocking state [ 379.888400][T27836] bridge0: port 3(veth0_to_batadv) entered disabled state [ 379.911781][T27836] device veth0_to_batadv entered promiscuous mode [ 379.933437][T27836] bridge0: port 3(veth0_to_batadv) entered blocking state [ 379.940670][T27836] bridge0: port 3(veth0_to_batadv) entered listening state [ 379.991734][T27836] device veth0_to_batadv left promiscuous mode [ 380.007355][T27836] bridge0: port 3(veth0_to_batadv) entered disabled state [ 380.125759][T27848] device veth0_vlan left promiscuous mode [ 380.155219][T27848] device veth0_vlan entered promiscuous mode [ 380.309904][T27856] syz.2.7851[27856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.309963][T27856] syz.2.7851[27856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.817896][T27959] bridge0: port 1(bridge_slave_0) entered blocking state [ 381.858388][T27959] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.866002][T27959] device bridge_slave_0 entered promiscuous mode [ 381.901632][T27959] bridge0: port 2(bridge_slave_1) entered blocking state [ 381.913846][T27959] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.933576][T27959] device bridge_slave_1 entered promiscuous mode [ 381.968401][T27973] device vxcan1 entered promiscuous mode [ 382.006052][T27973] device pim6reg1 entered promiscuous mode [ 382.106686][T27959] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.114208][T27959] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.122317][T27959] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.129712][T27959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.172759][T10621] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.197415][T10621] bridge0: port 2(bridge_slave_1) entered disabled state [ 382.205186][T10621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 382.214452][T10621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 382.238427][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 382.250483][ T670] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.257365][ T670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.265231][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 382.273427][ T670] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.280627][ T670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.300144][ T670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 382.345612][T27993] device macsec0 entered promiscuous mode [ 382.363964][T27996] device veth1_macvtap entered promiscuous mode [ 382.508874][T10621] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 382.538494][T10621] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 382.654588][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 382.712800][T27959] device veth0_vlan entered promiscuous mode [ 382.870348][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.910933][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 382.957480][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 382.975295][T10621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 383.009593][T10621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 383.079837][T27959] device veth1_macvtap entered promiscuous mode [ 383.221787][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 383.240542][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 383.262674][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 383.275483][T28061] syz.3.7915[28061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.275542][T28061] syz.3.7915[28061] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.297807][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 383.330249][T28063] syz.3.7915[28063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.330314][T28063] syz.3.7915[28063] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.353855][ T811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 383.447668][T28065] syz.3.7916[28065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.447730][T28065] syz.3.7916[28065] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.947071][ C1] bridge0: port 1(bridge_slave_0) entered learning state [ 383.966054][ C1] bridge0: port 2(bridge_slave_1) entered learning state [ 384.019093][T28120] Â: renamed from pim6reg1 [ 384.151163][T28145] device pim6reg1 entered promiscuous mode [ 384.951433][T28244] device pim6reg1 entered promiscuous mode [ 385.044269][T28239] tap0: tun_chr_ioctl cmd 1074025677 [ 385.059030][T28239] tap0: linktype set to 774 [ 385.252071][T28254] device syzkaller0 entered promiscuous mode [ 387.321386][T28396] syz.2.8007[28396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.335844][T28394] geneve1: tun_chr_ioctl cmd 1074025681 [ 387.844735][T28418] device sit0 entered promiscuous mode [ 388.100709][T28425] bridge0: port 3(vlan1) entered blocking state [ 388.109588][T28425] bridge0: port 3(vlan1) entered disabled state [ 388.179402][T28431] device syzkaller0 entered promiscuous mode [ 388.646354][T28455] syz.1.8025[28455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.646418][T28455] syz.1.8025[28455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.943239][T28470] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.961581][T28470] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.972415][T28470] device bridge0 left promiscuous mode [ 388.985777][T28470] device bridge_slave_1 left promiscuous mode [ 388.992554][T28470] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.000801][T28470] device bridge_slave_0 left promiscuous mode [ 389.007490][T28470] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.580825][T28541] FAULT_INJECTION: forcing a failure. [ 389.580825][T28541] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 389.593804][T28541] CPU: 0 PID: 28541 Comm: syz.2.8053 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 389.605325][T28541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 389.615221][T28541] Call Trace: [ 389.618348][T28541] dump_stack_lvl+0x1e2/0x24b [ 389.622853][T28541] ? bfq_pos_tree_add_move+0x43b/0x43b [ 389.628142][T28541] ? 0xffffffffa0026f14 [ 389.632134][T28541] ? is_bpf_text_address+0x172/0x190 [ 389.637264][T28541] ? stack_trace_save+0x1c0/0x1c0 [ 389.642117][T28541] dump_stack+0x15/0x17 [ 389.646109][T28541] should_fail+0x3c6/0x510 [ 389.650363][T28541] should_fail_usercopy+0x1a/0x20 [ 389.655224][T28541] _copy_from_user+0x20/0xd0 [ 389.659830][T28541] __se_sys_bpf+0x232/0x11cb0 [ 389.664269][T28541] ? stack_trace_save+0x113/0x1c0 [ 389.669129][T28541] ? terminate_walk+0x407/0x4f0 [ 389.673798][T28541] ? stack_trace_snprint+0xf0/0xf0 [ 389.678856][T28541] ? kmem_cache_free+0xa9/0x1e0 [ 389.683541][T28541] ? kmem_cache_free+0xa9/0x1e0 [ 389.688204][T28541] ? kasan_set_track+0x5d/0x70 [ 389.692824][T28541] ? kasan_set_track+0x4b/0x70 [ 389.697406][T28541] ? kasan_set_free_info+0x23/0x40 [ 389.702353][T28541] ? ____kasan_slab_free+0x121/0x160 [ 389.707474][T28541] ? __kasan_slab_free+0x11/0x20 [ 389.712249][T28541] ? __x64_sys_bpf+0x90/0x90 [ 389.716672][T28541] ? do_sys_openat2+0x5e1/0x6f0 [ 389.721359][T28541] ? __x64_sys_openat+0x243/0x290 [ 389.726218][T28541] ? do_syscall_64+0x34/0x70 [ 389.730741][T28541] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 389.736645][T28541] ? _kstrtoull+0x3a0/0x4a0 [ 389.740984][T28541] ? kstrtouint_from_user+0x20a/0x2a0 [ 389.746188][T28541] ? kstrtol_from_user+0x310/0x310 [ 389.751244][T28541] ? strncpy_from_kernel_nofault+0x169/0x1e0 [ 389.757048][T28541] ? memset+0x35/0x40 [ 389.760881][T28541] ? __fsnotify_parent+0x4b9/0x6c0 [ 389.766084][T28541] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 389.772674][T28541] ? proc_fail_nth_write+0x20b/0x290 [ 389.777799][T28541] ? proc_fail_nth_read+0x210/0x210 [ 389.782832][T28541] ? security_file_permission+0x86/0xb0 [ 389.788214][T28541] ? rw_verify_area+0x1c3/0x360 [ 389.792899][T28541] ? preempt_count_add+0x92/0x1a0 [ 389.797759][T28541] ? vfs_write+0x854/0xe70 [ 389.802016][T28541] ? kernel_write+0x3d0/0x3d0 [ 389.806620][T28541] ? __kasan_check_write+0x14/0x20 [ 389.811568][T28541] ? mutex_lock+0xa5/0x110 [ 389.815819][T28541] ? mutex_trylock+0xa0/0xa0 [ 389.820251][T28541] ? __kasan_check_write+0x14/0x20 [ 389.825338][T28541] ? fput_many+0x160/0x1b0 [ 389.829570][T28541] ? debug_smp_processor_id+0x17/0x20 [ 389.834791][T28541] __x64_sys_bpf+0x7b/0x90 [ 389.839130][T28541] do_syscall_64+0x34/0x70 [ 389.843362][T28541] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 389.849099][T28541] RIP: 0033:0x7f47e6fcbbd9 [ 389.853362][T28541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 389.873087][T28541] RSP: 002b:00007f47e624d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 389.881320][T28541] RAX: ffffffffffffffda RBX: 00007f47e7159f60 RCX: 00007f47e6fcbbd9 [ 389.889229][T28541] RDX: 0000000000000048 RSI: 00000000200054c0 RDI: 0000000000000005 [ 389.897027][T28541] RBP: 00007f47e624d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 389.904843][T28541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 389.912644][T28541] R13: 000000000000000b R14: 00007f47e7159f60 R15: 00007ffe3eee2208 [ 390.369126][T28584] device pim6reg1 entered promiscuous mode [ 390.562267][T28586] device wg2 left promiscuous mode [ 390.620066][T28586] device wg2 entered promiscuous mode [ 390.626382][T28586] IPv6: ADDRCONF(NETDEV_CHANGE): wg2: link becomes ready [ 391.444650][T28630] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.451807][T28630] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.476762][T28630] device bridge0 left promiscuous mode [ 391.903027][T28650] device pim6reg1 entered promiscuous mode [ 392.340468][T28675] device veth0_vlan left promiscuous mode [ 392.379217][T28675] device veth0_vlan entered promiscuous mode [ 392.386749][ T3482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 392.396508][ T3482] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 392.412373][ T3482] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 392.453388][T28678] device wg2 entered promiscuous mode [ 392.486339][T28689] device macsec0 entered promiscuous mode [ 393.582974][T28740] tap0: tun_chr_ioctl cmd 1074025677 [ 393.588319][T28740] tap0: linktype set to 512 [ 393.955413][ T24] audit: type=1400 audit(1720838698.990:181): avc: denied { create } for pid=28789 comm="syz.2.8129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 403.271335][T28811] device syzkaller0 entered promiscuous mode [ 403.442365][T28814] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.449699][T28814] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.467598][T28814] device bridge_slave_0 entered promiscuous mode [ 403.507515][T28814] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.514998][T28814] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.534792][T28814] device bridge_slave_1 entered promiscuous mode [ 403.570113][T28812] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.577599][T28812] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.585339][T28812] device bridge_slave_0 entered promiscuous mode [ 403.623061][T28812] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.630136][T28812] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.638074][T28812] device bridge_slave_1 entered promiscuous mode [ 403.700149][T28814] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.707297][T28814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.714409][T28814] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.722025][T28814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 414.995750][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 415.004872][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 415.013515][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 415.069302][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 415.077792][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 415.088448][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 415.097910][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 415.160800][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 415.169451][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 415.178452][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 415.187590][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 415.195581][ T3498] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.202575][ T3498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 415.210297][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 415.234102][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 415.243153][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 415.251515][ T7594] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.258492][ T7594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 415.268121][T28858] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.280383][T28858] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.287689][T28858] device bridge_slave_0 entered promiscuous mode [ 415.294574][T28858] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.303052][T28858] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.311145][T28858] device bridge_slave_1 entered promiscuous mode [ 415.321905][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 415.330538][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 415.354390][T28857] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.361638][T28857] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.369587][T28857] device bridge_slave_0 entered promiscuous mode [ 415.377179][T28857] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.384445][T28857] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.393334][T28857] device bridge_slave_1 entered promiscuous mode [ 415.408054][T28859] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.415576][T28859] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.423077][T28859] device bridge_slave_0 entered promiscuous mode [ 415.454037][T28859] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.460988][T28859] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.468625][T28859] device bridge_slave_1 entered promiscuous mode [ 415.479287][T18283] device bridge_slave_1 left promiscuous mode [ 415.486283][T18283] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.493968][T18283] bridge0: port 1(bridge_slave_0) entered disabled state [ 415.502033][T18283] device veth1_macvtap left promiscuous mode [ 415.508033][T18283] device veth0_vlan left promiscuous mode [ 415.877543][T28814] device veth0_vlan entered promiscuous mode [ 415.892727][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 415.900786][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 415.909116][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 415.916570][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 415.940962][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 415.949056][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 415.979219][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 415.987453][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.014871][T28814] device veth1_macvtap entered promiscuous mode [ 416.023704][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 416.032710][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 416.040858][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 416.084548][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 416.093090][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 416.101595][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 416.110027][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 416.130289][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 416.138008][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.145395][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.154249][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.162882][ T3498] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.169754][ T3498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.177347][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.186636][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.196413][ T3498] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.203367][ T3498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.211190][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 416.219365][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 416.227284][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 416.235215][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.243386][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 416.259192][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 416.267638][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 416.321959][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 416.330977][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 416.346555][T28858] device veth0_vlan entered promiscuous mode [ 416.363356][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 416.374887][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 416.383218][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 416.392135][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 416.400340][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 416.408626][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.417556][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.425990][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.436970][ T816] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.443854][ T816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.459757][T28812] device veth0_vlan entered promiscuous mode [ 416.479882][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 416.488972][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 416.497505][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 416.505223][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 416.515785][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 416.524623][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.533471][ T3514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.541966][ T3514] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.548854][ T3514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.566087][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 416.575224][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 416.583761][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 416.592874][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.601893][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 416.616158][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 416.627709][T28812] device veth1_macvtap entered promiscuous mode [ 416.636153][T28858] device veth1_macvtap entered promiscuous mode [ 416.654246][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 416.662390][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 416.670852][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 416.678613][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 416.686216][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 416.731609][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 416.740276][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 416.748416][ T434] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.755259][ T434] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.762792][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.772281][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 416.780334][ T434] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.787185][ T434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.852382][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 416.863590][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 416.872116][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 416.881205][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 416.889254][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 416.896958][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 416.905663][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 416.914308][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 416.923161][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 416.932550][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 416.940746][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 416.948689][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 416.956680][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 416.974912][T28857] device veth0_vlan entered promiscuous mode [ 416.988517][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 417.000291][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 417.008429][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 417.047237][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 417.057401][ T7594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.066029][T28859] device veth0_vlan entered promiscuous mode [ 417.081279][T28857] device veth1_macvtap entered promiscuous mode [ 417.095984][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.104359][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 417.112254][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 417.133367][ T24] audit: type=1400 audit(1720838722.170:182): avc: denied { create } for pid=28904 comm="syz.3.8133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 417.135999][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 417.174555][ T434] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 417.196085][T28859] device veth1_macvtap entered promiscuous mode [ 417.221555][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 417.231142][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 417.239850][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 417.248588][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 417.256976][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 417.265826][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 417.274842][ T816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 417.306278][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 417.315529][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 417.326778][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 417.335660][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 417.421345][T28927] device pim6reg1 entered promiscuous mode [ 417.735726][T28947] device syzkaller0 entered promiscuous mode [ 418.267503][T18283] bridge0: port 3(vlan1) entered disabled state [ 418.296576][T18283] device bridge_slave_1 left promiscuous mode [ 418.306302][T18283] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.317671][T18283] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.348248][T18283] device bridge_slave_1 left promiscuous mode [ 418.361974][T18283] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.383969][T18283] device bridge_slave_0 left promiscuous mode [ 418.398032][T18283] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.429797][T18283] device veth1_macvtap left promiscuous mode [ 418.447701][T18283] device veth0_vlan left promiscuous mode [ 418.460948][T18283] device veth1_macvtap left promiscuous mode [ 418.480427][T18283] device veth0_vlan left promiscuous mode [ 422.456985][T29321] syz.3.8269[29321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.458000][T29321] syz.3.8269[29321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.528753][T29321] syz.3.8269[29321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.538564][T29324] device pim6reg1 entered promiscuous mode [ 422.557483][T29321] syz.3.8269[29321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.558298][T29321] syz.3.8269[29321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 422.588851][T29321] syz.3.8269[29321] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 423.843329][ T93] udevd[93]: worker [29007] terminated by signal 33 (Unknown signal 33) [ 423.942548][ T93] udevd[93]: worker [29007] failed while handling '/devices/virtual/block/loop0' [ 423.992972][ T93] udevd[93]: worker [28872] terminated by signal 33 (Unknown signal 33) [ 424.007597][T29460] syz.0.8306[29460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.007656][T29460] syz.0.8306[29460] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.009922][T29459] syz.0.8306[29459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.048728][ T93] udevd[93]: worker [28872] failed while handling '/devices/virtual/block/loop4' [ 424.232049][T29459] syz.0.8306[29459] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.278136][ T93] udevd[93]: worker [29462] terminated by signal 33 (Unknown signal 33) [ 424.420337][ T93] udevd[93]: worker [29462] failed while handling '/devices/virtual/block/loop2' [ 424.457748][T29486] device vxcan1 entered promiscuous mode [ 425.578000][T29534] device pim6reg1 entered promiscuous mode [ 426.621424][T29557] device syzkaller0 entered promiscuous mode [ 429.016028][T29716] syz.2.8377[29716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.016307][T29716] syz.2.8377[29716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.333606][T29759] device pim6reg1 entered promiscuous mode [ 430.021156][T29802] device syzkaller0 entered promiscuous mode [ 430.260888][T29816] device veth1_macvtap left promiscuous mode [ 430.281870][T29816] device veth1_macvtap entered promiscuous mode [ 430.288276][T29816] device macsec0 entered promiscuous mode [ 430.662339][T29852] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.670572][T29852] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.678957][T29852] device bridge_slave_0 entered promiscuous mode [ 430.688716][T29852] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.695643][T29852] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.703991][T29852] device bridge_slave_1 entered promiscuous mode [ 430.762157][T29852] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.769061][T29852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.776244][T29852] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.783044][T29852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.831468][ T7585] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 430.841477][ T7585] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.849843][ T7585] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.053936][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 431.064924][ T3498] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.071828][ T3498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.084114][ T3498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 431.093997][ T3498] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.100921][ T3498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.249282][ T3482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 431.309905][ T3482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 431.355142][T29852] device veth0_vlan entered promiscuous mode [ 431.393571][T12887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 431.406374][T12887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 431.432337][T12887] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 431.442620][T12887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 431.480015][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 431.489818][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 431.508417][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 431.519528][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 431.537978][T29852] device veth1_macvtap entered promiscuous mode [ 431.561596][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 431.572820][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 431.582489][ T667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 431.597277][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 431.613137][ T2682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 431.692751][ T357] device bridge_slave_1 left promiscuous mode [ 431.699995][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.733860][ T357] device bridge_slave_0 left promiscuous mode [ 431.756452][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.785010][ T357] device veth1_macvtap left promiscuous mode [ 431.791418][ T357] device veth0_vlan left promiscuous mode [ 433.309088][ T357] device bridge_slave_1 left promiscuous mode [ 433.315016][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.322861][ T357] device bridge_slave_0 left promiscuous mode [ 433.329075][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.336931][ T357] device veth1_macvtap left promiscuous mode [ 433.342911][ T357] device veth0_vlan left promiscuous mode [ 433.565322][T30052] cgroup: fork rejected by pids controller in /syz4 [ 434.811010][ T357] device bridge_slave_1 left promiscuous mode [ 434.825012][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.860188][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.875927][ T357] device veth1_macvtap left promiscuous mode SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 SYZFAIL: tun: can't open /dev/net/tun (errno 2: No such file or directory) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: tun: ioctl(TUNSETIFF) failed (errno 25: Inappropriate ioctl for device) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=2 req=8434 state=3 status=67 (errno 32: Broken pipe) [ 437.548779][ T357] device bridge_slave_1 left promiscuous mode [ 437.554876][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.563094][ T357] device bridge_slave_0 left promiscuous mode [ 437.571190][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.580933][ T357] device bridge_slave_1 left promiscuous mode [ 437.588689][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.598456][ T357] device bridge_slave_0 left promiscuous mode [ 437.606258][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.616274][ T357] device bridge_slave_1 left promiscuous mode [ 437.624413][ T357] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.632198][ T357] device bridge_slave_0 left promiscuous mode [ 437.639200][ T357] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.648073][ T357] device veth1_macvtap left promiscuous mode [ 437.654065][ T357] device veth0_vlan left promiscuous mode [ 437.660894][ T357] device veth1_macvtap left promiscuous mode [ 437.668431][ T357] device veth0_vlan left promiscuous mode [ 437.676655][ T357] device veth1_macvtap left promiscuous mode [ 437.683715][ T357] device veth0_vlan left promiscuous mode