last executing test programs: 7.900202043s ago: executing program 3 (id=990): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRESOCT=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001840)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="2d63707520a6ce1b890c04993a70331599c56ad4300194808aa1be5eb0e62514000000000078b202b3f298e40822dbd03c99"], 0x5) r6 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)=ANY=[@ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="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", @ANYRES16=r4, @ANYRES64, @ANYRES8, @ANYRESDEC], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000004000000000000000000000b7080000000000007b8af8ff00000000b708000000000000638af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000070ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f00000009c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(r6, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 7.366375436s ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079120c200000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003800000038000000040000000000000004000006040000000100000004000000080000000400000004000000040000000a000000000000000500c1000000000202000000002e2e00"], &(0x7f0000000400)=""/100, 0x54, 0x64, 0x1, 0x2}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa5ba, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x6, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x5e9f71fb1da201dd}, 0x100410, 0x6, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = gettid() r4 = getpid() sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000005c0)="7e3572bdb18c093f63c403fa1e1d255b833b5c624fb1adf5eb7981b154957135dc85ca971ba050743f79fb93d20ea66494afcb61aa7337d98f65dbf1f979086e3a51", 0x42}], 0x1, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x58, 0x40000}, 0x4000000) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0xa05, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26d2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) 6.593601729s ago: executing program 3 (id=990): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRESOCT=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001840)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="2d63707520a6ce1b890c04993a70331599c56ad4300194808aa1be5eb0e62514000000000078b202b3f298e40822dbd03c99"], 0x5) r6 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)=ANY=[@ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="2c31af35419a82aadb9a9cd3d84d13581c10204ea1b3ac013ec174a4e2c9d960ad87d7a1b636d737a6ad5165bed4693d34b708746a6a4638da7c666512ac4167f5b84664077f4b7b2e915e80132a459d77edaab21aef050d6cd6ed3d8bb77191f88fbca98bad64b6ff7aeabfc944d028de1556e8d588a42741081b8e8c3fc4abbefaabc2a5211104429390037d5f952397f90b81c8f9f82c63838d22786a732edd697bc3016d6af5da94f4f74e66ba76ec10901e00938453354fce47211235c31b663488d420ee728936d43aec8792e71d68fc4b1ba38563ff717ea3c55ae74e9cbbd0d747bf7d63173510d9e36f253b6e2f5a9961178e40377f7e957bb2d4dbfa756311696800b5dab1daf70c6fb50cbff1056cdb9a8eec6cefa3e378e9a02646fef1c988bf221322d7e91386000d", @ANYRES16=r4, @ANYRES64, @ANYRES8, @ANYRESDEC], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000004000000000000000000000b7080000000000007b8af8ff00000000b708000000000000638af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000070ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f00000009c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(r6, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 6.110929868s ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079120c200000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003800000038000000040000000000000004000006040000000100000004000000080000000400000004000000040000000a000000000000000500c1000000000202000000002e2e00"], &(0x7f0000000400)=""/100, 0x54, 0x64, 0x1, 0x2}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa5ba, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x6, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x5e9f71fb1da201dd}, 0x100410, 0x6, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = gettid() r4 = getpid() sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000005c0)="7e3572bdb18c093f63c403fa1e1d255b833b5c624fb1adf5eb7981b154957135dc85ca971ba050743f79fb93d20ea66494afcb61aa7337d98f65dbf1f979086e3a51", 0x42}], 0x1, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x58, 0x40000}, 0x4000000) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0xa05, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26d2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) 5.482731528s ago: executing program 3 (id=990): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRESOCT=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001840)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="2d63707520a6ce1b890c04993a70331599c56ad4300194808aa1be5eb0e62514000000000078b202b3f298e40822dbd03c99"], 0x5) r6 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)=ANY=[@ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="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", @ANYRES16=r4, @ANYRES64, @ANYRES8, @ANYRESDEC], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000004000000000000000000000b7080000000000007b8af8ff00000000b708000000000000638af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000070ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f00000009c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(r6, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 4.906430924s ago: executing program 1 (id=1062): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='fib6_table_lookup\x00', r1}, 0x9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0xc8, 0x0, 0x8, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='fib6_table_lookup\x00'}, 0x10) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000240)='fib6_table_lookup\x00', r1}, 0x9) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x22, 0xc8, 0x0, 0x8, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) close(r3) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='fib6_table_lookup\x00'}, 0x10) (async) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd"], 0xfdef) (async) 4.901323905s ago: executing program 4 (id=1064): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x10003, 0x0, 0x5, 0x8000000000000000, 0x5}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback=0xc}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x5, 0x42, 0x7, 0x0, 0x0, 0x9d6d1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0xd}, 0x10137f, 0xce4a, 0x7, 0x0, 0x81, 0x2, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)=0x10000) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 4.881044627s ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079120c200000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003800000038000000040000000000000004000006040000000100000004000000080000000400000004000000040000000a000000000000000500c1000000000202000000002e2e00"], &(0x7f0000000400)=""/100, 0x54, 0x64, 0x1, 0x2}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa5ba, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x6, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x5e9f71fb1da201dd}, 0x100410, 0x6, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = gettid() r4 = getpid() sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000005c0)="7e3572bdb18c093f63c403fa1e1d255b833b5c624fb1adf5eb7981b154957135dc85ca971ba050743f79fb93d20ea66494afcb61aa7337d98f65dbf1f979086e3a51", 0x42}], 0x1, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x58, 0x40000}, 0x4000000) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0xa05, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26d2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) 4.08916445s ago: executing program 1 (id=1066): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000d80), 0x9}, 0x0, 0x0, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000bb0000000000000000f2313b615aec3c3e8531a393a684e645d212a3aca8ffa40459d7355236f16e9796a67ccaff011ab1c11b66cb4772d963c915e9ad5274e47a65a1def88c333c6e771e2ca01b9b61620793", @ANYRES32=0x0, @ANYBLOB], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r4, 0x8901, 0x2000ff04) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffff8}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000003c0000003c00000002000000000000000100000d030000000000000003000000000000000000000105000000200000000000000000000003000000000200000002000000000000000000"], 0x0, 0x56}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000d40)='afs_protocol_error\x00', r1, 0x0, 0xfffffffffffffffb}, 0x18) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d00)={r5, 0xe0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f0000000940)=[{}], 0x8, 0x10, &(0x7f0000000980), &(0x7f0000000b80), 0x8, 0x90, 0x8, 0x8, &(0x7f0000000bc0)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000780)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22e0ee00000000000000000000000000007fc5f603ff65ec5deb004298f479a79d93014b8e7781c2"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="040000007c000000e80affff09000000c8100100", @ANYRES32=r2, @ANYBLOB="ff0700"/20, @ANYRES32=r7, @ANYRES32=r9, @ANYBLOB="01000000020000000400"/24, @ANYRES32=r6, @ANYBLOB="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"], 0x50) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) recvmsg$unix(r3, &(0x7f0000000340)={&(0x7f0000000240), 0x6e, &(0x7f00000003c0)=[{&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000003100)=""/4096, 0x1000}, {&(0x7f0000000600)=""/218, 0xda}, {&(0x7f0000000700)=""/218, 0xda}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000880)=""/174, 0xae}, {&(0x7f0000000a00)=""/183, 0xb7}, {&(0x7f0000000ac0)=""/135, 0x87}], 0x8}, 0x40000020) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a0, &(0x7f0000000080)) r10 = openat$cgroup_devices(r0, &(0x7f0000000e00)='devices.deny\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e40)=@o_path={&(0x7f0000000dc0)='./file0\x00', 0x0, 0x0, r10}, 0x18) 4.086642161s ago: executing program 2 (id=1067): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="05000000010000008e000000c9e7000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="bdf886dc4b0bd3cf67c600"/28], 0x50) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000880)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x2, [@ptr={0xc, 0x0, 0x0, 0x2, 0x5}, @func_proto, @type_tag={0x2, 0x0, 0x0, 0x12, 0x1}, @const={0xf, 0x0, 0x0, 0xa, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x3c29}}, @union={0x10, 0x1, 0x0, 0x5, 0x1, 0x10001, [{0x3, 0x3, 0xff}]}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x7b, 0x0, 0x37, 0x1}]}}, &(0x7f0000000980)=""/183, 0x8a, 0xb7, 0x0, 0x3, 0x10000}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r1, 0x4f, &(0x7f0000000140)={&(0x7f0000000700)=""/187, 0xbb, 0x0, &(0x7f00000007c0)=""/188, 0xbc}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1f, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x412482ab, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1d, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="b4000000000000000000000000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xb6, &(0x7f000000cf3d)=""/182, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1d, 0x4, 0xf, 0x20000000, 0x1, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x40, 0x6, 0x9, 0x6, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2, 0xd}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x20, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8730}, [@func, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @generic={0x4, 0x3, 0x5, 0x33, 0x85b5}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000940)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000b40)=""/139, 0x41100, 0x65, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000c00)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000c40)={0x3, 0x1, 0x10000, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000c80)=[r3, r3, r4, r0], &(0x7f0000000cc0)=[{0x5, 0x3, 0x2, 0x5}, {0x2, 0x2, 0xa, 0xb}, {0x1, 0x5, 0x4, 0x8}, {0x5, 0x4, 0x9, 0x5}, {0x5, 0x4, 0xb, 0x1}, {0x5, 0x5, 0x10, 0x8}], 0x10, 0x6}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r3, r5, 0x5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x5, 0x12) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000580), 0x4) r7 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r6}, 0x8) close(r7) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 4.085637721s ago: executing program 3 (id=990): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRESOCT=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001840)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="2d63707520a6ce1b890c04993a70331599c56ad4300194808aa1be5eb0e62514000000000078b202b3f298e40822dbd03c99"], 0x5) r6 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)=ANY=[@ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="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", @ANYRES16=r4, @ANYRES64, @ANYRES8, @ANYRESDEC], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000004000000000000000000000b7080000000000007b8af8ff00000000b708000000000000638af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000070ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f00000009c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(r6, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 3.287228385s ago: executing program 4 (id=1068): close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000001100a200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000700)=ANY=[@ANYBLOB='1-'], 0x31) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='sched_switch\x00', r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) 3.286298475s ago: executing program 1 (id=1069): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, &(0x7f0000000280)="2a30053e1c3176348270ca8b9180188fc835645c38b5c342fa86e88edfa65351a46a96741fb8b27eb7a0bbf51c48d5e453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000500)="6b1241a41d99c8569a303405905fe1c4543bb099f23b09aa00a4b2929f65dc8a0e1d46", &(0x7f0000000680)=""/147}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x14, 0x4, 0x4, 0x10002, 0x1800, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x33}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000007f1d3f937f24f1d729a7426ecbecb4001711000000000000e5ff", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000f00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.279330076s ago: executing program 2 (id=1070): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x2e, 0x0, 0xf, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001480)=ANY=[@ANYRES32=r5, @ANYRES32=r5, @ANYBLOB="140000001c20000000000000", @ANYRES32, @ANYBLOB="752da38d698664709b90a5c4f79b6b7caffb2c8b727c01068d267e0122260e5db7dbb84326b59c977b50446b187a942400000cb3c3b0c812e5024b2b1c3d61933de9adf6dab3226fb3d8caa387760bfd5c572198d813519259c28dd1f348fbd8b508aabc75b6bdc0ff8e23263168", @ANYRES64=r6], 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@fallback=r4, r4, 0x36, 0x4c, r2, @void, @value=r3, @void, @void, r6}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000980)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0800000006000000", @ANYRES32=r1, @ANYBLOB="fd4f8fb09c62337083f7854903739ff8a52571f3354507ab5242466dc58bc098bc4aefa8ae973df561036f12d84e6028fea91432e43df5d7c0fb27ec06d7c92c3bba3a4e84534699f38a77ebb29c8a60dd48d4ded3f78231c4d9990cbe53c0fbe3d6a768638ff2281605ac3d281b4d8d617e5ed3c5704f305fa567e91de65b5b62c926da663a431e62d05157e7a50340a5426b8720f2ad069b5a9a733685452920f288ef52d0071e6733b161ee2a058ecc820b0d7852f69b46c9be3dc875a43191d712ae260e2b811db9f803d5cf661cc207400f725a4f33d0e506ca782700000000000000064970e62c027b8d58be", @ANYRES32=r1, @ANYBLOB, @ANYRES64=r6], 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x8002a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={0x0, 0x3}, 0x0, 0xc8, 0x7fff, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) close(r8) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x3, 0x8, 0x1}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r11}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r12, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd24}, {0x0, 0x4000}, {0x0, 0x21}, {0x0}, {&(0x7f00000020c0)}], 0x5}, 0x0) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0x9, 0x9, 0x3, 0x0, 0x8, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x1, @perf_config_ext={0x0, 0xffffffff}, 0x110000, 0x7, 0x9, 0x1, 0x100000000, 0x8, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xf, r13, 0xc35b42fd65b6e448) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0), 0x8) 3.215855081s ago: executing program 2 (id=1071): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd6c}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000580)={r1, 0x0, 0xa2, 0x0, &(0x7f00000004c0)="2dbfedb09bab850ed795124d687852afad332bcc9a077ef1406011993af0371c67a5d627fc133a10efaadd5bc3c0bfb6222c62f0e90cb592c09e86c4d9de1771af5028c22bd645b6a62cf7358c5e51c74791c16bbd3392d0ec8aa5d1c366ec2c9ff8c87325f3ee5815b9063cd0a04abf2bc24cf1e54e1a8d90413d19bfa22f8a2c0e58c00f0c20bdcfd7e287b77187b6094e726899c46e45dd237cf696cc33b6d6d6", 0x0, 0x5, 0x0, 0xe6, 0x0, &(0x7f0000000700)="cb1d86d48492208e8971f7378882f1bfe7a4ef51e1aa48699511adf2518c525f8c14b8db6a299d1b87cde5d1fe9e9cb8c9acca60da1c065e28511a94e2274126846894c31987ab1a0877e8c6b2f039f7c71b550481997d93a81ce0ba3f900a4e411b9f78dac3c2ed1af5631818bc07f2254a995ed9e6532b4419690d7994ecf1e6826cfba37e0949400ab5d7609295b846e372af7c9329f3154e0fd2579be8cc6c7435f65f8b939ef42ec83a29e09ae5cab32b9176b60e182a54a640834c2511901cc5b922119a9bd29e001f4d38d00788cf4b2c5e33491905041078bfd026aca2e571977368", 0x0, 0x2, 0x0, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000200)=ANY=[@ANYRES32], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xe, 0x5, &(0x7f00000006c0)=@raw=[@tail_call], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.215246021s ago: executing program 4 (id=1072): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x2e, 0x0, &(0x7f0000000240)='GPL\x00', 0x7fff, 0xffffffffffffff24, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x7f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0xb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x20, 0x19, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000007000001041811000066bec616a8bb3604160000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000186900000b000000000000000600000018320000030000000000000000000000186300000900000000000000faffffff1864000009000000000000008f53ffff18520000060000000000000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000", @ANYRES8=r2], &(0x7f0000000000)='GPL\x00', 0x2, 0xdd, &(0x7f0000000340)=""/221, 0x0, 0x8}, 0x94) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000340), 0x9) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f00000006c0)={&(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f00000005c0)=[{&(0x7f00000022c0)="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", 0x800}, {&(0x7f0000000480)="98394755849309c480bfe4d40fdf45226dd7e2c5bc8d33c4c6544b7e033b9362065e0d967c99e7b40911fd8c2363ce70339f149b9536076be177b5605f3c30f4b483eaf594719aea8e9669235978c074000b221c10e9d7d87f3b95fc0592aeac9b62aff9161b528f7d976f542c03f40b3a0e499696b37dbab00c17a264d4587abe7c9922442d9c4a503676ef93c5492ad6aae064f97e62d77b36b6ef0ef942d6adb1765230c1b49b39b2bf0c890d3720958b05b44ea6bec04aa37a998aae00c798aeb617343cc59f5e91e0d1", 0xcc}, {&(0x7f0000000400)="b3d6559e56f50325c4611062a5c3cb8e790f756ecd08f649c9dd362b37d358d9903a1127b0ad0ffae3e4c85e22c8d9c129a5e6c1df138663a0aed9b245e81dce08e8b9210912b34361e1", 0x4a}, {&(0x7f0000000700)="d67154b3319046c876543a1821d18d5499df58e42924f4a7a3a13c275e5073130b8dd5b3b61f85ce6d920207894e3855eab7615de69ff1ef72930bd952cb20c3b519f9fec024", 0x46}, {&(0x7f0000000780)="fc9500b122857b2594df250bd9faed30f25d734d38d53f3065d30241e9421ea7557310d2e074f7f06cc4369ef00d2b646eb104f10884d0ceb9bffc114ae6bfceb042ad3c6d033b70fb86d8097beb4243338bb795ab6c25596ed9cac943a276e1c1729ddf3e1c1a4c021873bfec72def061", 0x71}], 0x5, &(0x7f0000000640)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}], 0x18}, 0x40) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) 3.10138082s ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079120c200000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003800000038000000040000000000000004000006040000000100000004000000080000000400000004000000040000000a000000000000000500c1000000000202000000002e2e00"], &(0x7f0000000400)=""/100, 0x54, 0x64, 0x1, 0x2}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa5ba, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x6, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x5e9f71fb1da201dd}, 0x100410, 0x6, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = gettid() r4 = getpid() sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000005c0)="7e3572bdb18c093f63c403fa1e1d255b833b5c624fb1adf5eb7981b154957135dc85ca971ba050743f79fb93d20ea66494afcb61aa7337d98f65dbf1f979086e3a51", 0x42}], 0x1, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x58, 0x40000}, 0x4000000) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0xa05, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26d2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) 3.09827908s ago: executing program 1 (id=1073): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = syz_clone(0x800, &(0x7f0000000340)="898a6f12f2ef62995fac663f8a4976213429d3ddfad674", 0x17, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="63b5e53fda6cc4281cccfe1d6a98c9f2") r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000880), 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r6, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x61, 0x2e, 0x2e]}}, 0x0, 0x1e}, 0x28) perf_event_open$cgroup(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x3, 0x2, 0x0, 0x4, 0x21000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000300), 0xa}, 0x4000, 0x8000000000000001, 0x4, 0x3, 0x6, 0x3f, 0x16ae, 0x0, 0x5, 0x0, 0xffff}, r0, 0x1, r4, 0x7) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x20000000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x50) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1e) 3.09444814s ago: executing program 4 (id=1074): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000000100000000000000", @ANYRES32, @ANYBLOB="fcffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", 0x0, 0x5, r0}, 0x38) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) (async) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1, @perf_config_ext={0x6, 0x104800}, 0x4dc6, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0xfffffffe, 0x1, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffc000000002, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x110, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000200b703000000000000850000007d000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb702000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$tipc(r2, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 3.043852215s ago: executing program 2 (id=1075): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000880), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000008c0)={[{0x2d, 'cpuacct'}]}, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xa}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x1}}, @enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0x4, 0xffff136c}, {0x0, 0x8}, {0x6, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x0, 0x2e, 0x0, 0x5f]}}, &(0x7f0000000540)=""/107, 0x5c, 0x6b, 0x1, 0x0, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x15, &(0x7f0000000140)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffff17e, 0x0, 0x0, 0x0, 0x4}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @ldst={0x0, 0x2, 0x4, 0x7, 0x5, 0xc, 0xfffffffffffffff0}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @generic={0x1, 0x9, 0x9, 0x1, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000200)='syzkaller\x00', 0x1, 0x5f, &(0x7f00000002c0)=""/95, 0x40f00, 0x1, '\x00', r5, 0x0, r6, 0x8, &(0x7f00000005c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x3, 0x6, 0x4c7c, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r0, r0, r0], 0x0, 0x10, 0x1}, 0x94) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000c76d000000000000008100000081"], 0x48) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x15) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r8, 0x58, &(0x7f0000000080)}, 0x10) 1.901136397s ago: executing program 1 (id=1076): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='btrfs_failed_cluster_setup\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x6, [@const={0x2, 0x0, 0x0, 0xa, 0x4}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x9, 0x1}, {0x10, 0x3}]}, @volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x5f, 0x2e, 0x30, 0x0]}}, &(0x7f00000008c0)=""/169, 0x5a, 0xa9, 0x0, 0x9}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r6, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x15, &(0x7f0000000340)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xffffffffffffffff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ff}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}], &(0x7f0000000400)='GPL\x00', 0x7, 0x83, &(0x7f0000000780)=""/131, 0x41100, 0x30, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000a00)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x2, 0x9, 0x1}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000a80)=[r3, r6, r0, r0, r3, r0, r3, r0], &(0x7f0000000ac0)=[{0x0, 0x1, 0x10}, {0x1, 0x2, 0xa, 0x4}, {0x1, 0x4, 0xb, 0x7}, {0x3, 0x2, 0x8, 0x6}], 0x10, 0x200}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r10, r9, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r10}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r8, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) 1.900361547s ago: executing program 2 (id=1077): perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff4d}, 0x94) r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r0}, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b000000080000000c000000fbbfffff01000000", @ANYRES32=0x1, @ANYBLOB="00004b104f0dcf65625ec315e749ce0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x52, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000580), 0x8, 0x1b, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000004b01b91c7d75d5dd2148911c0c229ea8b3fbe09e7f5c41c1cef6a94342e09d3e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000400)='signal_generate\x00', r5}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='+blkio -freezer -blkio -freezer +rdm! +net_cls +rdma +devices '], 0x3e) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 1.899981447s ago: executing program 3 (id=990): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRESOCT=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001840)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="2d63707520a6ce1b890c04993a70331599c56ad4300194808aa1be5eb0e62514000000000078b202b3f298e40822dbd03c99"], 0x5) r6 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)=ANY=[@ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="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", @ANYRES16=r4, @ANYRES64, @ANYRES8, @ANYRESDEC], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000004000000000000000000000b7080000000000007b8af8ff00000000b708000000000000638af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000070ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f00000009c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(r6, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 1.383449299s ago: executing program 4 (id=1078): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='dlm_recv\x00', 0xffffffffffffffff, 0x0, 0x100000000010000}, 0x18) (async, rerun: 32) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x12, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32=r2], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="09000000040000009905000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r5, 0x0, 0x1ba8847c99}, 0x38) perf_event_open(&(0x7f0000000a00)={0x5, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0xb, 0x0, 0x101, 0x0, 0x3c4b}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) syz_clone(0xc2164000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) perf_event_open$cgroup(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x5, 0x9f, 0x0, 0x6, 0x200, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_config_ext={0x4, 0x7}, 0x8080, 0x7, 0x7, 0x4, 0x9, 0x0, 0xd06, 0x0, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0xc, r0, 0x6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000380)='hrtimer_start\x00', r7}, 0x18) (async, rerun: 32) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000b18eb9d994f3ecb600800000000000", @ANYRESHEX=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r9}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r11}, 0x10) (async) write$cgroup_int(r10, &(0x7f0000000200), 0x43451) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r12, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0xe00}, 0x1f00) 1.382593149s ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079120c200000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003800000038000000040000000000000004000006040000000100000004000000080000000400000004000000040000000a000000000000000500c1000000000202000000002e2e00"], &(0x7f0000000400)=""/100, 0x54, 0x64, 0x1, 0x2}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa5ba, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x6, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x5e9f71fb1da201dd}, 0x100410, 0x6, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = gettid() r4 = getpid() sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000005c0)="7e3572bdb18c093f63c403fa1e1d255b833b5c624fb1adf5eb7981b154957135dc85ca971ba050743f79fb93d20ea66494afcb61aa7337d98f65dbf1f979086e3a51", 0x42}], 0x1, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x58, 0x40000}, 0x4000000) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0xa05, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26d2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) 519.773128ms ago: executing program 1 (id=1079): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRESDEC=0x0], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYBLOB="f9ffffffffffffffdcd5635f5f"], 0x48) (async, rerun: 32) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000bc00000000000000000000000000008000000000009a48022cd2fe43bd87a173906c8305f5845851553bcc44daab2dfaccd7a5b01dd300dff729a138056828a9a05edb2951207aee101d2dd948262325be5e4da29e9bdbcab255eca2042dd6cc8971a57b74a545615b9e83e3a0fbc07b046cb0291652a285ac123a552a936a82239ce20200a7b0d39714cd38099b0aa649be087cc93479b2fb3078de3fd6d04ae3f8ee3b90bfc733f67486a29e2e2726313f8024f55e7dd618084151ec7a03dc0459dca6d1ed0496c98b0895"], 0x48) (rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) gettid() (async, rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) (async, rerun: 64) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x2000000, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async, rerun: 32) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r6}, &(0x7f0000000180), &(0x7f00000001c0)=r5}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) (async) syz_clone(0x4142400, &(0x7f00000003c0)="f3b2cfe7f9a84d8a61f4d9559a331e8f49d383337a90c0ddaeb9fcb0f71d662f305798b2a3d83327ecc8857d64da52cb6a46709b59fe20f6288fae6c6e2595a01ef28a7533", 0x45, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="039780f12f3d87e63f6881e0c7767c24ddc33913c308b4bdc69c4a23a2b33cca62cbac15a49116231d5edd0ba7d9a332ee040d1b418a34af422d27ad627717ad2a828fe13d89d91c69304d4710449a7851c96152f1097c39f4818b54a2d9f7b3a8459ca0cab020865a9c0aa96f3afaedf86eccd7f5f5f5d9c7f48491b797160fcd0170ebf9a0149b70daf4748dfba8951fcb7a10ffc8253b54a6a7755a653c33a99bcb10e91e7099b28fbe53b898c1ca5a2b42e8889e1804f2aab99a70e5bbc9792314e6ff32920639f061") (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0xf, 0x8, 0x58c5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000018000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009e00000095000000000000002f81c461b3fea834ceb0e17d9838c2830ca7ce46e581a192326a3698c79205e02f1561b0a3c595448e9f7024b45fb2006c9917fe2a42fcd2ce278009682dc8f7c867b177ec5bd50b92aedef35b6cd87b56690b4c96f63ab021ee1cf616d8af74911d5e51b76d2c31b8bece7b0f"], &(0x7f0000000080)='GPL\x00', 0x1000000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0xe, 0x0, &(0x7f0000000000)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000000)={r3, 0x0, &(0x7f0000001740)=""/4120}, 0x20) 516.551568ms ago: executing program 2 (id=1080): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000e5b07aa800004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r3, 0x0, 0x4}, 0x18) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x1ff) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x13, 0x1b, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000006000000000000000d00000018100000", @ANYRES32, @ANYRESOCT], &(0x7f0000000280)='GPL\x00', 0x9, 0xf9, &(0x7f0000000780)=""/249, 0x40f00, 0x4e, '\x00', 0x0, @fallback=0x28, r4, 0x8, &(0x7f0000000980)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000b40)={0x2, 0xb, 0x6, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000b80), &(0x7f0000000bc0)=[{0x3, 0x2, 0x1, 0x6}], 0x10, 0xc}, 0x94) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYRES32=r0, @ANYBLOB="12dc2fcd46f0f4432a3283759150c490365461f7550000a30df5aaefd6a9179445fde580535750aece8024b4ef872711ea327f9cd927c4812e87cab1d675c656b586716915778730e27d22165d122a93e280e1df762bfc7081c508014fb51fdb945960854a06c1b117a4cb643168df45dc1020d0140eda446a30ce6578491fce0ca195168e196dea80f856e8c7bad2f7687c8193424a24e0967f41c9ba3b1061cfb5d9ae8640175e8784798abd814d3f42fdf775a7206ff8433599ed5c354dd62bdd3da811483c28072b26aa2c95c6066baafc7b0d53b2c55ece0c47c200b0", @ANYRES32=0x0, @ANYRES64=0x0], 0x20) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) recvmsg(r1, &(0x7f0000000040)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000340)=""/83, 0x53}, {&(0x7f0000000440)=""/80, 0x50}, {&(0x7f00000006c0)=""/201, 0xc9}, {&(0x7f00000007c0)=""/226, 0xe2}, {&(0x7f00000022c0)=""/4096, 0x1000}], 0x5}, 0x100) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x400, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8924, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) 515.727219ms ago: executing program 3 (id=990): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRESOCT=r1], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d40)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000063113400000000006037090003fe2c38e000000000000000"], &(0x7f00000003c0)='syzkaller\x00', 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$tun(0xffffffffffffff9c, 0x0, 0x98040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0, 0x1000, 0x0, &(0x7f0000000680)=""/4096, 0x6, 0x0, 0x0, 0xe9, &(0x7f0000000140), &(0x7f0000001680)="e01b20124e874aa6b60879e40d28511fc74e7ca215424c97793fcef77fe7fc59fe55f1c7c0f9db55d3132b4a4f2c52daaa8607d0a8f8aa2b25fd3c03238008c3310290f9dcf52c0e6bb61f388f7bca369f263d1f5eebd92407a0faedf3e41b52475ef854d0ecfb3933b51b26a4adb8c0e40d522d091366d568885e3b1b83fbaaec47cd672b64cb0ef94902ed3ed259872af7c50fd8876221ef203b0c058c95b9ddd555f3a7f045894f33ff643e34a417bb2cbfa8d8299661af396ca698066f6996383bbc6c217a964d87757f1a9b45e282b77f55f3d271f9d106740555c9cabe2b77fc01c080503945", 0x4, 0x0, 0x80000001}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000}, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001840)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_subtree(r4, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752047714f2845c87fb0e60b74e6a66cbe20bb7c9807d2f0907bd122f6aa3547725cf71d2296bac6ee1ef5cc88b8be8a7ff396ae13646ba7842d24e7bea557a581386b6664d62248666dfbabc019b5a77f7d7c79f9466fc3de34e665b2643c6e8a7eb2"], 0x5) write$cgroup_subtree(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="2d63707520a6ce1b890c04993a70331599c56ad4300194808aa1be5eb0e62514000000000078b202b3f298e40822dbd03c99"], 0x5) r6 = openat$cgroup_type(r3, &(0x7f0000000300), 0x2, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001940)=ANY=[@ANYRES16=r2, @ANYRESOCT=r2, @ANYBLOB="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", @ANYRES16=r4, @ANYRES64, @ANYRES8, @ANYRESDEC], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000004000000000000000000000b7080000000000007b8af8ff00000000b708000000000000638af0ff00000000bfa100000000000007010000f8ffffffbfa40000000000000704000070ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f00000009c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(r6, &(0x7f0000000080), 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000440)={'wg2\x00', @random="c2bcbe9876ac"}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xffffffffffffff80}, 0x100888, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f00000002c0)={'wg2\x00', @multicast}) 1.62729ms ago: executing program 4 (id=1081): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d58c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb6220030100dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000066d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c9727ec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f0dafc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa1c22015e53fd8a46be933ab460d8629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8f12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5ff070000000000000ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5f45c879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2ea86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c58684a1d2f624c3eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366aa660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef3103ce10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d61800aaf7e038879c5d177b3876fda4121e00000100000000003edd3d43cc64e0d26b46907b42e08d000000000000903350932d3eef7fdada20c19807066e3c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a74748b8cd994ed368695aa2c59869c9200a1306ffa5a71ca69e89a69fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeaded2930376eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041894f60fbbcafa487ee96b368e8769da90b44190e569fe8b923c32c288baaca5c5558b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff35a9eec46dfc8a52433f605ebf151c837b4966b5f3628a406175a87e32c5e4268d3000933b580415b162e2946446b8f02554c8a1225217d69d049685dd06aa8528673a9673a723ac414af77f523ad730d00e8700c213f95c87a94f39f506b9e000000000000000000000000000000000000000000000000000090668ac41a1c2a4f7831e6c6a3e9c68ca2c449482bb70a994e71a7f24873848fbb128c820c1de19cc003dfa65a2b296caeb1253802080e08eeb724c4c7b7e052afa19b0f2cd7a13bda4b5a8f3b8fa3ca70bb756a3d529718d5c79d9bdb89e5d33793533211d76d00a45079eff797476106bf76f1fed952a7c9162b88911b5b00c3d26fd2fb4d7b29d1ce025e102d458efd5cca3f3835ce760359eaa01cb13cb28d60e8942fdc02b6824c00dac62f8a2d4c680ae284a82f09d6641921536814b444e4188d9b2e97eb3b108e7876f0f3f3863147ab694218c7cecc075d52d590dddbb57fc6fedf5ec69d7894a7b5c8109f303dab998815c80534b0bd34c49eea63997e56728a8185a8bb6988a7197b87f5548f5edfdfb3efc907fe561b33a6f7c707f7828c6adaf3b2a39929b4b65253e787d65c08aff5e4a9b2267bd8f803ea38f10a6e9c4a49bf23525e08c12d229211fe4d88cf1440f29accfa50f327ac1fb20d7f164100111bd21fca713b2475f1c997f3000000000080c426bcec79c6bc83ce4e6cbb17c01be69db342192d0a716cc24710d23321441f475ec485d642b61c6bd907071dbbe37c0b78f60fd2ad0d13ca62d9d9aafb01c3920b64cb5e023810e2de4327f90c389ce36d90ff9f3cb9d8cd2260d05a8126943a3df17157470595c68ac8df7fea6d42ecb2cdb65b4f2aef0dc4b2de949a6d4ec37f2fd693ae44944041a64fe6336aba1c66b1b95d2edbc40364a049616ae962d75eae619548aa86bd5f0bad56e7ad7de2ee5e6f3b42e3a27094b6b5face99456d9af1926b21d37faf7612d9752cf58e6424decd530b5419e117ec086174439af6ee6c7fdb2d19c9280fa9a02e8fa6a38acfff09050d912635fed175fd06f577d40000000000000000000000000000754bffd73c0888ba8834f20b3acea57b7817663e12c1a5503bc4c13af59bda21688d68698c53ce3aa767657774db09ece7ec888d3af290207d36fa433b35e17dc0f3dc728ea1c633a4ef9e7d9bf81b57492e0544800921d1b751c5fbc163"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1e, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 0s ago: executing program 0 (id=702): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000079120c200000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018000000000000003800000038000000040000000000000004000006040000000100000004000000080000000400000004000000040000000a000000000000000500c1000000000202000000002e2e00"], &(0x7f0000000400)=""/100, 0x54, 0x64, 0x1, 0x2}, 0x28) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa5ba, 0x1, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x6, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x2e20, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000004430000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="02"], 0x48) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x3d) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1d, 0x1, @perf_bp={0x0, 0x5e9f71fb1da201dd}, 0x100410, 0x6, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = gettid() r4 = getpid() sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000540)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f00000005c0)="7e3572bdb18c093f63c403fa1e1d255b833b5c624fb1adf5eb7981b154957135dc85ca971ba050743f79fb93d20ea66494afcb61aa7337d98f65dbf1f979086e3a51", 0x42}], 0x1, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r1]}}], 0x58, 0x40000}, 0x4000000) syz_clone(0x8010e000, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0xa05, 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x26d2}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x50) kernel console output (not intermixed with test programs): IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.941057][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.948093][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.955591][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.963897][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.970900][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.978338][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.986485][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.993508][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.012378][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.020209][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.028179][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.047494][ T285] device veth0_vlan entered promiscuous mode [ 22.062718][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.070218][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.077975][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.086450][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.094561][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.102074][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.109436][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.117869][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.125897][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.134304][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.141380][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.160529][ T282] device veth0_vlan entered promiscuous mode [ 22.172202][ T285] device veth1_macvtap entered promiscuous mode [ 22.187413][ T283] device veth0_vlan entered promiscuous mode [ 22.193949][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.202158][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.210054][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.219047][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.227251][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.235673][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.244105][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.252108][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.259983][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.268290][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.276437][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.284304][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.292684][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.301027][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.308061][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.315684][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.324043][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.332423][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.340208][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.348212][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.356305][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.364297][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.371757][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.379107][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.386681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.402042][ T282] device veth1_macvtap entered promiscuous mode [ 22.411147][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.419498][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.427775][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.436787][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.445439][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.454025][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.462265][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.469388][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.476895][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.485138][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.493274][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.501586][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.510010][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.517063][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.524412][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.532749][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.540825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.548496][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.570128][ T286] device veth0_vlan entered promiscuous mode [ 22.582751][ T283] device veth1_macvtap entered promiscuous mode [ 22.595667][ T284] device veth0_vlan entered promiscuous mode [ 22.602334][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.610504][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.619328][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.627124][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.635362][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.643439][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.651518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.659386][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.667738][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.676089][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.683935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.691865][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.699993][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.708479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.716880][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.725498][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.733995][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.742327][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.750300][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.764161][ T285] request_module fs-gadgetfs succeeded, but still no fs? [ 22.775172][ T286] device veth1_macvtap entered promiscuous mode [ 22.784137][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.792483][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.800079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.807743][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.815317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.822909][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.831039][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.839512][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.848006][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.856343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.871079][ T284] device veth1_macvtap entered promiscuous mode [ 22.904255][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.916586][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.926377][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.934365][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.942899][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.951662][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.960112][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.979009][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.991590][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.039943][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.058390][ T228] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.160347][ C1] hrtimer: interrupt took 26895 ns [ 23.238288][ T344] device sit0 entered promiscuous mode [ 25.048715][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 25.048729][ T30] audit: type=1400 audit(1754907137.445:111): avc: denied { write } for pid=395 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.080451][ T393] device pim6reg1 entered promiscuous mode [ 25.191210][ T30] audit: type=1400 audit(1754907137.545:112): avc: denied { create } for pid=402 comm="syz.3.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 25.262076][ T30] audit: type=1400 audit(1754907137.595:113): avc: denied { write } for pid=400 comm="syz.1.17" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 25.660773][ T30] audit: type=1400 audit(1754907138.045:114): avc: denied { ioctl } for pid=415 comm="syz.1.21" path="socket:[16624]" dev="sockfs" ino=16624 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.947050][ T30] audit: type=1400 audit(1754907138.095:115): avc: denied { setopt } for pid=423 comm="syz.3.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 26.013014][ T30] audit: type=1400 audit(1754907138.385:116): avc: denied { cpu } for pid=423 comm="syz.3.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.730782][ T30] audit: type=1400 audit(1754907139.125:117): avc: denied { relabelfrom } for pid=456 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.768745][ T30] audit: type=1400 audit(1754907139.125:118): avc: denied { relabelto } for pid=456 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 26.811429][ T30] audit: type=1400 audit(1754907139.195:119): avc: denied { append } for pid=458 comm="syz.3.31" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 27.383018][ T483] syz.0.36[483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.383090][ T483] syz.0.36[483] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 27.879437][ T495] bond_slave_1: mtu less than device minimum [ 28.579626][ T30] audit: type=1400 audit(1754907140.975:120): avc: denied { create } for pid=513 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 30.146964][ T567] syz.0.59 (567) used greatest stack depth: 21680 bytes left [ 31.656060][ T609] device pim6reg1 entered promiscuous mode [ 32.975301][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 32.975315][ T30] audit: type=1400 audit(1754907145.375:124): avc: denied { create } for pid=683 comm="syz.2.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 33.173477][ T686] device sit0 entered promiscuous mode [ 33.194697][ T30] audit: type=1400 audit(1754907145.595:125): avc: denied { read } for pid=694 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.592805][ T735] syz.2.102[735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.592873][ T735] syz.2.102[735] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.011542][ T741] device veth0_vlan left promiscuous mode [ 35.035053][ T741] device veth0_vlan entered promiscuous mode [ 35.167026][ T737] device syzkaller0 entered promiscuous mode [ 35.996322][ T30] audit: type=1400 audit(1754907148.385:126): avc: denied { create } for pid=781 comm="syz.3.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 36.016177][ T799] device sit0 left promiscuous mode [ 36.071838][ T30] audit: type=1400 audit(1754907148.445:127): avc: denied { create } for pid=800 comm="syz.2.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 36.095066][ T787] device sit0 entered promiscuous mode [ 36.197280][ T799] ------------[ cut here ]------------ [ 36.222735][ T30] audit: type=1400 audit(1754907148.625:128): avc: denied { create } for pid=809 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 36.260668][ T799] trace type BPF program uses run-time allocation [ 36.312443][ T799] WARNING: CPU: 0 PID: 799 at kernel/bpf/verifier.c:11718 check_map_prog_compatibility+0x6cd/0x870 [ 36.413702][ T799] Modules linked in: [ 36.425064][ T799] CPU: 0 PID: 799 Comm: syz.3.114 Not tainted 5.15.189-syzkaller-android13-5.15.189_r00 #0 [ 36.444022][ T799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 36.472877][ T799] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 36.479594][ T799] Code: ee ff 48 c7 c6 20 ec 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 56 4c ee ff c6 05 43 92 6b 05 01 48 c7 c7 80 e8 47 85 e8 a3 e9 24 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 36.564700][ T799] RSP: 0018:ffffc90000b97428 EFLAGS: 00010246 [ 36.578929][ T799] RAX: f97c73e4fec58200 RBX: 0000000000000001 RCX: 0000000000080000 [ 36.616942][ T799] RDX: ffffc90003393000 RSI: 0000000000003c44 RDI: 0000000000003c45 [ 36.635030][ T799] RBP: ffffc90000b97470 R08: dffffc0000000000 R09: ffffed103ee065e8 [ 36.646899][ T799] R10: ffffed103ee065e8 R11: 1ffff1103ee065e7 R12: ffff88811df30000 [ 36.655176][ T799] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810aaff800 [ 36.663747][ T799] FS: 00007f308536e6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 36.673248][ T799] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 36.692497][ T799] CR2: 0000000000000000 CR3: 000000012c516000 CR4: 00000000003506b0 [ 36.712265][ T833] Â: renamed from pim6reg1 [ 36.720489][ T799] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 36.795351][ T799] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 36.903895][ T799] Call Trace: [ 36.924381][ T799] [ 36.938470][ T799] resolve_pseudo_ldimm64+0x685/0x11d0 [ 36.957512][ T868] syz.1.134[868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.957570][ T868] syz.1.134[868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.963492][ T799] ? check_attach_btf_id+0xde0/0xde0 [ 36.985836][ T799] ? __mark_reg_known+0x1b0/0x1b0 [ 36.990892][ T799] ? security_capable+0x87/0xb0 [ 36.995795][ T799] bpf_check+0x2c44/0xf330 [ 37.000414][ T799] ? 0xffffffffa0028000 [ 37.004623][ T799] ? is_bpf_text_address+0x177/0x190 [ 37.009998][ T799] ? bpf_get_btf_vmlinux+0x60/0x60 [ 37.015164][ T799] ? unwind_get_return_address+0x4d/0x90 [ 37.020887][ T799] ? stack_trace_save+0xe0/0xe0 [ 37.025797][ T799] ? arch_stack_walk+0xee/0x140 [ 37.030744][ T799] ? stack_trace_save+0x98/0xe0 [ 37.051335][ T799] ? __stack_depot_save+0x34/0x480 [ 37.056502][ T799] ? __kasan_slab_alloc+0x69/0xf0 [ 37.077324][ T30] audit: type=1400 audit(1754907149.475:129): avc: denied { create } for pid=867 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.081361][ T799] ? _find_next_bit+0x1fa/0x200 [ 37.191820][ T799] ? __kasan_kmalloc+0xec/0x110 [ 37.196803][ T799] ? __kasan_kmalloc+0xda/0x110 [ 37.201870][ T799] ? kmem_cache_alloc_trace+0x119/0x270 [ 37.207579][ T799] ? selinux_bpf_prog_alloc+0x51/0x140 [ 37.213444][ T799] ? security_bpf_prog_alloc+0x62/0x90 [ 37.218921][ T799] ? bpf_prog_load+0x97c/0x1550 [ 37.224636][ T799] ? __sys_bpf+0x4c3/0x730 [ 37.229066][ T799] ? __x64_sys_bpf+0x7c/0x90 [ 37.233889][ T799] ? x64_sys_call+0x4b9/0x9a0 [ 37.238573][ T799] ? do_syscall_64+0x4c/0xa0 [ 37.270927][ T799] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.289968][ T799] ? check_stack_object+0x81/0x140 [ 37.300627][ T799] ? memset+0x35/0x40 [ 37.308603][ T799] ? bpf_obj_name_cpy+0x193/0x1e0 [ 37.331682][ T799] bpf_prog_load+0x1042/0x1550 [ 37.336919][ T799] ? map_freeze+0x360/0x360 [ 37.341974][ T799] ? selinux_bpf+0xc7/0xf0 [ 37.354002][ T799] ? security_bpf+0x82/0xa0 [ 37.360206][ T876] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 37.382311][ T799] __sys_bpf+0x4c3/0x730 [ 37.386612][ T799] ? bpf_link_show_fdinfo+0x310/0x310 [ 37.392125][ T799] ? __kasan_check_write+0x14/0x20 [ 37.397333][ T799] ? switch_fpu_return+0x15d/0x2c0 [ 37.402565][ T799] __x64_sys_bpf+0x7c/0x90 [ 37.407073][ T799] x64_sys_call+0x4b9/0x9a0 [ 37.417328][ T799] do_syscall_64+0x4c/0xa0 [ 37.421847][ T799] ? clear_bhb_loop+0x50/0xa0 [ 37.426573][ T799] ? clear_bhb_loop+0x50/0xa0 [ 37.432379][ T799] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 37.439079][ T799] RIP: 0033:0x7f3086926be9 [ 37.443824][ T799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 37.467520][ T799] RSP: 002b:00007f308536e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 37.476127][ T799] RAX: ffffffffffffffda RBX: 00007f3086b4e090 RCX: 00007f3086926be9 [ 37.484447][ T799] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 37.492565][ T799] RBP: 00007f30869a9e19 R08: 0000000000000000 R09: 0000000000000000 [ 37.500786][ T799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 37.509210][ T799] R13: 00007f3086b4e128 R14: 00007f3086b4e090 R15: 00007fff03866f28 [ 37.518870][ T799] [ 37.522170][ T799] ---[ end trace a936dabca39d5763 ]--- [ 37.872144][ T30] audit: type=1400 audit(1754907150.265:130): avc: denied { create } for pid=911 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 38.076821][ T915] device veth0_vlan left promiscuous mode [ 38.083952][ T915] device veth0_vlan entered promiscuous mode [ 38.455404][ T940] device veth0_vlan left promiscuous mode [ 38.517549][ T940] device veth0_vlan entered promiscuous mode [ 38.708554][ T101] udevd[101]: worker [780] terminated by signal 33 (Unknown signal 33) [ 38.731509][ T101] udevd[101]: worker [780] failed while handling '/devices/virtual/block/loop0' [ 38.769828][ T101] udevd[101]: worker [333] terminated by signal 33 (Unknown signal 33) [ 38.778571][ T101] udevd[101]: worker [333] failed while handling '/devices/virtual/block/loop2' [ 38.798879][ T101] udevd[101]: worker [988] terminated by signal 33 (Unknown signal 33) [ 38.809142][ T101] udevd[101]: worker [988] failed while handling '/devices/virtual/block/loop3' [ 39.086835][ T999] device syzkaller0 entered promiscuous mode [ 39.824435][ T1041] device sit0 left promiscuous mode [ 39.935633][ T1042] device sit0 entered promiscuous mode [ 40.083808][ T1060] syz.2.179[1060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.083895][ T1060] syz.2.179[1060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.209356][ T1043] device syzkaller0 entered promiscuous mode [ 40.300313][ T1072] device pim6reg1 entered promiscuous mode [ 40.376146][ T1082] device sit0 entered promiscuous mode [ 41.309707][ T1112] device sit0 left promiscuous mode [ 41.321803][ T1106] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 41.327620][ T1120] device sit0 entered promiscuous mode [ 41.430815][ T1125] device veth1_macvtap left promiscuous mode [ 41.550503][ T1112] device pim6reg1 entered promiscuous mode [ 41.969766][ T1170] syz.0.210[1170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.969833][ T1170] syz.0.210[1170] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.224952][ T1175] device pim6reg1 entered promiscuous mode [ 42.549273][ T1183] syz.4.214[1183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.549344][ T1183] syz.4.214[1183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.566249][ T1183] syz.4.214[1183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.578184][ T1183] syz.4.214[1183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.815018][ T1187] device syzkaller0 entered promiscuous mode [ 43.113564][ T1213] ªªªªªª: renamed from vlan0 [ 44.015549][ T1241] device sit0 entered promiscuous mode [ 44.725978][ T1251] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.733240][ T1251] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.824295][ T1259] bond_slave_1: mtu less than device minimum [ 46.557189][ T1312] device wg2 entered promiscuous mode [ 47.826693][ T30] audit: type=1400 audit(1754907160.225:131): avc: denied { ioctl } for pid=1349 comm="syz.3.260" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 49.708671][ T30] audit: type=1400 audit(1754907162.105:132): avc: denied { create } for pid=1396 comm="syz.2.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 50.818470][ T1470] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.825699][ T1470] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.875302][ T30] audit: type=1400 audit(1754907163.275:133): avc: denied { create } for pid=1469 comm="syz.3.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 51.021159][ T1473] device bridge_slave_1 left promiscuous mode [ 51.044155][ T1473] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.122518][ T1473] device bridge_slave_0 left promiscuous mode [ 51.140346][ T1473] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.444042][ T1468] device sit0 left promiscuous mode [ 51.453512][ T1471] device sit0 entered promiscuous mode [ 51.902818][ T30] audit: type=1400 audit(1754907164.305:134): avc: denied { create } for pid=1489 comm="syz.3.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 52.017734][ T30] audit: type=1400 audit(1754907164.405:135): avc: denied { create } for pid=1485 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 52.987869][ T30] audit: type=1400 audit(1754907165.385:136): avc: denied { create } for pid=1533 comm="syz.3.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 55.131974][ T1592] device macsec0 entered promiscuous mode [ 56.126092][ T1607] ip6_vti0: mtu greater than device maximum [ 58.378968][ T1657] device veth0_vlan left promiscuous mode [ 58.442023][ T1657] device veth0_vlan entered promiscuous mode [ 58.450183][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 58.482510][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 58.604595][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 59.095707][ T1672] device veth1_macvtap left promiscuous mode [ 59.261600][ T1672] device veth1_macvtap entered promiscuous mode [ 59.268547][ T1672] device macsec0 entered promiscuous mode [ 59.957361][ T1694] device pim6reg1 entered promiscuous mode [ 60.093830][ T1685] syz.3.351[1685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.112761][ T1685] syz.3.351[1685] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.535220][ T30] audit: type=1400 audit(1754907172.935:137): avc: denied { create } for pid=1707 comm="syz.4.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 65.285064][ T1842] device pim6reg1 entered promiscuous mode [ 65.690830][ T30] audit: type=1400 audit(1754907178.085:138): avc: denied { create } for pid=1839 comm="syz.3.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 66.470902][ T30] audit: type=1400 audit(1754907178.865:139): avc: denied { create } for pid=1869 comm="syz.4.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 66.545912][ T1879] sock: sock_timestamping_bind_phc: sock not bind to device [ 66.551167][ T30] audit: type=1400 audit(1754907178.895:140): avc: denied { create } for pid=1869 comm="syz.4.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 67.533563][ T1928] device syzkaller0 entered promiscuous mode [ 67.882067][ T1931] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 67.887961][ T1931] syzkaller0: owner set to 1 [ 68.378725][ T1960] syz.1.424[1960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.378770][ T1960] syz.1.424[1960] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.499479][ T1962] device sit0 left promiscuous mode [ 68.813467][ T1965] device sit0 entered promiscuous mode [ 69.406620][ T1982] syz.4.429[1982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.406675][ T1982] syz.4.429[1982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.512769][ T2004] ip6_vti0: mtu greater than device maximum [ 70.613574][ T30] audit: type=1400 audit(1754907183.015:141): avc: denied { create } for pid=2071 comm="syz.2.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 70.637734][ T2077] device sit0 left promiscuous mode [ 70.727476][ T2085] device syzkaller0 entered promiscuous mode [ 71.518609][ T2117] device syzkaller0 entered promiscuous mode [ 73.094071][ T30] audit: type=1400 audit(1754907185.485:142): avc: denied { create } for pid=2163 comm="syz.2.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 73.581712][ T2191] ÿÿÿÿÿÿ: renamed from vlan1 [ 74.474882][ T30] audit: type=1400 audit(1754907186.865:143): avc: denied { create } for pid=2206 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 74.636575][ T30] audit: type=1400 audit(1754907187.035:144): avc: denied { setattr } for pid=2215 comm="syz.3.494" path="/dev/ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 75.490566][ T2238] device syzkaller0 entered promiscuous mode [ 75.532941][ T2238] device syzkaller0 left promiscuous mode [ 75.707184][ T2250] device sit0 entered promiscuous mode [ 76.113741][ T2283] device pim6reg1 entered promiscuous mode [ 76.129799][ T2287] syz.0.514[2287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.129862][ T2287] syz.0.514[2287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 76.395127][ T2298] device sit0 left promiscuous mode [ 76.508605][ T2298] device sit0 entered promiscuous mode [ 76.668502][ T2315] device pim6reg1 entered promiscuous mode [ 76.695512][ T30] audit: type=1400 audit(1754907189.095:145): avc: denied { create } for pid=2316 comm="syz.2.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 76.772075][ T2315] bond_slave_1: mtu less than device minimum [ 76.989733][ T2371] Q±6ã`Ò˜: renamed from lo [ 79.231997][ T2462] device macsec0 left promiscuous mode [ 79.355520][ T2462] device macsec0 entered promiscuous mode [ 81.971449][ T2565] device wg2 left promiscuous mode [ 82.054507][ T2573] device pim6reg1 entered promiscuous mode [ 82.210655][ T2604] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 82.223454][ T2604] syzkaller0: linktype set to 778 [ 82.249317][ T2603] device pim6reg1 entered promiscuous mode [ 82.293411][ T2611] bond_slave_1: mtu less than device minimum [ 83.069799][ T2628] bond_slave_1: mtu less than device minimum [ 84.034670][ T2676] device pim6reg1 entered promiscuous mode [ 84.275511][ T2691] device veth1_macvtap left promiscuous mode [ 84.331570][ T2702] syz.3.631[2702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.331636][ T2702] syz.3.631[2702] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.356825][ T2703] device veth1_macvtap entered promiscuous mode [ 84.374436][ T2703] device macsec0 entered promiscuous mode [ 84.381029][ T2705] ref_ctr_offset mismatch. inode: 0x28e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 84.395402][ T2702] device pim6reg1 entered promiscuous mode [ 84.433284][ T2699] GPL: port 1(erspan0) entered blocking state [ 84.439453][ T2699] GPL: port 1(erspan0) entered disabled state [ 84.457726][ T2699] device erspan0 entered promiscuous mode [ 84.517459][ T2705] GPL: port 1(erspan0) entered blocking state [ 84.523579][ T2705] GPL: port 1(erspan0) entered forwarding state [ 85.116857][ T2727] device veth0_vlan left promiscuous mode [ 85.133024][ T2727] device veth0_vlan entered promiscuous mode [ 85.141520][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.164510][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.173459][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 86.455574][ T2759] device pim6reg1 entered promiscuous mode [ 86.804267][ T2781] device veth0_vlan left promiscuous mode [ 86.885872][ T2781] device veth0_vlan entered promiscuous mode [ 86.972708][ T30] audit: type=1400 audit(1754907199.375:146): avc: denied { create } for pid=2790 comm="syz.2.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 89.241199][ T2880] device pim6reg1 entered promiscuous mode [ 89.339237][ T2887] device syzkaller0 entered promiscuous mode [ 90.210101][ T30] audit: type=1400 audit(1754907202.605:147): avc: denied { create } for pid=2938 comm="syz.0.696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 90.553451][ T30] audit: type=1400 audit(1754907202.945:148): avc: denied { read } for pid=2957 comm="syz.0.700" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 90.699047][ T30] audit: type=1400 audit(1754907202.955:149): avc: denied { open } for pid=2957 comm="syz.0.700" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 91.683959][ T2993] device sit0 left promiscuous mode [ 91.735580][ T2996] device sit0 entered promiscuous mode [ 92.558892][ T2983] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.565991][ T2983] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.583098][ T2983] device bridge_slave_0 entered promiscuous mode [ 92.621770][ T2983] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.628810][ T2983] bridge0: port 2(bridge_slave_1) entered disabled state [ 92.676226][ T2983] device bridge_slave_1 entered promiscuous mode [ 92.701693][ T3016] device pim6reg1 entered promiscuous mode [ 92.784992][ T3029] device sit0 left promiscuous mode [ 92.830705][ T3029] device sit0 entered promiscuous mode [ 93.221186][ T30] audit: type=1400 audit(1754907205.615:150): avc: denied { create } for pid=2983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.406515][ T30] audit: type=1400 audit(1754907205.675:151): avc: denied { write } for pid=2983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.520236][ T30] audit: type=1400 audit(1754907205.675:152): avc: denied { read } for pid=2983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.613972][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 93.625034][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 93.635753][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 93.644203][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 93.653210][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 93.660250][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 93.667703][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 93.676040][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 93.684386][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 93.691492][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 93.698883][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 93.784605][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 93.805903][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 93.931724][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 93.985228][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 94.081021][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 94.161777][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 94.235013][ T45] device bridge_slave_1 left promiscuous mode [ 94.241151][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.322214][ T45] device bridge_slave_0 left promiscuous mode [ 94.328465][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.337248][ T45] device veth1_macvtap left promiscuous mode [ 94.343451][ T45] device veth0_vlan left promiscuous mode [ 94.528424][ T2983] device veth0_vlan entered promiscuous mode [ 94.537884][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 94.555927][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.626995][ T2983] device veth1_macvtap entered promiscuous mode [ 94.711541][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.737911][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 94.792941][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 94.801428][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.809770][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 94.844036][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.865651][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.874438][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.883335][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 94.979151][ T3088] device veth0_vlan left promiscuous mode [ 94.994217][ T3088] device veth0_vlan entered promiscuous mode [ 95.032703][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 95.047288][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 95.055426][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 95.496380][ T3099] bridge0: port 2(bridge_slave_1) entered disabled state [ 95.503627][ T3099] bridge0: port 1(bridge_slave_0) entered disabled state [ 95.665740][ T3101] bridge0: port 2(bridge_slave_1) entered blocking state [ 95.672830][ T3101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.680119][ T3101] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.687183][ T3101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 95.696817][ T3101] device bridge0 entered promiscuous mode [ 95.921449][ T3103] bridge0: port 1(bridge_slave_0) entered blocking state [ 95.928507][ T3103] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.038259][ T3103] device bridge_slave_0 entered promiscuous mode [ 96.146473][ T3112] device syzkaller0 entered promiscuous mode [ 96.153191][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.162329][ T3103] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.169776][ T3103] device bridge_slave_1 entered promiscuous mode [ 96.582780][ T3103] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.589857][ T3103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.597164][ T3103] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.604203][ T3103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.734408][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 96.744519][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 96.752073][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 96.779220][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.800563][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 96.807624][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 96.815652][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.825014][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 96.832073][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 96.839585][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 96.853211][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 97.004185][ T3103] device veth0_vlan entered promiscuous mode [ 97.010745][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 97.022296][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 97.030849][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 97.039290][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.048903][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 97.056595][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 97.106898][ T3148] syz.3.747[3148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.106967][ T3148] syz.3.747[3148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.169737][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 97.189829][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 97.208084][ T3103] device veth1_macvtap entered promiscuous mode [ 97.261626][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 97.290166][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 97.380938][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 97.400341][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 97.435924][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 97.469609][ T3160] device veth0_vlan left promiscuous mode [ 97.498908][ T3160] device veth0_vlan entered promiscuous mode [ 97.920365][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 97.928846][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 97.945647][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 98.325221][ T30] audit: type=1400 audit(1754907210.725:153): avc: denied { ioctl } for pid=3179 comm="syz.3.755" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 98.350557][ T3172] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.380139][ T3172] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.399586][ T3172] device bridge_slave_0 entered promiscuous mode [ 98.456613][ T3172] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.463959][ T3172] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.472462][ T3172] device bridge_slave_1 entered promiscuous mode [ 98.825199][ T3172] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.832274][ T3172] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.839554][ T3172] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.846612][ T3172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.030586][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.042052][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.102549][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.133206][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.249535][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 99.380883][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.565327][ T45] device bridge_slave_1 left promiscuous mode [ 99.585349][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.789533][ T45] device bridge_slave_0 left promiscuous mode [ 99.907851][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.975352][ T45] device veth1_macvtap left promiscuous mode [ 100.004725][ T45] device veth0_vlan left promiscuous mode [ 100.110021][ T3172] device veth0_vlan entered promiscuous mode [ 100.120707][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 100.129529][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 100.138128][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 100.146148][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 100.154723][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 100.162554][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 100.202406][ T3172] device veth1_macvtap entered promiscuous mode [ 100.214916][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 100.258014][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 100.266475][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 100.274335][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 100.282872][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 100.291615][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 100.299926][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 101.308882][ T3272] device syzkaller0 entered promiscuous mode [ 101.399929][ T3256] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.408617][ T3256] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.418628][ T3256] device bridge_slave_0 entered promiscuous mode [ 101.524760][ T3256] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.541815][ T3256] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.549541][ T3256] device bridge_slave_1 entered promiscuous mode [ 101.798836][ T3256] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.805915][ T3256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.813211][ T3256] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.820225][ T3256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.844711][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.852759][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.860818][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.869606][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.903391][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.912396][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.920557][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.930205][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.938241][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.946661][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.953716][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.961535][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.969843][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.976910][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.984631][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.992918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 102.002414][ T3256] device veth0_vlan entered promiscuous mode [ 102.017074][ T3256] device veth1_macvtap entered promiscuous mode [ 102.024880][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 102.260230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 102.434326][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 102.658069][ T3320] device veth0_vlan left promiscuous mode [ 102.667775][ T3320] device veth0_vlan entered promiscuous mode [ 103.176672][ T45] device bridge_slave_1 left promiscuous mode [ 103.184306][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.192586][ T45] device bridge_slave_0 left promiscuous mode [ 103.199742][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.208490][ T45] device bridge_slave_1 left promiscuous mode [ 103.214713][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.222551][ T45] device bridge_slave_0 left promiscuous mode [ 103.228721][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.237367][ T45] device veth1_macvtap left promiscuous mode [ 103.243405][ T45] device veth0_vlan left promiscuous mode [ 103.249367][ T45] device veth1_macvtap left promiscuous mode [ 103.255406][ T45] device veth0_vlan left promiscuous mode [ 103.457576][ T3338] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.464724][ T3338] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.472332][ T3338] device bridge_slave_0 entered promiscuous mode [ 103.479474][ T3338] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.487046][ T3338] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.494806][ T3338] device bridge_slave_1 entered promiscuous mode [ 103.565745][ T3367] syz.2.799[3367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.565812][ T3367] syz.2.799[3367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.583290][ T3338] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.601555][ T3338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.608840][ T3338] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.615939][ T3338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.707414][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.716762][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.725533][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.734945][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.748172][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.813617][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.820696][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.884320][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.899824][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.906910][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.921777][ T3397] device sit0 left promiscuous mode [ 103.954392][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.989340][ T3338] device veth0_vlan entered promiscuous mode [ 104.002166][ T3338] device veth1_macvtap entered promiscuous mode [ 104.028512][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 104.042485][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 104.107058][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 104.115650][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 104.124766][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 104.132792][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 104.141123][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.214493][ T3422] device wg2 entered promiscuous mode [ 104.226553][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 104.966148][ T3449] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.973266][ T3449] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.980788][ T3449] device bridge_slave_0 entered promiscuous mode [ 104.992847][ T3449] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.999928][ T3449] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.007674][ T3449] device bridge_slave_1 entered promiscuous mode [ 105.172964][ T3449] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.180016][ T3449] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.187297][ T3449] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.194336][ T3449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.298166][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 105.323489][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.374472][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.399309][ T3499] device pim6reg1 entered promiscuous mode [ 105.410629][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.419358][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.426419][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.436381][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.444697][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.451748][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.461987][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.469978][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.503525][ T45] device bridge_slave_1 left promiscuous mode [ 105.509674][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.518278][ T45] device bridge_slave_0 left promiscuous mode [ 105.524592][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.532430][ T45] device bridge_slave_1 left promiscuous mode [ 105.538524][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.545969][ T45] device bridge_slave_0 left promiscuous mode [ 105.552217][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.560671][ T45] device veth1_macvtap left promiscuous mode [ 105.566726][ T45] device veth0_vlan left promiscuous mode [ 105.573009][ T45] device veth1_macvtap left promiscuous mode [ 105.579011][ T45] device veth0_vlan left promiscuous mode [ 105.724476][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 105.732977][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 105.763082][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 105.771432][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 105.779531][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 105.787695][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 105.801942][ T3449] device veth0_vlan entered promiscuous mode [ 105.818534][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 105.827513][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 105.839104][ T3449] device veth1_macvtap entered promiscuous mode [ 105.866353][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 105.878807][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 105.887570][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 105.927874][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 105.941585][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 107.238961][ T3548] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.269958][ T3548] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.279128][ T3548] device bridge_slave_0 entered promiscuous mode [ 107.297594][ T3548] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.306792][ T3548] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.315116][ T3548] device bridge_slave_1 entered promiscuous mode [ 107.374516][ T45] device bridge_slave_1 left promiscuous mode [ 107.380781][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.388517][ T45] device bridge_slave_0 left promiscuous mode [ 107.394838][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.403490][ T45] device veth1_macvtap left promiscuous mode [ 107.409586][ T45] device veth0_vlan left promiscuous mode [ 107.550193][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.559272][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.580476][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.588920][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.597369][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.604421][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.612378][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.621842][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.630100][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.637142][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 107.716991][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.742449][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.756711][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.772346][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.780613][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.809609][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 107.822502][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 107.837552][ T3548] device veth0_vlan entered promiscuous mode [ 107.846623][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.854936][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 107.918124][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 107.937098][ T3548] device veth1_macvtap entered promiscuous mode [ 107.952752][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 107.974802][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 107.983209][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 108.065024][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 108.073806][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 108.083474][ T3617] device pim6reg1 entered promiscuous mode [ 108.154444][ T3628] device syzkaller0 entered promiscuous mode [ 108.202147][ T3548] syz-executor (3548) used greatest stack depth: 21376 bytes left [ 109.074676][ T3660] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.081839][ T3660] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.090555][ T3660] device bridge_slave_0 entered promiscuous mode [ 109.104509][ T3674] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 109.110461][ T3660] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.118692][ T3660] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.126200][ T3660] device bridge_slave_1 entered promiscuous mode [ 109.135241][ T3674] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 109.239277][ T3660] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.246370][ T3660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.253689][ T3660] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.260710][ T3660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.283835][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 109.292426][ T832] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.301985][ T832] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.313103][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 109.322026][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 109.329075][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 109.337996][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 109.346495][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 109.353571][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 109.372072][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 109.381848][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 109.397769][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 109.408811][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 109.417106][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 109.424636][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 109.435948][ T3660] device veth0_vlan entered promiscuous mode [ 109.446254][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 109.455620][ T3660] device veth1_macvtap entered promiscuous mode [ 109.465155][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 109.478269][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 109.642109][ T45] device bridge_slave_1 left promiscuous mode [ 109.648296][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 109.655782][ T45] device bridge_slave_0 left promiscuous mode [ 109.661998][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 109.669685][ T45] device veth1_macvtap left promiscuous mode [ 109.675745][ T45] device veth0_vlan left promiscuous mode [ 110.409287][ T3717] bridge0: port 1(bridge_slave_0) entered blocking state [ 110.416601][ T3717] bridge0: port 1(bridge_slave_0) entered disabled state [ 110.424089][ T3717] device bridge_slave_0 entered promiscuous mode [ 110.430900][ T3717] bridge0: port 2(bridge_slave_1) entered blocking state [ 110.437978][ T3717] bridge0: port 2(bridge_slave_1) entered disabled state [ 110.445267][ T3717] device bridge_slave_1 entered promiscuous mode [ 110.571330][ T3740] device syzkaller0 entered promiscuous mode [ 110.721938][ T3751] syz.1.886[3751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.722006][ T3751] syz.1.886[3751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.388000][ T45] device bridge_slave_1 left promiscuous mode [ 111.416151][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.433323][ T45] device bridge_slave_0 left promiscuous mode [ 111.440578][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.452603][ T45] device veth1_macvtap left promiscuous mode [ 111.458668][ T45] device veth0_vlan left promiscuous mode [ 111.562291][ T3770] device sit0 left promiscuous mode [ 111.597091][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 111.626207][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 111.652661][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 111.679538][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 111.688897][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.695965][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 111.703861][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 111.712337][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 111.726034][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.733120][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 111.744803][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 111.772883][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 111.781174][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 111.789746][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 111.799315][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 111.821391][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 111.836347][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 111.845413][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 111.861768][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 111.879502][ T3717] device veth0_vlan entered promiscuous mode [ 111.899327][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 111.912798][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 111.947575][ T3788] device syzkaller0 entered promiscuous mode [ 111.963012][ T3717] device veth1_macvtap entered promiscuous mode [ 111.982211][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 111.994672][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 112.005263][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 112.071786][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 112.086946][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 112.096487][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 112.111495][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.466704][ T3848] syz.3.913[3848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.760648][ T3835] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.781306][ T3835] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.788910][ T3835] device bridge_slave_0 entered promiscuous mode [ 113.798084][ T3856] device veth0_vlan left promiscuous mode [ 113.804223][ T3856] device veth0_vlan entered promiscuous mode [ 113.812738][ T3835] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.819991][ T3835] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.831585][ T3835] device bridge_slave_1 entered promiscuous mode [ 113.848277][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.858893][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.875170][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.173589][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 114.181226][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 114.214410][ T45] device bridge_slave_1 left promiscuous mode [ 114.221168][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.239020][ T45] device bridge_slave_0 left promiscuous mode [ 114.251361][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.259502][ T45] device veth1_macvtap left promiscuous mode [ 114.265601][ T45] device veth0_vlan left promiscuous mode [ 114.356826][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 114.365515][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 114.377970][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.385068][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 114.393003][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 114.401580][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 114.410782][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.417836][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 114.426262][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 114.437152][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 114.451967][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 114.481360][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 114.490366][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 114.498626][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 114.508118][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 114.517135][ T3835] device veth0_vlan entered promiscuous mode [ 114.556303][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 114.565941][ T3835] device veth1_macvtap entered promiscuous mode [ 114.579059][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 114.587690][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 115.311908][ T45] device bridge_slave_1 left promiscuous mode [ 115.318038][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.325525][ T45] device bridge_slave_0 left promiscuous mode [ 115.331724][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.339494][ T45] device veth1_macvtap left promiscuous mode [ 115.345533][ T45] device veth0_vlan left promiscuous mode [ 115.746138][ T3907] device sit0 entered promiscuous mode [ 115.917657][ T3914] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.925019][ T3914] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.932574][ T3914] device bridge_slave_0 entered promiscuous mode [ 115.940108][ T3914] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.947208][ T3914] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.955065][ T3914] device bridge_slave_1 entered promiscuous mode [ 115.965531][ T3925] device wg2 entered promiscuous mode [ 116.445128][ T3914] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.452222][ T3914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 116.459614][ T3914] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.466671][ T3914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.561016][ T3954] syz.2.937[3954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.561095][ T3954] syz.2.937[3954] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.700643][ T832] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.719412][ T832] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.297113][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.311658][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.490678][ T3914] device veth0_vlan entered promiscuous mode [ 117.499526][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.511696][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.520015][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.527092][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.535443][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.545693][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.554359][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.561439][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 117.569229][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 117.577830][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 117.586276][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 117.594808][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 117.603275][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 117.611937][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 117.620455][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 117.629103][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 117.933750][ T3914] device veth1_macvtap entered promiscuous mode [ 117.945265][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 117.953901][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 117.961722][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 117.969893][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 117.978279][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 117.988608][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 118.004057][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 118.012571][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 118.021001][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.168044][ T45] device bridge_slave_1 left promiscuous mode [ 119.174253][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.187273][ T45] device bridge_slave_0 left promiscuous mode [ 119.193521][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.201934][ T45] device veth1_macvtap left promiscuous mode [ 119.208079][ T45] device veth0_vlan left promiscuous mode [ 120.941333][ T3994] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.948403][ T3994] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.994354][ T3994] device bridge_slave_0 entered promiscuous mode [ 121.061990][ T3994] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.136821][ T3994] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.185677][ T3994] device bridge_slave_1 entered promiscuous mode [ 121.629774][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 121.644917][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.686920][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 121.702184][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.718804][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.725899][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.738215][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 121.746860][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.755571][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.762626][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.788702][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 121.798370][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 121.807916][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.835127][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 121.847000][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.867637][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.880462][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.893036][ T3994] device veth0_vlan entered promiscuous mode [ 121.951116][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.997054][ T3994] device veth1_macvtap entered promiscuous mode [ 122.074130][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 122.245944][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 123.740681][ T45] device bridge_slave_1 left promiscuous mode [ 123.746967][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.755588][ T45] device bridge_slave_0 left promiscuous mode [ 123.761863][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.770801][ T45] device veth1_macvtap left promiscuous mode [ 123.777134][ T45] device veth0_vlan left promiscuous mode [ 123.934030][ T4134] device sit0 entered promiscuous mode [ 124.207884][ T4125] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.279284][ T4125] bridge0: port 1(bridge_slave_0) entered disabled state [ 124.322536][ T4125] device bridge_slave_0 entered promiscuous mode [ 124.358842][ T4125] bridge0: port 2(bridge_slave_1) entered blocking state [ 124.387876][ T4125] bridge0: port 2(bridge_slave_1) entered disabled state [ 124.414064][ T4125] device bridge_slave_1 entered promiscuous mode [ 124.958992][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 124.967569][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 124.995579][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 125.011545][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 125.031356][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.038430][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.062477][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 125.078045][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 125.091630][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 125.111702][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.118735][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.150399][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 125.168986][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 125.236551][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 125.275392][ T4177] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.282567][ T4177] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.290076][ T4177] device bridge_slave_0 entered promiscuous mode [ 125.298017][ T4177] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.305434][ T4177] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.313088][ T4177] device bridge_slave_1 entered promiscuous mode [ 125.339343][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.351787][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.362007][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 125.391577][ T4125] device veth0_vlan entered promiscuous mode [ 125.447802][ T45] device veth0_vlan left promiscuous mode [ 125.544252][ T4125] device veth1_macvtap entered promiscuous mode [ 125.584583][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 125.613161][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 125.651839][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 125.676397][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 125.684847][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 125.693269][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 125.701812][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.068145][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.087336][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.121810][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.135833][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.144582][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.151769][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.160340][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 126.169119][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.177692][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.184745][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.207560][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 126.215419][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.224202][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.244959][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.253716][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.262320][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 126.269810][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 126.279427][ T4177] device veth0_vlan entered promiscuous mode [ 126.296496][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.306470][ T4177] device veth1_macvtap entered promiscuous mode [ 126.317402][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.337482][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 126.471713][ T4248] device sit0 left promiscuous mode [ 126.553590][ T4248] device sit0 entered promiscuous mode [ 126.892640][ T4263] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.899903][ T4263] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.002304][ T4263] device bridge_slave_0 entered promiscuous mode [ 127.055926][ T4263] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.093649][ T4263] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.112101][ T4263] device bridge_slave_1 entered promiscuous mode [ 127.288509][ T45] device bridge_slave_1 left promiscuous mode [ 127.301645][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.335038][ T45] device bridge_slave_0 left promiscuous mode [ 127.352251][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.375223][ T45] device veth1_macvtap left promiscuous mode [ 127.401319][ T45] device veth0_vlan left promiscuous mode [ 127.537469][ T4266] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.548668][ T4266] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.572402][ T4266] device bridge_slave_0 entered promiscuous mode [ 127.612181][ T4266] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.619233][ T4266] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.626975][ T4266] device bridge_slave_1 entered promiscuous mode [ 129.171241][ C1] sched: RT throttling activated [ 129.230510][ T4301] device pim6reg1 entered promiscuous mode [ 129.243492][ T4308] device sit0 left promiscuous mode [ 129.303847][ T4308] device sit0 entered promiscuous mode [ 129.433968][ T4333] device sit0 left promiscuous mode [ 129.481790][ T4335] device sit0 entered promiscuous mode [ 129.527971][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 129.553001][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 129.563449][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 129.571936][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 129.580218][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.587268][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 129.651446][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 129.691586][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 129.721404][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.728490][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.765020][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.148038][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.179064][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.187833][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 130.195550][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.206961][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 130.215660][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.224354][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.231450][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.239818][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 130.248719][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.257114][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.264185][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.279638][ T4266] device veth0_vlan entered promiscuous mode [ 130.297086][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.306062][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.319583][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.335692][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.349073][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 130.357133][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 130.367122][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.375299][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 130.388230][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.416632][ T4266] device veth1_macvtap entered promiscuous mode [ 130.433572][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.444805][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.456661][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 130.464737][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.473604][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.491075][ T4263] device veth0_vlan entered promiscuous mode [ 130.512150][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.608466][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.651989][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 130.660386][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.677636][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.685200][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.703536][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 130.719189][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.784196][ T4263] device veth1_macvtap entered promiscuous mode [ 130.827179][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.857828][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.911586][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.003384][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.033281][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.089469][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 131.154725][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 131.464719][ T4412] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.471925][ T4412] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.479497][ T4412] device bridge_slave_0 entered promiscuous mode [ 131.495093][ T4412] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.502536][ T4412] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.510011][ T4412] device bridge_slave_1 entered promiscuous mode [ 131.587465][ T4412] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.594529][ T4412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.601808][ T4412] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.608829][ T4412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.617923][ T45] device bridge_slave_1 left promiscuous mode [ 131.624115][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.631789][ T45] device bridge_slave_0 left promiscuous mode [ 131.637931][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.646380][ T45] device veth1_macvtap left promiscuous mode [ 131.652495][ T45] device veth0_vlan left promiscuous mode [ 131.767305][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.775162][ T832] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.783263][ T832] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.799161][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.807393][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.814438][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.822229][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.830350][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.837377][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.853575][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.861884][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.869722][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.880206][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 131.888731][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 131.896165][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 131.904623][ T4412] device veth0_vlan entered promiscuous mode [ 131.914462][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 131.923517][ T4412] device veth1_macvtap entered promiscuous mode [ 131.932708][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.950965][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.085557][ T4430] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.092643][ T4430] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.100093][ T4430] device bridge_slave_0 entered promiscuous mode [ 132.107480][ T4430] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.114722][ T4430] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.122319][ T4430] device bridge_slave_1 entered promiscuous mode [ 132.165017][ T4430] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.172067][ T4430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.179325][ T4430] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.186360][ T4430] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.205787][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.213456][ T832] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.220840][ T832] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.230460][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.238968][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.246008][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.265339][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.273515][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.280655][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.294487][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.311114][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.320346][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.334635][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.343153][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.359491][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.367565][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.375707][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 132.383427][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.396760][ T4430] device veth0_vlan entered promiscuous mode [ 132.406278][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.414671][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.424117][ T4430] device veth1_macvtap entered promiscuous mode [ 132.450326][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 132.460876][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.479303][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.515048][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.532489][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.545409][ T4450] device veth0_vlan left promiscuous mode [ 132.584358][ T4450] device veth0_vlan entered promiscuous mode [ 132.643546][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.656124][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 132.664636][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 132.817348][ T4453] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.824866][ T4453] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.832346][ T4453] device bridge_slave_0 entered promiscuous mode [ 132.862552][ T4453] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.869654][ T4453] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.877350][ T4453] device bridge_slave_1 entered promiscuous mode [ 132.928224][ T45] device bridge_slave_1 left promiscuous mode [ 132.934402][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.950610][ T45] device bridge_slave_0 left promiscuous mode [ 132.957037][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.965014][ T45] device bridge_slave_1 left promiscuous mode [ 132.971211][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.978664][ T45] device bridge_slave_0 left promiscuous mode [ 132.985139][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.993012][ T45] device bridge_slave_1 left promiscuous mode [ 132.999099][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.006664][ T45] device bridge_slave_0 left promiscuous mode [ 133.012885][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.021074][ T45] device veth1_macvtap left promiscuous mode [ 133.027148][ T45] device veth0_vlan left promiscuous mode [ 133.033035][ T45] device veth1_macvtap left promiscuous mode [ 133.039014][ T45] device veth0_vlan left promiscuous mode [ 133.044985][ T45] device veth1_macvtap left promiscuous mode [ 133.051050][ T45] device veth0_vlan left promiscuous mode [ 133.346987][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 133.355322][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.365854][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 133.374182][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.382339][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.389361][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.396946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 133.406016][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 133.414365][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.422477][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.429474][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.440972][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 133.449110][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.461689][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 133.469783][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.479304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.492367][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.500334][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 133.507785][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 133.516401][ T4453] device veth0_vlan entered promiscuous mode [ 133.527437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.536544][ T4453] device veth1_macvtap entered promiscuous mode [ 133.545423][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 133.553852][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.563292][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 133.571683][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.808723][ T4480] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.816014][ T4480] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.830144][ T4480] device bridge_slave_0 entered promiscuous mode [ 133.837709][ T4480] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.845755][ T4480] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.853144][ T4480] device bridge_slave_1 entered promiscuous mode [ 133.897874][ T4480] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.904926][ T4480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.912198][ T4480] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.919208][ T4480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.938253][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.945909][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.953556][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.964088][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.972332][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.979333][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.988737][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.996900][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.003938][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.015959][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.025103][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.037755][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.048831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.056974][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.064404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.072807][ T4480] device veth0_vlan entered promiscuous mode [ 134.082824][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.092065][ T4480] device veth1_macvtap entered promiscuous mode [ 134.100900][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.117285][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.271520][ T30] audit: type=1400 audit(1754907246.665:154): avc: denied { attach_queue } for pid=4492 comm="syz.4.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 134.352760][ T4494] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.359926][ T4494] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.367435][ T4494] device bridge_slave_0 entered promiscuous mode [ 134.375361][ T4494] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.382960][ T4494] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.390657][ T4494] device bridge_slave_1 entered promiscuous mode [ 134.454579][ T4494] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.461620][ T4494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.468858][ T4494] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.475892][ T4494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.496099][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.504033][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.511978][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 134.519315][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 134.532380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 134.540504][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 134.547525][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 134.557095][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 134.565329][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 134.572348][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 134.589204][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 134.598626][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 134.612218][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 134.627079][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 134.635219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 134.642801][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 134.651773][ T4494] device veth0_vlan entered promiscuous mode [ 134.664805][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 134.673986][ T4494] device veth1_macvtap entered promiscuous mode [ 134.683252][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 134.693133][ T45] device bridge_slave_1 left promiscuous mode [ 134.699260][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.706868][ T45] device bridge_slave_0 left promiscuous mode [ 134.713126][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.721101][ T45] device bridge_slave_1 left promiscuous mode [ 134.727477][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.734903][ T45] device bridge_slave_0 left promiscuous mode [ 134.740986][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.749076][ T45] device veth1_macvtap left promiscuous mode [ 134.755151][ T45] device veth0_vlan left promiscuous mode [ 134.760954][ T45] device veth1_macvtap left promiscuous mode [ 134.767233][ T45] device veth0_vlan left promiscuous mode [ 134.925475][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.073008][ T4514] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.080227][ T4514] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.087849][ T4514] device bridge_slave_0 entered promiscuous mode [ 135.094736][ T4514] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.102083][ T4514] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.109348][ T4514] device bridge_slave_1 entered promiscuous mode [ 135.151732][ T4514] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.158763][ T4514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.166036][ T4514] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.173061][ T4514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.190896][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.198538][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.206467][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.215723][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.223908][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.230914][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.239889][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.248125][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.255153][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.267337][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.277116][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.303741][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.314918][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.323127][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.330708][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.339356][ T4514] device veth0_vlan entered promiscuous mode [ 135.350397][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 135.358944][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.370032][ T4514] device veth1_macvtap entered promiscuous mode [ 135.379085][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.387148][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 135.395710][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.406152][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 135.414742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 135.563122][ T4529] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.570237][ T4529] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.578547][ T4529] device bridge_slave_0 entered promiscuous mode [ 135.587543][ T4529] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.594821][ T4529] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.602321][ T4529] device bridge_slave_1 entered promiscuous mode [ 135.664385][ T4529] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.671439][ T4529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.678700][ T4529] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.685745][ T4529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.705837][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.713820][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.721518][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.733187][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.741452][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.748461][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.757435][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.765608][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.772636][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.788737][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.798398][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.812043][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.825940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.834353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 135.841968][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 135.853973][ T4529] device veth0_vlan entered promiscuous mode [ 135.864062][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.876419][ T4529] device veth1_macvtap entered promiscuous mode [ 135.886092][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.896027][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.012073][ T45] device bridge_slave_1 left promiscuous mode [ 136.018285][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.060280][ T45] device bridge_slave_0 left promiscuous mode [ 136.066700][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.074720][ T45] device bridge_slave_1 left promiscuous mode [ 136.080825][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.088495][ T45] device bridge_slave_0 left promiscuous mode [ 136.094701][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.102731][ T45] device veth1_macvtap left promiscuous mode [ 136.108722][ T45] device veth0_vlan left promiscuous mode [ 136.114729][ T45] device veth1_macvtap left promiscuous mode [ 136.120735][ T45] device veth0_vlan left promiscuous mode [ 136.274295][ T4547] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.281372][ T4547] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.288749][ T4547] device bridge_slave_0 entered promiscuous mode [ 136.296259][ T4547] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.303327][ T4547] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.310613][ T4547] device bridge_slave_1 entered promiscuous mode [ 136.366600][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 136.374607][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 136.384342][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 136.392924][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 136.401006][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.408044][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 136.415690][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 136.424903][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 136.433292][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 136.441563][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.448679][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.460327][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 136.468425][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 136.479450][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 136.488206][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 136.502858][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 136.513987][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 136.522064][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 136.529438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 136.538723][ T4547] device veth0_vlan entered promiscuous mode [ 136.548790][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 136.558767][ T4547] device veth1_macvtap entered promiscuous mode [ 136.569119][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 136.577680][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 136.587178][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 136.595615][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.961134][ T4574] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.968359][ T4574] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.975785][ T4574] device bridge_slave_0 entered promiscuous mode [ 136.987252][ T4574] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.994338][ T4574] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.001742][ T4574] device bridge_slave_1 entered promiscuous mode [ 137.048464][ T4574] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.055503][ T4574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.062782][ T4574] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.069792][ T4574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.089477][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.097184][ T832] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.104987][ T832] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.117404][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.125753][ T832] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.132800][ T832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.141825][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.149998][ T832] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.157040][ T832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.171801][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.180848][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.194286][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.208202][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.216238][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 137.223613][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 137.236588][ T4574] device veth0_vlan entered promiscuous mode [ 137.246045][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.255081][ T4574] device veth1_macvtap entered promiscuous mode [ 137.264057][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.275761][ T832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 137.313240][ T45] device bridge_slave_1 left promiscuous mode [ 137.319348][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.326854][ T45] device bridge_slave_0 left promiscuous mode [ 137.333035][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.340710][ T45] device bridge_slave_1 left promiscuous mode [ 137.346876][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.354447][ T45] device bridge_slave_0 left promiscuous mode [ 137.360560][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.368595][ T45] device veth1_macvtap left promiscuous mode [ 137.374601][ T45] device veth0_vlan left promiscuous mode [ 137.380559][ T45] device veth1_macvtap left promiscuous mode [ 137.386583][ T45] device veth0_vlan left promiscuous mode [ 137.774832][ T4591] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.786851][ T4591] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.794576][ T4591] device bridge_slave_0 entered promiscuous mode [ 137.845507][ T4591] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.861287][ T4591] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.868806][ T4591] device bridge_slave_1 entered promiscuous mode [ 138.123520][ T4591] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.130552][ T4591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.137879][ T4591] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.144912][ T4591] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.162343][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 138.169917][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.177448][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.187208][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 138.195470][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.202503][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 138.211104][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 138.219437][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.226472][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 138.238683][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 138.252866][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 138.267530][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 138.280079][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 138.288184][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 138.295729][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 138.306835][ T4591] device veth0_vlan entered promiscuous mode [ 138.317244][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 138.347934][ T4591] device veth1_macvtap entered promiscuous mode [ 138.392827][ T4621] device sit0 left promiscuous mode [ 138.408809][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 138.418643][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.438001][ T4621] device sit0 entered promiscuous mode [ 138.618094][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 138.640574][ T4623] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.648419][ T4623] device bridge_slave_0 entered promiscuous mode [ 138.666262][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 138.673413][ T4623] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.680931][ T4623] device bridge_slave_1 entered promiscuous mode [ 138.852541][ T45] device bridge_slave_1 left promiscuous mode [ 138.858690][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.872733][ T45] device bridge_slave_0 left promiscuous mode [ 138.878893][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.893018][ T45] device bridge_slave_1 left promiscuous mode [ 138.899161][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.913962][ T45] device bridge_slave_0 left promiscuous mode [ 138.924448][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.937762][ T45] device veth1_macvtap left promiscuous mode [ 138.948308][ T45] device veth0_vlan left promiscuous mode [ 138.960367][ T45] device veth1_macvtap left promiscuous mode [ 138.968622][ T45] device veth0_vlan left promiscuous mode [ 139.217186][ T4623] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.224255][ T4623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.231652][ T4623] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.238778][ T4623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.357227][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.365054][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.372335][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.416816][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.425686][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.435714][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.442771][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.450423][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.459090][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.466126][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.473492][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.481889][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.492869][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.500817][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 139.508532][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 139.519572][ T4623] device veth0_vlan entered promiscuous mode [ 139.528930][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 139.537162][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.546509][ T4623] device veth1_macvtap entered promiscuous mode [ 139.556107][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 139.563840][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 139.572221][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.584101][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 139.593047][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 139.802018][ T4651] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.809139][ T4651] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.817125][ T4651] device bridge_slave_0 entered promiscuous mode [ 139.826316][ T4651] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.833628][ T4651] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.841073][ T4651] device bridge_slave_1 entered promiscuous mode [ 139.886961][ T4651] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.894003][ T4651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.901256][ T4651] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.908275][ T4651] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.925839][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.933432][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.940800][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.950959][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.959196][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.966256][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.981721][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.989904][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.996956][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.009104][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.018329][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.035727][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.046694][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.054801][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.062386][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.075299][ T4651] device veth0_vlan entered promiscuous mode [ 140.085525][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.094778][ T4651] device veth1_macvtap entered promiscuous mode [ 140.104010][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.118088][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.286976][ T4668] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.294068][ T4668] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.301409][ T4668] device bridge_slave_0 entered promiscuous mode [ 140.308532][ T4668] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.315741][ T4668] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.323088][ T4668] device bridge_slave_1 entered promiscuous mode [ 140.368790][ T4668] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.375830][ T4668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.383312][ T4668] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.390501][ T4668] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.414203][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 140.422081][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.429356][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.438567][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 140.446816][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.453845][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 140.463793][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 140.472119][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.479125][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.496332][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 140.505573][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.519487][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 140.527990][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 140.543478][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 140.551783][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 140.560111][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 140.567823][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 140.575724][ T45] device bridge_slave_1 left promiscuous mode [ 140.582126][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.589445][ T45] device bridge_slave_0 left promiscuous mode [ 140.595625][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.603301][ T45] device bridge_slave_1 left promiscuous mode [ 140.609423][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.616834][ T45] device bridge_slave_0 left promiscuous mode [ 140.623004][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.630744][ T45] device veth1_macvtap left promiscuous mode [ 140.637500][ T45] device veth0_vlan left promiscuous mode [ 140.643354][ T45] device veth1_macvtap left promiscuous mode [ 140.649325][ T45] device veth0_vlan left promiscuous mode [ 140.795216][ T4668] device veth0_vlan entered promiscuous mode [ 140.805674][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 140.814327][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 140.823573][ T4668] device veth1_macvtap entered promiscuous mode [ 140.832613][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 140.840265][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 140.848764][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 140.858410][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 140.866776][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.125683][ T4689] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.132832][ T4689] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.140118][ T4689] device bridge_slave_0 entered promiscuous mode [ 141.147146][ T4689] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.154224][ T4689] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.161923][ T4689] device bridge_slave_1 entered promiscuous mode [ 141.200888][ T4689] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.207940][ T4689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.215207][ T4689] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.222242][ T4689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.255943][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.263639][ T394] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.270959][ T394] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.282541][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.293828][ T394] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.301033][ T394] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.309871][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.318383][ T394] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.325558][ T394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.339311][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.348580][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.362797][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.375114][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.383124][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.390446][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 141.399020][ T4689] device veth0_vlan entered promiscuous mode [ 141.408678][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.417746][ T4689] device veth1_macvtap entered promiscuous mode [ 141.427546][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.438314][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=0 req=702 state=3 status=67 (errno 32: Broken pipe) [ 141.611286][ T30] audit: type=1400 audit(1754907254.005:155): avc: denied { write } for pid=274 comm="syz-executor" path="pipe:[2625]" dev="pipefs" ino=2625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 141.735034][ T4703] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.781364][ T4703] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.788801][ T4703] device bridge_slave_0 entered promiscuous mode [ 142.312667][ T45] device bridge_slave_1 left promiscuous mode [ 142.318905][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.326499][ T45] device bridge_slave_0 left promiscuous mode [ 142.333010][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.341288][ T45] device bridge_slave_1 left promiscuous mode [ 142.347401][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.354851][ T45] device bridge_slave_0 left promiscuous mode [ 142.360932][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.369039][ T45] device veth1_macvtap left promiscuous mode [ 142.375048][ T45] device veth0_vlan left promiscuous mode [ 142.381118][ T45] device veth1_macvtap left promiscuous mode [ 142.387193][ T45] device veth0_vlan left promiscuous mode [ 144.193513][ T45] GPL: port 1(erspan0) entered disabled state [ 144.202673][ T45] device erspan0 left promiscuous mode [ 144.208123][ T45] GPL: port 1(erspan0) entered disabled state [ 144.552208][ T45] device bridge_slave_0 left promiscuous mode [ 144.558352][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.566280][ T45] device bridge_slave_1 left promiscuous mode [ 144.572532][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.580153][ T45] device bridge_slave_0 left promiscuous mode [ 144.586367][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.594254][ T45] device bridge_slave_1 left promiscuous mode [ 144.600351][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.607746][ T45] device bridge_slave_0 left promiscuous mode [ 144.613907][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.621822][ T45] device bridge_slave_1 left promiscuous mode [ 144.627912][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.635513][ T45] device bridge_slave_0 left promiscuous mode [ 144.641785][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.649845][ T45] device bridge_slave_1 left promiscuous mode [ 144.656021][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.663527][ T45] device bridge_slave_0 left promiscuous mode [ 144.669616][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.677964][ T45] device veth1_macvtap left promiscuous mode [ 144.684191][ T45] device veth1_macvtap left promiscuous mode [ 144.690188][ T45] device veth0_vlan left promiscuous mode [ 144.696432][ T45] device veth1_macvtap left promiscuous mode [ 144.702485][ T45] device veth0_vlan left promiscuous mode