last executing test programs: 40.594449879s ago: executing program 0 (id=1691): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1d0842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001740)={0xffffffffffffffff, 0x20, &(0x7f0000001700)={&(0x7f0000001540)=""/142, 0x8e, 0x0, &(0x7f0000001600)=""/253, 0xfd}}, 0x10) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000017c0)=@generic={&(0x7f0000001780)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001840)={0xc, 0x15, &(0x7f0000001240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x89}, {}, {}, [@ringbuf_query, @ldst={0x1, 0x2, 0x6, 0x0, 0xa, 0xc, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001300)='syzkaller\x00', 0xffff, 0xc5, &(0x7f0000001340)=""/197, 0x40f00, 0x11, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001500)={0x2, 0x5, 0x7f, 0x6}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000001800)=[r4], 0xffffffffffffffff, 0x10, 0xffffff01}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r7 = openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$tipc(r6, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f02b", 0x5d}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef9", 0x2a, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 37.961740273s ago: executing program 0 (id=1704): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001b00)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB="0000fa0000546a12cd86c91e9c00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000780)=ANY=[@ANYBLOB="e824e287eb89b71836a7df6b451d4e6ce5d5c7bcad3ed6f841b147ff2858564e5548ea5cdb37449b1b5a5a37dafe3f9320a4b7115ecd4beb844848db5c93add5d8bbca3bc7c0a0ab0c1d16d43bf5a93f8b0ca14d7d64fe06492620d12c900d7cd4e4611f8de650046946c3dcb1636b83e3fd27e6b65e477a11e642028daa1b1ed53ad069f5f1d0ea434bf7710bb8f22b18a10aa06a42", @ANYRESHEX=r4, @ANYRES64=r2, @ANYRES16=r5, @ANYRES8=r3, @ANYRES32=r3, @ANYRESDEC, @ANYRES64=0x0], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sys_enter\x00', r6}, 0x10) (async) gettid() (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x0, 0x1c, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000001000000000000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000875c300b7040000010000008500000082000000851000000500000003554000030000008500940003000000fd5b0001fcffffffbf91000000000000b7020000000000008500000085000000b70000000000000095000000000000007145fb3bb3a972bcc47a506dc3c8a8201604859eca9f7827"], &(0x7f0000000700)='syzkaller\x00', 0x293, 0x8e, &(0x7f0000000880)=""/142, 0x41100, 0x6, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000e40)=[r3, r3, r2], &(0x7f0000000e80)=[{0x5, 0x1, 0x3, 0x2}], 0x10, 0x6}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0x2}, 0x18) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1f, 0x13, &(0x7f0000000080)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x3, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003440)) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0000000000000000420e3765eee02e4200000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x27, 0x1, 0xfffffff7, &(0x7f0000000000)) 37.89064372s ago: executing program 0 (id=1707): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000200), &(0x7f00000003c0)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff3f) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000003000), 0x201, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r4, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000140)=[0x0], &(0x7f0000000180)=[0x0], 0x0, 0x95, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x9d, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) socketpair(0x1, 0x1, 0x8000, &(0x7f0000000000)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) 37.79197783s ago: executing program 2 (id=1709): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), 0x0, 0x0, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0xffffffffffffff5c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x80, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147}, 0x80) 37.525146197s ago: executing program 0 (id=1710): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x711001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x13) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x20001, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f00000000c0)={'xfrm0\x00'}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xd) 37.438505355s ago: executing program 0 (id=1712): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r3 = syz_clone(0x41805800, &(0x7f0000000000)="f2b69358f2a5d9188b4f5045031865e4a5b463492be26f32f569c3c3a76e7d5185e46e6191aa5a4bf23d13bd193a1dedb41af62f7b3848b7d11fb8e6", 0x3c, &(0x7f0000000080), &(0x7f0000000180), &(0x7f0000000240)="c358899715733e86af89d62fd3cf72355ffc1d39a2eb13a8ca6391029f4088ec95f176e0b5fc8b354095f8594aef2a5ff292be2d851f63654fd3a17b1b9198aa78fa13c4fdb0871b728832d504efe6ff7683af1bc262f1ae0cfcafd91046528ed1f5d088317b0bde55b21d6d") r4 = syz_open_procfs$namespace(r3, &(0x7f00000001c0)='ns/cgroup\x00') bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYRES16=r2, @ANYRES32, @ANYRESOCT=r0, @ANYRES16=r0, @ANYRES16=r1, @ANYRES32=r4, @ANYRESDEC=r4, @ANYBLOB="674d2e21ed190c8d4b32fe1b153bdefcc87d8f5318f0"], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 36.917563537s ago: executing program 1 (id=1717): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x4d, 0x1, 0x3, 0x80000000}, {0x60, 0x8}, {}, {0x2}, {0x6, 0x0, 0x0, 0x10000000}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="0500"], 0x0, 0x8000005, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1c, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000218110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000700850000001700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000040000008500000082000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r3, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) 36.820619407s ago: executing program 2 (id=1720): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) close(r0) syz_clone(0x2048000, &(0x7f0000000280)="2a30053e1c3176368270ca8b9180188fc835645c38acc342fa86e88edfa65351a46a96741fb8b27eb7a0e7f51c48dde453c0f1988ab9e8ce16", 0x39, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x10000, 0x80000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4000000, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x3, 0x800}, 0xa100, 0xc8, 0x3, 0x0, 0x8001, 0x46, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000280)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa29"], 0xfdef) 36.782799921s ago: executing program 2 (id=1721): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000016c0)={{r1, 0xffffffffffffffff}, &(0x7f0000001580), &(0x7f00000015c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000009e01000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r3}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x30}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000f0ffffffffff030000000035"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x18) socketpair(0x1d, 0x2, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) 36.484793541s ago: executing program 2 (id=1722): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) write$cgroup_type(r0, &(0x7f0000000300), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110c23003f) write$cgroup_int(r4, &(0x7f00000002c0)=0x9, 0x12) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000200000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000340)='kmem_cache_free\x00', r5}, 0x18) socketpair$unix(0xa, 0x2, 0x11, &(0x7f00000002c0)) r6 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000280), 0x12) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 36.383489331s ago: executing program 1 (id=1723): r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES16=0x0], 0x50) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) (async) recvmsg(0xffffffffffffffff, 0x0, 0x40fd) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) write$cgroup_devices(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1e031800dd5c980128854d"], 0xffdd) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c1300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000faffffff850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) (async) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000), 0xfdef) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) (async) recvmsg$unix(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xffffff0f}, 0x10060) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0x1f6, 0x0, &(0x7f0000000740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x2a, r10}, 0x94) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) 35.612397778s ago: executing program 1 (id=1727): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f00000100000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000780), 0x6, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x19, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@call={0x85, 0x0, 0x0, 0xe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='signal_generate\x00', r4}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000edffffffffffffff0000000000000030547cbd5636a7bd6766a33d6761b2adcc65da01109c93b116da8c149141212372f26ff9448cbbd1e48c1cf068b466575139ed33da862d333a99bb0f55bd01683c57d025c32d49cf803363d0885a0d082b50dded3c47ab1034dc57d71e08ce000f08d7e19ef3b2c362a475affc07c3f3fe5b05e1aa480f261b38d87eac7a003d7814e80a79817a51ae689be529", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000200000000000000000000040000000000000000010000040018ed700000000001000000010000000000b68318bd5a3f0e875dcd40ff139e8fb18c7241747fe16c84fd7b7e36f4572df38d074c6aab5249fac744639f9be2a81744298505f7d99bd66b36fa7038ee4b15a04e38f8181fe9ca0c9ceaf3b86704e70b0fb653d93a82b157ec950d050c64e32c164a1bb39232b43ee398e224e6d16553969831a5b8b93d453d80b463c95bc7e18e5b17d0525ce0800320d67c3033da7e00c70f88613b08eeaf760435f2f63d"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@generic={&(0x7f0000000600)='./file0\x00', 0x0, 0x18}, 0x18) ioctl$TUNSETCARRIER(r6, 0x400454e2, &(0x7f0000000000)=0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) recvmsg$unix(r8, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0x0, 0x808e}, 0x40000100) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdf\x85\xaac{\x8c\x8ffp`-\xcd\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\t\xed\x13q2\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\xcb\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca\x04\x00\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x03\x00\x00\x00\x00\x00\x00\x00\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\xf3\xcf\x17\xf5\x86%\x7f\xec\xb2\xc5E\x00\xb2e\xa8\xf1<\xb2\xc82\xbf=o\x00\x00\x00\x00E\x00\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x922A\x95\x8e\xbc\xc80xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x18) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) (async) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r2}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x4, 0xfddc, 0x4, 0x81, 0x2c, 0x2, 0x0, 0x1, 0x19528, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xb}, 0xc0, 0x9, 0x9, 0x9, 0x0, 0x0, 0xfff, 0x0, 0x7ff, 0x0, 0x9}, 0x0, 0x40003, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0x6}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000040000000400000002", @ANYBLOB], 0x48) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000040000000400000002", @ANYBLOB], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r9, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32, @ANYBLOB="4f000000000000000020000040000000000000001a139164df45d0bab58b038178eff78b8b0c078c159cb390f4fe0080f6f35b87182c51716bcd7e96600fca778d0df766e7c8265d74c6e235f0b707df248efa3164efed347a1aebd9a2c69279d8091c3f82a43fe1e85f7fddfd36bc24069c83d6e72dc1cdf3503b4cb466078f86c71174bac2a31b98bbd98effc2c0eebf0840747fbb00d49c736328c9b90bed6b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) (async) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32, @ANYBLOB="4f000000000000000020000040000000000000001a139164df45d0bab58b038178eff78b8b0c078c159cb390f4fe0080f6f35b87182c51716bcd7e96600fca778d0df766e7c8265d74c6e235f0b707df248efa3164efed347a1aebd9a2c69279d8091c3f82a43fe1e85f7fddfd36bc24069c83d6e72dc1cdf3503b4cb466078f86c71174bac2a31b98bbd98effc2c0eebf0840747fbb00d49c736328c9b90bed6b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x19, &(0x7f0000000400)=ANY=[@ANYBLOB="180000008f000000000000000b00400018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000086000000bf09000000090100000000009500000000000000bd0a0600000100030018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000100000065000000061c0000bf91000000000000b702000003000000850000002a000000b7000000000000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x7, 0x1000, &(0x7f0000000cc0)=""/4096, 0x41100, 0x2f}, 0x94) 35.475004292s ago: executing program 4 (id=1731): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000400)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000100)="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", 0xfb}, {&(0x7f0000000200)="8fea4f091419ed40c7348463f3a90727ff91616f4253570fe6869dc596455e4441b63501ec9bbfc541e2414e0b0ed0c861ce75fdc4dbbbc8f6caf79bb0afa35af05cec40264cda451dfa025c314f01e2da133950ff7c572d638ff347f5262da658b2a1819eab79f08a1dc6cff285fbfa9c69c03d3874c04bc7abb902b909a843f3ef93bf23f67a6be1c316b7753dbb633c896eeb3449f10f8c441b527543974d36a9f816fac3a3dc1124c5617f1792", 0xaf}, {&(0x7f00000002c0)="f482a356ad5425cba2b1b1b510355bd28d97df9ad8093f0bbd42018f0763fee792e84a507bf594e9edab02dfcccf86225d19f4c3894696b3fdebc1f5cdc216368e43af9e97963831affe8fb971937af27a9e5194a0863c74945eff859589e963a4690cb6a406a600cdd60bd3beaef3d5b0f143ed9de030ef4a642926f004cc4148e1f78c1cbd00ba71ac8ada196a96c2f9b44a270cad85b18290b2e363ef8985f3b713059456507ea8ad9e042f86de326baac499c909f708ee94461a1d632d8e", 0xc0}], 0x3, 0x0, 0x0, 0x44012}, 0x0) sendmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000015c0), 0xffffffffffffff9d}, {&(0x7f00000015c0)="ec", 0x1}, {0x0, 0x19}], 0x26d}, 0x24040800) 35.472596652s ago: executing program 4 (id=1732): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1f, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="185700ed0e000000000000000000000018c20000d5f1f3fae8b44eb738720200000000000000000000007d480600fcffffffadb58b"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xee, &(0x7f0000000680)=""/238, 0x41100, 0x48, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0xd, 0x3, 0x80000001}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000280)=[0x1, 0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x0, 0x3, 0x5, 0x7}, {0x5, 0x2, 0xb, 0x7}, {0x0, 0x1, 0x8, 0x2}, {0x4, 0x2, 0x0, 0x6}, {0x2, 0x5, 0xc, 0x4}], 0x10, 0x2}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000900)={@map=0x1, 0x11, 0x1, 0xd, &(0x7f00000002c0)=[0x0], 0x1, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02040000000009000c00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="0d000000b3ba0000046a0000000010000001692d4e004000690d50836f0495d7ccef454e2e8f", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES8=r2, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r3}, &(0x7f0000000840), &(0x7f0000000880)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000180), &(0x7f00000002c0)=r2}, 0x20) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_ext={0x1c, 0x12, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xe}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @tail_call, @generic={0x6, 0x3, 0x9, 0xfffe, 0x9}]}, &(0x7f0000000b00)='syzkaller\x00', 0xb, 0x9c, &(0x7f0000000b40)=""/156, 0x0, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c00)={0x3, 0x5, 0x1000, 0x10d4}, 0x10, 0x1da59, 0xffffffffffffffff, 0x3, &(0x7f0000000c40)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000c80)=[{0x4, 0x1, 0xf, 0x9}, {0x3, 0x1, 0xa, 0x2}, {0x5, 0x4, 0xa, 0x8}], 0x10, 0x4}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000ec0)=ANY=[@ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="2000000011000000", @ANYRES32, @ANYBLOB="b69e28cbdefc38e30922b036b3d1a784c89507957d9d455048d29b68490a610cb438c19bb41b89144e5d8d59e5ede010b46336fa1e58904360fe6d542be45b91cc41e250655ce2e4f6dbe29ff63cedfc0ab90ca21f5149a7961ae9f17b1f95ae031c28940109f7d10554bc302eb219c8a7", @ANYRES32=r4, @ANYBLOB, @ANYRES64=r1], 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYBLOB="f907fdff0000000000000006", @ANYRES8], 0x48) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000100)=0x1, 0x12) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000e40)=ANY=[@ANYBLOB="180080000000485af4b7f6b37d7f52f40000000000000100000418110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095", @ANYRESOCT=r2], 0x0, 0x8000000}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000d80)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000ec0)=ANY=[], 0x0, 0xffffffc0, 0x0, 0x0, 0x41000}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40c, 0x4, 0x445, 0x0, 0x504, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(r10, 0x80047456, 0xf0ff1f00000000) write$cgroup_int(r6, &(0x7f0000000000)=0x4, 0x12) 35.343958745s ago: executing program 2 (id=1735): close(0x3) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00007fffffffffffffff00"/20, @ANYRES32=0x0, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4000000000000007910900000000000620000000000000095000000000000009e574bffff1729aba9b39a58e3cd8757e44cf3611b8e327a0279acba1f7791408d1efa421239728e2e5cc319b58520609dfd4a1a021d000000000000efffff75c3d894d99aef659f8b0000c515d8c219fbd9da31fc3ce3e9a2653000aec385a84a3d3f466bba30ac1486a70037fb03adef1a427fb0f4cb3072182da7c30000000000000000000000000000000000000000000000000000297e9fed660213ecb576987ad0972f18fbb7c9ecc03901f028b15b30ecf3205f90c9684ddc80d13bf37afc00e5efd686e6fb5ef4ee00b66126f773434a5c0d2ad3526bc484a6b94396117615f78f97637d8f8838aa75efb657ddafb15b88d97e47731cc3f55ce4e6a42562e6fb1f0000003030249c350044b09c36d10549a5949ff21418f1517508fb13540a82b5030cd9bb1bb066ca833c1fef6cefa28543ee520e46a3e96aca0d5a5f8cb34ad9c54c3a9a698f835bb83bcfd81ac5cfa18ce0740717994b5152cd0fa735433e50dccee16a208245b4366d44bb7ebd169b9e3a66d0cb29291a50f642ae4cb007540c806cd1cf88fdcaa393d1e1a697649401a802b474e374c767cb1ce52fd917d6af3de547be8429540de37f868a7f25d47c4b710836436008d4e8c8b42aeee84629d06d75ef09e0260b41de1f750480e492b6822d6275b7ccda1141707069cdb21de7a98dc37efdd806cc3619ad0659998bdd90b008c1aed04ee682b8ffd25741abbd9c6482ca45b82b6b7f25f71280cd6ba8bbb1e32dfe84831d1fc132755ce9aaf1952cb6829e9d6f4cbd8a07dc0cebcad512b3e0f2daa622bc805d2e152e0765b20cd6c8e2f4fff81e1458a43f35d36b25225dc0fbaf3b8131f5a8ae73e8badc519350edf048d5f56617"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x0, 0xe, 0x300, &(0x7f00000002c0)="f57b0bb7994307a7ac95a7c71016", 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, &(0x7f0000000180)="b8"}, 0x3a) close(r3) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={0x0, 0xc}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x895}, 0x0, 0x0, 0xffffffffffffffff, 0x9) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) recvmsg(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000480), 0x8) ioctl$TUNGETFEATURES(r9, 0x800454cf, &(0x7f00000004c0)) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) sendmsg$inet(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) close(r6) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) 35.19388062s ago: executing program 4 (id=1736): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000500000000000000000000001801000020a0702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0x23, 0x5, 0x1000, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f00000002c0), 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xf, 0x0, 0x0, 0x0, 0x200, 0x8568, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000d3", @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='memory.swap.max\x00', 0x2, 0x0) socketpair(0x10, 0xa, 0x6, &(0x7f0000000280)) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) syz_clone(0x403ac400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)) r3 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x80, 0x7c, 0x8, 0x3, 0x3, 0x0, 0x9, 0x84034, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x200, 0x7, 0x2, 0x5, 0x100000001, 0x6000000, 0x8, 0x0, 0x6, 0x0, 0xa}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x25c, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020666c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000085000000070000009500000000000000", @ANYBLOB="46a708633f34a149f0cd51fd12636fbc4ce4b1155decfbecb10c86b0f96374d6244c74cf47b13642132679472a0486565d7889cae2eea958278f685e1a4a7e3cd7ea6d8835352c45c7e38a2c06aec751e303eb435eace3f570d76a461ba2ab662f2f525e2b884fad9a745350564a164c6f417bba72deb03afa206919438fd10c84336e3fae74398d95608331f3fb63b95a9dc9e802e799c61432c91589fa5a76b7ba20ae58f20606bf74bc8adc64b75bf5ec47b3087a171d4447aebe0e95d5e0d9a8a001ee53de2b2db86ca3", @ANYRES8, @ANYRESHEX=r3, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000102c0)={r4, 0xe0, &(0x7f00000101c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, &(0x7f0000010040)=[0x0, 0x0], &(0x7f0000010080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x72, &(0x7f00000100c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000010100), &(0x7f0000010140), 0x8, 0xc6, 0x8, 0x8, &(0x7f0000010180)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', r5, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='memory.events.local\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="183200000300000000000000000000008520000003000000183100000100000000000000000000001831000002000000000000000000000018290000", @ANYRES32=0x1, @ANYBLOB="00000000020000005169f0ffffffffff18210000", @ANYBLOB="4d4bc9210de94f74e98e3d14a49f58020afed8cdca156e08b5b431c725b06bf3febd2c6af683dbea5f2e96f8d50083d7e17ac03335b58d29b3d5f92b28fd56fb323292f0d647e52314c9c4da3bf664f923eb1a608fc177a80937d3647bdfd511d703cfbfaed0b1ce4da1fcaac0051bf784e5d7418d6c0bbd2c22235636ad86dc764f5317cab0d6f1c747945a7c2f953cd8a56abe06bdcb302cba2cf3504154215549d9a4017a47e180eeef3e40d464ca9dd64760e98381dcb1eae1efa992588f501480c41f25981181e626c10b915f62fca8567046905778041289c35302fd302d6272", @ANYBLOB="040000000000000031b6e184bb8b5b4952fd11e8624e9696638ecfc212a0e70c35bb92ac285b15cdd24fb94639e553f028ba7ef7dd602ea159f1e917f22ee471ddff53f6bf9101ed8f251e17920288eea020ab50fd640ba4ab565b4876e6371ed30ceb84e2f471bc493842bc9dfa5dc7e3e1e438b3bed11ace599d605f11d824a9fe795decae010000005f6f986f"], &(0x7f0000000180)='GPL\x00', 0x400000, 0x73, &(0x7f0000000200)=""/115, 0x40f00, 0x10, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x2, 0xfffff25e, 0xfffffff9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000640)=[r6], &(0x7f0000000680)=[{0x4, 0x4, 0xd, 0x3}, {0x5, 0x2, 0xb, 0xb}], 0x10, 0x3}, 0x94) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x14, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000030000000000000001000080b7080000000000007b8af8ff00000000b7080000ffffff7f7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000a5000000186200000000000000000000dd00000018270000", @ANYRES32=r2, @ANYBLOB="00000000400300009500000000000000"], &(0x7f0000000500)='GPL\x00', 0x2, 0x0, &(0x7f0000000540), 0x40f00, 0xa, '\x00', r5, 0x0, r7, 0x8, &(0x7f00000005c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r2], &(0x7f0000000680), 0x10, 0x80000000}, 0x94) syz_clone(0x100c00, &(0x7f0000000200)="b1f12d59cdb58b320292d8be3a46a7293264ef2e03cd47", 0x17, &(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)="6ac9cd1c5e9ae45e78bc93a8774c41cc43e11282cb81") 35.067370233s ago: executing program 3 (id=1737): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x6, 0x6, 0x5}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x200}, 0x81) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000080000000500"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000d40)=ANY=[@ANYBLOB="180000000000e3ff000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000580)}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@ifindex, 0x31, 0x0, 0x400, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x0}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x4, 0x6, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x80}, [@ldst={0x1, 0x2, 0x1, 0x3, 0x9, 0xfffffffffffffff0, 0x8}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000300)='GPL\x00', 0x0, 0x5, &(0x7f0000000340)=""/5, 0x41000, 0x8, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x4, 0x4, 0x2}, 0x10, 0x0, r3, 0x1, &(0x7f0000000400)=[r0], &(0x7f0000000440)=[{0x5, 0x1, 0x3, 0xb}], 0x10, 0x9}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={@map=r4, r3, 0x38, 0x0, 0x0, @void, @value=r6, @void, @void, r5}, 0x20) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 35.004231839s ago: executing program 4 (id=1738): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000028000000b704000000000000000000950000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12d2484bc82952cd, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @value=r1}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000081130000bfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071109a00000000001d300500000000004704000001ed00000f030000000000001d44020000000000620a00fe040400007203000000000000b500f7ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a8641aa05a1336b3b4c4becea710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3380d28e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51bf900000000000000d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343cccc953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93020000000000000080e69db384ac7eeedcf2ba3a9508f9d6aba582a896a9f1e096df6ecea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e80dc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6032399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c9102"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 34.827259597s ago: executing program 4 (id=1739): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="07000000040047001800", @ANYBLOB="010400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b000000000000"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x228c, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x3}, [@map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x4, 0x5, 0x0, 0xd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0x5, 0x5, 0x0, 0xf}, @alu={0x4, 0x1, 0x5, 0x9, 0x9, 0x2, 0x10}]}, &(0x7f0000000400)='GPL\x00', 0x9, 0x54, &(0x7f00000007c0)=""/84, 0x41000, 0x10, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b00)={0x0, 0xe, 0xb5cb, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000d80)=[r0, 0xffffffffffffffff, r3, r4, 0xffffffffffffffff], &(0x7f0000000dc0)=[{0x0, 0x2, 0x4, 0x2}, {0x5, 0x2, 0x7, 0xa}], 0x10, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r8}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004080000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r10, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) 34.802371749s ago: executing program 3 (id=1740): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x0, 0x9, 0x2, 0x0, 0x100, 0x1420, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0xa19, 0x9}, 0x80, 0x0, 0x100, 0x8, 0x290f4e9f, 0x9, 0x3, 0x0, 0x66, 0x0, 0xc02a}, 0x0, 0x10, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x0, 0x7, 0x8, 0x0, 0xfffffffffffffffe, 0x80, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp={&(0x7f0000000000), 0x3}, 0x18003, 0x2020000000, 0x9, 0x4, 0x2, 0x1, 0xfff7, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x4, r0, 0xa) r2 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0xb, 0x8, 0xb, 0xcc, 0x0, 0x2c, 0x42008, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x41, 0x9e46, 0xe30, 0x4, 0xffff, 0x2, 0x3, 0x0, 0x4, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000240)={'pim6reg1\x00', 0x20}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000280)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000300)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r2}, 0x8) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x119, 0x119, 0x8, [@struct={0x5, 0x2, 0x0, 0x4, 0x1, 0x0, [{0x7, 0x4, 0x8}, {0x8, 0x4, 0x3}]}, @fwd={0xe}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x9}}, @restrict={0xa}, @datasec={0x10, 0x9, 0x0, 0xf, 0x1, [{0x4, 0xfffffff9}, {0x2, 0x40, 0x9}, {0x5, 0xff, 0x7}, {0x2, 0xc, 0x8f4}, {0x5, 0x3, 0x6}, {0x5, 0x0, 0x80}, {0x5, 0x4, 0xfffffffd}, {0xc2e, 0x2}, {0x5, 0xfffffff8, 0x72}], 'J'}, @const={0xd, 0x0, 0x0, 0xa, 0x5}, @enum64={0xc, 0x3, 0x0, 0x13, 0x0, 0x2, [{0xc, 0x8001, 0xb61e}, {0xa, 0xffffffff, 0x6}, {0x9, 0xe, 0x7}]}, @var={0x3, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x30, 0x61, 0x2e, 0x30, 0x61, 0x0]}}, &(0x7f0000000480)=""/165, 0x13c, 0xa5, 0x1, 0xfd9, 0x10000, @value=r4}, 0x28) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x17, &(0x7f0000000600)=@raw=[@jmp={0x5, 0x0, 0x4, 0x2, 0x5, 0x50}, @generic={0x8, 0x7, 0x9, 0xaaaf, 0xffffffff}, @ldst={0x1, 0x0, 0x1, 0x9, 0xe, 0x80, 0x8}, @jmp={0x5, 0x1, 0xd, 0x7, 0xb, 0x10, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x61e}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @map_fd={0x18, 0x7, 0x1, 0x0, r3}], &(0x7f00000006c0)='syzkaller\x00', 0xfffffffd, 0xf5, &(0x7f0000000700)=""/245, 0x41000, 0x32, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x5b3c, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[r4, 0xffffffffffffffff], 0x0, 0x10, 0x5}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000980)={{0x1, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000940)=r6}, 0x20) r8 = openat$cgroup(r1, &(0x7f0000000a80)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000a00)={0x2, 0x80, 0xd, 0xff, 0x40, 0xf, 0x0, 0x200, 0x600, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffff800, 0x4, @perf_bp={&(0x7f00000009c0), 0x9}, 0x1, 0x6, 0x40000000, 0x8, 0x8, 0xfff, 0x6, 0x0, 0x9, 0x0, 0x6}, r8, 0xffffffffffffffff, r1, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000ac0)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r6) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000b00), 0x8) r11 = openat$cgroup_netprio_ifpriomap(r8, &(0x7f0000000ec0), 0x2, 0x0) r12 = getpid() r13 = gettid() sendmsg$unix(r10, &(0x7f0000000f80)={&(0x7f0000000b40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000e40)=[{&(0x7f0000000bc0)="90e0ae323fb53eb31bbc29523347e82c993c5946a70e79d90ec79bcdf0548edfdaba8376e2", 0x25}, {&(0x7f0000000c00)="e67471a03ad68e59bc156040ce1f0e82ffe55984ee41c1ea24ee60a65264e7ba929c57", 0x23}, {&(0x7f0000000c40)="3c1d142cd672b7937ae2e1105e4e03864d6025ce4f43b8b0ba69e0f6ed6dd67a46875cfd3d470db056fa51c52e8cce9bd0b45fca70eac6bb8226f743cabaf1b216dbf84cea98f8f2821e75eb306ff90eefa5ff26d26a81f7a8c87826102aad70ea6d1aea5128acbca3e5a6ed31f846d0c89058dd90bd633620e1c2943f2f8c0c8c74546ced931d57c9ab40844b1a02fac4e1c429fb947d084ed4de91", 0x9c}, {&(0x7f0000000d00)="0f1514f376b10b94400ece53218148479da0a63fb591b3c4c8d0fa1a3e03df9212ae", 0x22}, {&(0x7f0000000d40)="e3f4231d366bce976822bb1d4072ed750d875db4ca83a2b9b0ddb6ecc60288a1e8e37573e3d6a58ba0b022c98d3236958cabd0a0298e3ea8859c5f5900c83defe3cec17e9c2ded3526b3a7549f63f1467c513a2f53c72f0f4821f843cfb2709d83507172ca4c240fc58e5f94b867f56746375624b81bb1ec875c6b3c302afa13d7b1cd31645602a50054f6fa0a4e6d80205b6d818009a7b16698d444a1ada2dacc59509e04367945f9dac39ab205200e83873658161032751389643754688026261b2c62eb096797e8271c6f", 0xcc}], 0x5, &(0x7f0000000f00)=[@rights={{0x1c, 0x1, 0x1, [r11, r2, r9]}}, @cred={{0x1c, 0x1, 0x2, {r12}}}, @cred={{0x1c, 0x1, 0x2, {r13, 0xee01, 0xee01}}}], 0x60, 0x4000000}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001500)={r10, 0xe0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000001240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000001280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000012c0)=[0x0, 0x0], 0x0, 0xa6, &(0x7f0000001300)=[{}], 0x8, 0x10, &(0x7f0000001340), &(0x7f0000001380), 0x8, 0x5c, 0x8, 0x8, &(0x7f00000013c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x15, 0x23, &(0x7f0000000fc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, {}, {}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0x1}, @generic={0x4, 0x1, 0x9, 0x408, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, @exit, @ldst={0x1, 0x1, 0x1, 0x6, 0x4, 0xffffffffffffffff, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0xd, 0x2, 0x8, 0xffffffffffffffc0, 0x4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6b16}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x3, 0x2, 0x4, 0x8, 0xfffffffffffffff1}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001100)='GPL\x00', 0xa, 0xb5, &(0x7f0000001140)=""/181, 0x40f00, 0x10, '\x00', 0x0, @sk_reuseport=0x27, r10, 0x8, &(0x7f0000001200)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, r15, r6, 0x5, &(0x7f0000001540)=[r7, r10, r7], &(0x7f0000001580)=[{0x4, 0x2, 0xe, 0x8}, {0x1, 0x1, 0x10}, {0x5, 0x5, 0x6, 0xa}, {0x5, 0x3, 0xe, 0xb}, {0x2, 0x5, 0x3, 0x2}], 0x10, 0x5}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000018c0)={r5, 0x20, &(0x7f0000001880)={&(0x7f00000016c0)=""/153, 0x99, 0x0, &(0x7f0000001780)=""/210, 0xd2}}, 0x10) sendmsg$unix(r10, &(0x7f0000002d00)={0x0, 0x0, &(0x7f0000002c40)=[{&(0x7f0000001900)}, {&(0x7f0000001940)="71ba13c173d534f7dfed7b77e6f5307bb20e8a2420d9567d824619398f0a43bc4679c12cd87d66f04d2f9e50651ead7adb6accf0b57308c0dac93754f31bf5e2", 0x40}, {&(0x7f0000001980)="5e4e9b9d7ed099420978655b0a8c8518c3a5f25a005381ed6e1e5eed115da8a910c6d25b9a45aa79408135b8940a32f8e51153777aec04fcfbcee0f3c4", 0x3d}, {&(0x7f00000019c0)="cb088e01fcf61c869d0181092e0bb3c28c151ad51b7a7a95fa5957604c139c212004cb3dfadfd38ba96d711bb1076b0b3f7b814ea69b34fcc305754c436be73dd6d2d062819d7eb80097d737c11e375269eaefda5505733e66964923ab625623aaf2647f460a", 0x66}, {&(0x7f0000001a40)="e6dc8d12b12cfa98296db48a4f347bb093d8946b", 0x14}, {&(0x7f0000001a80)="3153ac2f72716b3340315292366be9ddede8ee7ad56e8d141e4e15d6983bdd4144564cf005cd7a4fa201d8d356fbf2b19253e387d56af38d2b31aa5f67e6ddb91f2af9eb43c34877e526ddf41f1bbdbf7d06e2bfd9087be498e0013e585ac7c2790a78bc4c22778cf66f96136e0542092fb696a1fa8faaee7569fcde6b76e45f12f342ad0711f469f491fce7357310e9c9f3003cf0d10c8085df", 0x9a}, {&(0x7f0000001b40)="8638a8b481287fe28c92f0de90060d51f419f17edd71e9925ac59b964c4c9056b693f459c6c3553328531005c7e28e638f31ef63b8ad20b88c4861b4ffbbda0656429a9bebfc4645e8a177058e550958f721590cc2b7589f9ec2881158e85b16d0be55a10c9cbe8e9e69ca5866932524e90b365ee07740a4f9cb2fa7ad93c5ad392d860f10b177f9d0349af623bdeb9ee75770eaf9ae20e535b88a10925ee56d9347c53dcf65d6fd1408451a10f2b7934f0e7a36e21ee3fae666ce3902841e66d92e7f33523ad99fc783f3cb8e117df067e5ece35360f53e933bb01b00", 0xdd}, {&(0x7f0000001c40)="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", 0x1000}], 0x8, &(0x7f0000002cc0)=[@cred={{0x1c, 0x1, 0x2, {r13, 0xffffffffffffffff, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [r5, r3, r6]}}], 0x40, 0x240080c4}, 0x40000) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002e00)={&(0x7f0000002d40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x4, [@fwd={0x10}, @union={0x9, 0x5, 0x0, 0x5, 0x1, 0x10, [{0xe, 0x4, 0xffff17fa}, {0xe, 0x0, 0x5}, {0x6, 0x2, 0x5}, {0x3, 0x0, 0x7fff}, {0x10, 0x5, 0x5}]}, @fwd={0x10}]}, {0x0, [0x30, 0x30]}}, &(0x7f0000002dc0)=""/50, 0x7c, 0x32, 0x1, 0x6, 0x10000, @value=r4}, 0x28) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000002e40)=@base={0x1c, 0x27c00000, 0xee, 0xfffff000, 0x202, r7, 0xb, '\x00', r14, r16, 0x1, 0x3, 0x3}, 0x50) r18 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000003100)={0x1b, 0x0, 0x0, 0x1e1, 0x0, r10, 0x5, '\x00', r14, r5, 0x0, 0x1}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000003180)={r10, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003240)={0x11, 0x1a, &(0x7f0000002ec0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x945, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @jmp={0x5, 0x1, 0xd, 0x4, 0x3, 0xfffffffffffffffe, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002fc0)='syzkaller\x00', 0x5, 0x6b, &(0x7f0000003000)=""/107, 0x2e63910405a7507a, 0x24, '\x00', r14, 0x0, r5, 0x8, &(0x7f0000003080)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000030c0)={0x1, 0x2, 0x1, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000031c0)=[r17, r7, r18, r19], &(0x7f0000003200)=[{0x5, 0x4, 0x4}], 0x10, 0x9}, 0x94) 34.757280813s ago: executing program 1 (id=1741): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="ffffffffffffffe0000000000000000000000000eb8bc35b1aefe20970678c8fd0f3818ee1e1e0efc8b407d9df550339da215b3448c03c48a82627aec3fb9c13fd1dd8db01c3aec476fbf1a3d2fd5bd1929331582ad1c9889f03a69c9e07d855a28082216c00609f4309199c1beaa6b3d82b39995d09fb0d36925970bb18d12aed7f7664582c12a5db8c7ab6bad6815fb8e9fa21e3b981439d0c96de8320f3943263c1ee210a000022d0", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r2 = gettid() sendmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="17fb9550430f", 0x6}], 0x1, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee01, 0xee00}}}], 0x20, 0x80}, 0x40000) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x8, 0x9}, r2, 0xfffffffffffffffc, r0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8912, &(0x7f00000003c0)='i\xb0\xbe\x85]\xa6S\x12\xbdB\x9da\xa0\xfbE\xe5\xc0R\xddj\xbb\x98d\xfc`\xdf\xb5\xa1\x9bC0\xbf>\xabOq\xb3\x16\x97X\x16\xcb\xf2\xbf\x029\xebA \xe9\xb9\xc8\xea\xb8\xa4\xae\xa2\x95\xa9\xf0\xc7\xa9\x95\xab@w\xfdw0E\xc4\x92\x8a\x9aI\xc5\xd1\x1b\x80\x86\xcb\f\xfc\x8e\xd0\x02\x8bN.\x8f=o%\t\xb1_\xb6\x19n\xe0\xe7_EZ\xe1j\"\xe8\v\xed6\xd1\xfa\xc8\x1e\x97\x9c\x88\xbb\x9do\xa3\xbe\xd38\xea6\xe4\xf9q\x1b\xa3\xfb\xbfh\xbcb\xf7(n\x0f\xaf\xe5:Z.\xef\xf8\xd4\xf2\x03\x8dncUV\xbe\xc0\x05\xf4\x90\xe6XZ3\x04e<\xaf\xc2h\x9a\x87\a+\x11\x1c-\x16\x03y\x13\xf9q\x88\xf2\x01\xbc\xa1\xf5\x04\xee\fc\xadA\t\x00\x00\x00ZHQ_\x90\xc2\xdae\xbf\x12c/\x9f,\x88\xa9m\x82\xeb\xd38\x9abv\x989\x14\xd9N\xf2\xc9N\x1d\\\xc8O\xf7\x80H\xc4M\x18a\f($;y&u{\\\xef\x80\xf0%\xd7\xdc\x8b\xe2\x15\v\t\xfb\x8dZ\xc1g]\xb7n\xf5\x814\x87\x00\x00\x00\x00ag]SP\xdfL&\xf3\xb8\x02\xf2\x18Ix)\xc2\xa8\xb5\x17u\x8d\xff\x19\xa2N\xef\xe8*\xb8\xbe\xd8R]]?\x9a\xa9\xd2H\xf3g\x06\xdaz\xf9k7a') bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x129800, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000280)={'bond_slave_0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f00000008c0)={0x0, 0xfffffffffffffe47, 0x0, 0x0, 0x0, 0x0, 0x6041854}, 0x4000) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) sendmsg$tipc(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4008000}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000140)={'caif0\x00', 0x200}) 34.682752081s ago: executing program 3 (id=1742): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)}, 0x20) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000001c0)={0x1, 0xffffffffffffffff}, 0x4) (async, rerun: 64) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000400), 0x4) (async, rerun: 64) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@o_path={&(0x7f00000004c0)='./file0\x00', 0x0, 0xc, r0}, 0x18) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x1f, &(0x7f0000000200)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], &(0x7f0000000300)='syzkaller\x00', 0x4, 0xa7, &(0x7f0000000340)=""/167, 0x40f00, 0x40, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000440)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x3, 0xa, 0x5, 0xfffffbff}, 0x10, 0x27052, r5, 0x1, 0x0, &(0x7f0000000540)=[{0x5, 0x1, 0xb, 0x5}], 0x10, 0x401}, 0x94) unlink(&(0x7f0000000640)='./file0\x00') (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680), 0x100, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f00000006c0)={'veth0_to_hsr\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000700), 0x4) (async, rerun: 32) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)=@o_path={&(0x7f0000000740)='./file1\x00', 0x0, 0x4018, r3}, 0x18) (async, rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x215, 0x0, r2, 0x29, '\x00', 0x0, r4, 0x3, 0x3}, 0x50) r9 = getpid() r10 = perf_event_open(&(0x7f0000000840)={0x5, 0x80, 0x5, 0x9, 0x67, 0x7, 0x0, 0x7fff, 0x1200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x319, 0x0, @perf_config_ext={0x10001, 0x660c}, 0x8400, 0x400, 0x3ff, 0x7, 0x8, 0x6, 0x5, 0x0, 0x81a, 0x0, 0x7}, r9, 0xffffffffffffffff, r8, 0x2) r11 = openat$cgroup(r10, &(0x7f00000008c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r11, &(0x7f0000000900), 0x2, 0x0) (async) r12 = openat$cgroup_int(r11, &(0x7f0000000940)='hugetlb.1GB.rsvd.failcnt\x00', 0x2, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={r6, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000b40)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000b80)=[0x0], &(0x7f0000000bc0)=[0x0, 0x0], 0x0, 0xa3, &(0x7f0000000c00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000c40), &(0x7f0000000c80), 0x8, 0x1c, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ec0)={0xffff77af, 0x0}, 0x8) r15 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000f00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x9, 0x1c, &(0x7f0000000980)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x15a2}, [@alu={0x7, 0x1, 0xcb7793ca654eef53, 0x7, 0xb, 0x6, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @jmp={0x5, 0x0, 0x3, 0x3, 0x8, 0x50, 0x8}, @map_val={0x18, 0x15, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x76e}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}]}, &(0x7f0000000a80)='syzkaller\x00', 0xfff, 0x7b, &(0x7f0000000ac0)=""/123, 0x40f00, 0x56, '\x00', r13, @cgroup_sock=0x66, r4, 0x8, &(0x7f0000000e40)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x7, 0x100}, 0x10, r14, r6, 0x0, &(0x7f0000000f80)=[r15, r2], 0x0, 0x10, 0x3}, 0x94) (async) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000001080), 0x2, 0x0) (async) r16 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x77, '\x00', r13, r4, 0x0, 0x2, 0x5}, 0x50) (async, rerun: 64) ioctl$TUNGETSNDBUF(r7, 0x800454d3, &(0x7f0000001140)) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, 0xffffffffffffffff) (async) write$cgroup_int(r12, &(0x7f0000001180)=0x4, 0x12) r17 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000011c0)={0x1b, 0x0, 0x0, 0x6, 0x0, r16, 0xf22, '\x00', r13, r4, 0x5, 0x4, 0x2}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x16, 0x2a, &(0x7f0000001300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xa}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x254}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0xffff}, @jmp={0x5, 0x1, 0xb, 0x9, 0x5, 0xfffffffffffffffc, 0xfffffffffffffff0}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x2}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xbb}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001480)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x41, '\x00', r13, @flow_dissector, r4, 0x8, &(0x7f00000014c0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, r14, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000001500)=[{0x4, 0x5, 0xb, 0x5}, {0x2, 0x0, 0x0, 0x3}, {0x3, 0x1, 0x1, 0xc}, {0x4, 0x3, 0xc, 0xa}, {0x3, 0x4, 0x6, 0x3}, {0x0, 0x4, 0x7, 0x5}], 0x10, 0x4}, 0x94) 34.677906511s ago: executing program 3 (id=1743): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0xc40, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f00000006c0)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb96f37538e486dd637208"], 0xe) r8 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110c23003f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r9}, 0x10) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, r8, 0x80000000, '\x00', 0x0, r2, 0x0, 0x1, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r10, &(0x7f0000000580)="08f1adc4b951295721b7296b77b998d390c9af77634f0b9333e759dd8333fe0848dfbe1449608f3f48965c52f35c811d46681154059f2c36bc2b53c3539f1e282f510a5fc72611c4c40187c04e3aa3903dc365e0e52bd80b00c450210747f60e49c1fa0df7e0b5033d0648d8ed67ad6e9471e27d42dea14fb4d0c92d7bcf9fec414f7f7856c2d3c30ef1a553e39c9b4dcdc231a02efa691a395fa3e5b5945fa93827c05c575dca861f5413ce8d7001eb01d8104310d7e6351767f52d9369e1dd9f", &(0x7f0000001340)=""/4096}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r9}, 0x18) 33.845994125s ago: executing program 4 (id=1744): perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001000000", @ANYRES32=0x0, @ANYRES32], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000900), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r1}, &(0x7f0000000280), &(0x7f0000000300)='%-010d \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8982, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair(0x1e, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 33.799736609s ago: executing program 0 (id=1745): bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0600000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000238a477baf98becbad2474d65b10ecb677f7efdb2c6997d6e86f9164018b6cdc3f248fc8b88aa29a3ef845689b6be4886b1f9232ad4c9c520286ab559a21c40c7af07941f7cc02d99e11e2029a2e3575c3030c1ff516ef60edbd614522a724119d67bdf726cb9bc59f96e2fa064c2d6663b8c657ed9368a123842d264543595f8b3be00e1c922dd7bb40f8123aba85d6818ef7825cb93920218caa9d8b2e8ebb50b30ec6ee0fb0b14f607c87c22ce8d7aab62c28b23e38d07fe9d46ad3b3bfadf31416379e961226ef", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x5, 0x7, 0x10001, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x18) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r5}, 0x3d) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1f, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 33.722908627s ago: executing program 1 (id=1746): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) (async, rerun: 32) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) (rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce81ea033300fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='wbt_timer\x00', r5, 0x0, 0x4}, 0x13) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1100000004000000040000000200000200"], 0x48) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x14, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000ffffffb0000000000000000004000000bb7f1a00c600feff0000000a9500000000000000b8295c810667bc64af46aada690011047d78fb63a3389ee9b2deaaa8012f14a191ce"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20000000}, 0x80) (async) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89a1, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) 33.721923097s ago: executing program 3 (id=1747): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) (async, rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') (async, rerun: 64) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r1, 0x0, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 33.649983304s ago: executing program 3 (id=1748): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000050005007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100001100000000000000000000001812"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b402000000000000631108000000000005000000000000009500747317ba7800"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb}, 0x21) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02d64c0000180000000000008005000000001a0db5d60000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f00000009c0)=ANY=[@ANYBLOB="18080000ffffff1f000000000000000018110000d7f0a69d3d4cd362", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045090100002000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b80)={0xffffffffffffffff, 0x0, 0x0, 0x2000000}, 0x20) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xbd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x204, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000040000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110e22fff6) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000000000000000000000000001811000094d848a86fb4c261597324d1dcfb04831a9b3a514e0c448e8fc59a05d5afc1c4017060f37abd3614858e0823eca00221d908602aee290785448a503fe9cce2a37bbe4720ad3d6ccd34f7187d269fec8af07261dd3f1145e7efff9c8e4473c0dc63bd06015717be8202a41cb2f03a4f45272ef2025de13aa0c85a227ad6e72de1a985808b71f1de627276256f6e692fb6d8029600"/178, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) 33.599306019s ago: executing program 1 (id=1749): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f0000000480)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xe, &(0x7f0000000180)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r5}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r4) 0s ago: executing program 32 (id=1745): bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0600000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000238a477baf98becbad2474d65b10ecb677f7efdb2c6997d6e86f9164018b6cdc3f248fc8b88aa29a3ef845689b6be4886b1f9232ad4c9c520286ab559a21c40c7af07941f7cc02d99e11e2029a2e3575c3030c1ff516ef60edbd614522a724119d67bdf726cb9bc59f96e2fa064c2d6663b8c657ed9368a123842d264543595f8b3be00e1c922dd7bb40f8123aba85d6818ef7825cb93920218caa9d8b2e8ebb50b30ec6ee0fb0b14f607c87c22ce8d7aab62c28b23e38d07fe9d46ad3b3bfadf31416379e961226ef", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1, 0x0, 0x64}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@base={0x5, 0x7, 0x10001, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r7}, 0x18) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r5}, 0x3d) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1f00) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1f, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts. [ 17.989249][ T24] audit: type=1400 audit(1763041279.709:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 17.990296][ T267] cgroup: Unknown subsys name 'net' [ 17.993356][ T24] audit: type=1400 audit(1763041279.709:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.999314][ T24] audit: type=1400 audit(1763041279.709:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 17.999470][ T267] cgroup: Unknown subsys name 'devices' [ 18.148880][ T267] cgroup: Unknown subsys name 'hugetlb' [ 18.154489][ T267] cgroup: Unknown subsys name 'rlimit' [ 18.292108][ T24] audit: type=1400 audit(1763041280.009:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 18.304450][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 18.315449][ T24] audit: type=1400 audit(1763041280.009:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 18.348775][ T24] audit: type=1400 audit(1763041280.009:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 18.371972][ T24] audit: type=1400 audit(1763041280.049:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.372166][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 18.397445][ T24] audit: type=1400 audit(1763041280.049:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.431729][ T24] audit: type=1400 audit(1763041280.069:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 18.457303][ T24] audit: type=1400 audit(1763041280.069:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.354947][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.362424][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.369926][ T275] device bridge_slave_0 entered promiscuous mode [ 19.377816][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.384837][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.392245][ T275] device bridge_slave_1 entered promiscuous mode [ 19.435229][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.442504][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.449952][ T276] device bridge_slave_0 entered promiscuous mode [ 19.467459][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.474493][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.481882][ T276] device bridge_slave_1 entered promiscuous mode [ 19.534643][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.541852][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.549315][ T277] device bridge_slave_0 entered promiscuous mode [ 19.556199][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.563262][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.570838][ T279] device bridge_slave_0 entered promiscuous mode [ 19.588840][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.595956][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.603451][ T277] device bridge_slave_1 entered promiscuous mode [ 19.610063][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.617077][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.624426][ T279] device bridge_slave_1 entered promiscuous mode [ 19.660058][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.667195][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.674700][ T278] device bridge_slave_0 entered promiscuous mode [ 19.683392][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.690523][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.697976][ T278] device bridge_slave_1 entered promiscuous mode [ 19.762863][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.769927][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.777399][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.784420][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.805313][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.812462][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.819735][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.826741][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.860614][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 19.867667][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 19.874904][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 19.881941][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 19.904255][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.911667][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.919205][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.926657][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 19.935048][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.942843][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 19.950161][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 19.990181][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 19.998675][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.007015][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.014163][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.022107][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.030145][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.038102][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.045468][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.053077][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.061807][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.068850][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.086074][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.094348][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.101556][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.109181][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.117808][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.124827][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.140454][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.148334][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.156445][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.163512][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.171062][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.179395][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.186398][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.193791][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.201706][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.209843][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.218059][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.225186][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.232582][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.250487][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.258851][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.266696][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.285583][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.295780][ T279] device veth0_vlan entered promiscuous mode [ 20.308888][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.316937][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.325096][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.333821][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.341863][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.353488][ T276] device veth0_vlan entered promiscuous mode [ 20.362060][ T279] device veth1_macvtap entered promiscuous mode [ 20.376559][ T275] device veth0_vlan entered promiscuous mode [ 20.383395][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.390793][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.398446][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.406307][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.414521][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.422707][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.430847][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.438715][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.447063][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.455375][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.462426][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.470057][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 20.478537][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.486665][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.493712][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.501362][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.509802][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.518451][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.526223][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.536029][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.543792][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.551297][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 20.559552][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.566976][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.577360][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.585703][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.594891][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 20.603191][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.621450][ T277] device veth0_vlan entered promiscuous mode [ 20.628538][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 20.636693][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.644826][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.653343][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.662135][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.670157][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.678218][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.685616][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.696246][ T275] device veth1_macvtap entered promiscuous mode [ 20.704445][ T276] device veth1_macvtap entered promiscuous mode [ 20.715492][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.723625][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.732970][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.741260][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.748837][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.757006][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.765416][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 20.773766][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.782889][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.791363][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.807427][ T278] device veth0_vlan entered promiscuous mode [ 20.816696][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.825391][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.834039][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 20.843211][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.852239][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.860935][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.869322][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 20.877987][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.886223][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 20.894209][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.902726][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 20.910314][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 20.920793][ T277] device veth1_macvtap entered promiscuous mode [ 20.933730][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 20.942044][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.942303][ T275] request_module fs-gadgetfs succeeded, but still no fs? [ 20.950343][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 20.966443][ T275] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.969456][ T278] device veth1_macvtap entered promiscuous mode [ 20.994663][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.008063][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.016260][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.045818][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.056996][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.067654][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.076041][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.089078][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.097655][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.106059][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.114785][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.220203][ T307] cgroup: syz.0.1 (307) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 21.242555][ T307] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 21.287245][ C0] hrtimer: interrupt took 27566 ns [ 21.882585][ T363] device wg2 entered promiscuous mode [ 22.242633][ T401] device sit0 entered promiscuous mode [ 22.293276][ T403] syz.2.29[403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 22.293325][ T403] syz.2.29[403] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 22.452632][ T416] device syzkaller0 entered promiscuous mode [ 22.795826][ T431] device syzkaller0 entered promiscuous mode [ 23.349151][ T24] kauditd_printk_skb: 40 callbacks suppressed [ 23.349168][ T24] audit: type=1400 audit(1763041285.069:114): avc: denied { create } for pid=471 comm="syz.3.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 23.755366][ T24] audit: type=1400 audit(1763041285.469:115): avc: denied { write } for pid=488 comm="syz.0.51" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 23.831645][ T491] device sit0 entered promiscuous mode [ 24.570816][ T24] audit: type=1400 audit(1763041286.289:116): avc: denied { create } for pid=559 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 27.438333][ T24] audit: type=1400 audit(1763041289.159:117): avc: denied { create } for pid=666 comm="syz.2.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 27.654969][ T24] audit: type=1400 audit(1763041289.369:118): avc: denied { create } for pid=683 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 28.402267][ T24] audit: type=1400 audit(1763041290.119:119): avc: denied { write } for pid=716 comm="syz.4.102" name="cgroup.subtree_control" dev="cgroup2" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.566169][ T24] audit: type=1400 audit(1763041290.119:120): avc: denied { open } for pid=716 comm="syz.4.102" path="" dev="cgroup2" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 28.693156][ T728] device syzkaller0 entered promiscuous mode [ 28.757141][ T24] audit: type=1400 audit(1763041290.469:121): avc: denied { create } for pid=736 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 29.333285][ T758] ±: renamed from pim6reg1 [ 31.318821][ T24] audit: type=1400 audit(1763041293.019:122): avc: denied { cpu } for pid=808 comm="syz.4.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.493553][ T815] device syzkaller0 entered promiscuous mode [ 31.506440][ T24] audit: type=1400 audit(1763041293.209:123): avc: denied { create } for pid=808 comm="syz.4.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 32.276072][ T842] device veth0_vlan left promiscuous mode [ 32.282390][ T842] device veth0_vlan entered promiscuous mode [ 32.290416][ T846] device pim6reg1 entered promiscuous mode [ 32.910913][ T869] device syzkaller0 entered promiscuous mode [ 33.330932][ T24] audit: type=1400 audit(1763041294.999:124): avc: denied { create } for pid=886 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 34.110450][ T930] device sit0 entered promiscuous mode [ 35.020589][ T952] device veth1_macvtap left promiscuous mode [ 35.056269][ T952] device veth1_macvtap entered promiscuous mode [ 35.064479][ T952] device macsec0 entered promiscuous mode [ 35.098155][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 35.161487][ T968] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.168724][ T968] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.217813][ T24] audit: type=1400 audit(1763041296.939:125): avc: denied { tracepoint } for pid=963 comm="syz.3.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.403118][ T979] device veth1_macvtap left promiscuous mode [ 35.446986][ T979] device macsec0 entered promiscuous mode [ 35.548223][ T24] audit: type=1400 audit(1763041297.269:126): avc: denied { ioctl } for pid=980 comm="syz.3.175" path="mnt:[4026532367]" dev="nsfs" ino=4026532367 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 35.634869][ T979] device macsec0 left promiscuous mode [ 36.251902][ T24] audit: type=1400 audit(1763041297.969:127): avc: denied { create } for pid=1023 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 36.557428][ T1035] device pim6reg1 entered promiscuous mode [ 37.935725][ T1063] device sit0 left promiscuous mode [ 38.318163][ T1063] device sit0 entered promiscuous mode [ 39.954449][ T1088] device wg2 left promiscuous mode [ 40.152292][ T1079] device wg2 entered promiscuous mode [ 40.342408][ T1095] device sit0 left promiscuous mode [ 41.409779][ T24] audit: type=1400 audit(1763041303.129:128): avc: denied { ioctl } for pid=1097 comm="syz.1.205" path="socket:[18106]" dev="sockfs" ino=18106 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 42.025067][ T24] audit: type=1400 audit(1763041303.739:129): avc: denied { create } for pid=1118 comm="syz.2.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.757587][ T1156] device wg2 entered promiscuous mode [ 42.899854][ T24] audit: type=1400 audit(1763041304.619:130): avc: denied { create } for pid=1157 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 42.959491][ T1171] device syzkaller0 entered promiscuous mode [ 43.152277][ T1205] device wg2 left promiscuous mode [ 43.404064][ T1218] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 43.428099][ T1218] syzkaller0: linktype set to 778 [ 44.141922][ T1265] device pim6reg1 entered promiscuous mode [ 46.933502][ T24] audit: type=1400 audit(1763041308.649:131): avc: denied { associate } for pid=1372 comm="syz.4.280" name="cpuacct.usage_user" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 48.542235][ T1429] device syzkaller0 entered promiscuous mode [ 49.838769][ T1473] device veth1_macvtap entered promiscuous mode [ 49.851160][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 49.868454][ T24] audit: type=1400 audit(1763041311.589:132): avc: denied { relabelfrom } for pid=1468 comm="syz.4.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 49.896013][ T24] audit: type=1400 audit(1763041311.589:133): avc: denied { relabelto } for pid=1468 comm="syz.4.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 50.225510][ T1486] device veth1_macvtap left promiscuous mode [ 50.321276][ T1486] device macsec0 left promiscuous mode [ 50.352630][ T1480] device veth1_macvtap entered promiscuous mode [ 50.382673][ T1480] device macsec0 entered promiscuous mode [ 51.882878][ T1553] device syzkaller0 entered promiscuous mode [ 52.174811][ T24] audit: type=1400 audit(1763041313.889:134): avc: denied { create } for pid=1576 comm="syz.2.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 52.663674][ T1591] device veth1_macvtap left promiscuous mode [ 52.886389][ T1604] device wg2 entered promiscuous mode [ 53.461690][ T24] audit: type=1400 audit(1763041315.179:135): avc: denied { create } for pid=1663 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 53.495475][ T24] audit: type=1400 audit(1763041315.179:136): avc: denied { create } for pid=1663 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 54.840091][ T1756] device sit0 entered promiscuous mode [ 55.906451][ T1791] ÿÿÿÿÿÿ: renamed from vlan1 [ 56.443772][ T24] audit: type=1400 audit(1763041318.159:137): avc: denied { create } for pid=1843 comm="syz.3.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 56.828190][ T1851] device sit0 entered promiscuous mode [ 57.495187][ T1879] device syzkaller0 entered promiscuous mode [ 59.028457][ T24] audit: type=1400 audit(1763041320.739:138): avc: denied { append } for pid=1949 comm="syz.3.426" name="ppp" dev="devtmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 59.779577][ T1979] device syzkaller0 entered promiscuous mode [ 60.405325][ T2023] device sit0 left promiscuous mode [ 61.080070][ T2025] device sit0 entered promiscuous mode [ 61.278015][ T2031] device pim6reg1 entered promiscuous mode [ 62.131748][ T2062] device syzkaller0 entered promiscuous mode [ 62.860347][ T2079] syz.1.465[2079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.860402][ T2079] syz.1.465[2079] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.238516][ T2078] device syzkaller0 entered promiscuous mode [ 65.585037][ T2108] device veth0_vlan left promiscuous mode [ 65.686079][ T2108] device veth0_vlan entered promiscuous mode [ 65.715909][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 65.758141][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 65.848003][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.274157][ T2120] device veth0_vlan left promiscuous mode [ 66.322611][ T2120] device veth0_vlan entered promiscuous mode [ 66.336738][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.346300][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.354815][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.439271][ T2149] device veth0_vlan left promiscuous mode [ 66.445748][ T2149] device veth0_vlan entered promiscuous mode [ 66.663570][ T2156] device syzkaller0 entered promiscuous mode [ 66.678803][ T24] audit: type=1400 audit(1763041328.389:139): avc: denied { create } for pid=2147 comm="syz.0.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 66.747425][ T2159] device pim6reg1 entered promiscuous mode [ 66.754910][ T2169] bridge0: port 3(veth0) entered blocking state [ 66.762972][ T2169] bridge0: port 3(veth0) entered disabled state [ 66.770208][ T2169] device veth0 entered promiscuous mode [ 67.677286][ T24] audit: type=1400 audit(1763041329.389:140): avc: denied { create } for pid=2199 comm="syz.4.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 67.949055][ T24] audit: type=1400 audit(1763041329.669:141): avc: denied { create } for pid=2205 comm="syz.3.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 68.238705][ T2200] device syzkaller0 entered promiscuous mode [ 69.435882][ T2273] device pim6reg1 entered promiscuous mode [ 69.628171][ T24] audit: type=1400 audit(1763041331.349:142): avc: denied { ioctl } for pid=2274 comm="syz.3.518" path="" dev="cgroup2" ino=141 ioctlcmd=0x54c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 69.714901][ T2290] device syzkaller0 entered promiscuous mode [ 69.801023][ T24] audit: type=1400 audit(1763041331.519:143): avc: denied { create } for pid=2301 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 70.013612][ T2306] syz.3.525 (2306) used obsolete PPPIOCDETACH ioctl [ 71.329849][ T2357] device pim6reg1 entered promiscuous mode [ 71.586780][ T2363] device syzkaller0 entered promiscuous mode [ 72.282175][ T24] audit: type=1400 audit(1763041333.999:144): avc: denied { create } for pid=2404 comm="syz.0.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 72.808530][ T2421] device syzkaller0 entered promiscuous mode [ 73.694223][ T2452] syz.2.564[2452] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.158456][ T2474] bridge0: port 3(veth0) entered blocking state [ 74.176179][ T2474] bridge0: port 3(veth0) entered forwarding state [ 74.182821][ T2474] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.189948][ T2474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.197323][ T2474] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.204372][ T2474] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.316065][ T2474] device bridge0 entered promiscuous mode [ 74.849539][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 75.611519][ T2566] device veth1_macvtap left promiscuous mode [ 75.617858][ T2566] device macsec0 entered promiscuous mode [ 75.789141][ T2577] device sit0 left promiscuous mode [ 75.831456][ T2577] device syzkaller0 entered promiscuous mode [ 75.942055][ T2585] device syzkaller0 entered promiscuous mode [ 77.345474][ T2643] device pim6reg1 entered promiscuous mode [ 80.874160][ T2780] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.092686][ T24] audit: type=1400 audit(1763041342.809:145): avc: denied { create } for pid=2800 comm="syz.4.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 81.439162][ T24] audit: type=1400 audit(1763041343.159:146): avc: denied { create } for pid=2814 comm="syz.3.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 82.453674][ T2854] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 82.494535][ T2854] device syzkaller0 entered promiscuous mode [ 82.786378][ T2903] device syzkaller0 entered promiscuous mode [ 82.846939][ T24] audit: type=1400 audit(1763041344.559:147): avc: denied { create } for pid=2908 comm="syz.0.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 84.106767][ T2977] device syzkaller0 entered promiscuous mode [ 86.027702][ T24] audit: type=1400 audit(1763041347.749:148): avc: denied { create } for pid=3065 comm="syz.4.738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 87.413312][ T3112] device wg2 entered promiscuous mode [ 88.373459][ T3168] device veth1_macvtap left promiscuous mode [ 88.431484][ T3178] device veth1_macvtap entered promiscuous mode [ 88.491761][ T3178] device macsec0 entered promiscuous mode [ 88.630665][ T3190] bridge0: port 3(veth0) entered disabled state [ 88.637041][ T3190] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.644357][ T3190] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.692063][ T3190] device bridge0 left promiscuous mode [ 88.709984][ T3190] bridge0: port 3(veth0) entered blocking state [ 88.716488][ T3190] bridge0: port 3(veth0) entered forwarding state [ 88.723130][ T3190] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.730394][ T3190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.737686][ T3190] bridge0: port 1(bridge_slave_0) entered blocking state [ 88.744849][ T3190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 88.868399][ T3190] device bridge0 entered promiscuous mode [ 89.787364][ T3245] device pim6reg1 entered promiscuous mode [ 91.273147][ T3276] device syzkaller0 entered promiscuous mode [ 94.156600][ T3332] device sit0 left promiscuous mode [ 94.186804][ T3331] device sit0 entered promiscuous mode [ 94.254860][ T3345] syz.4.811[3345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.254941][ T3345] syz.4.811[3345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 94.862322][ T3351] device wg2 left promiscuous mode [ 94.900521][ T3353] device wg2 entered promiscuous mode [ 95.265859][ T3364] device syzkaller0 entered promiscuous mode [ 95.980114][ T3411] device wg2 left promiscuous mode [ 97.583588][ T3484] device sit0 left promiscuous mode [ 97.779876][ T3485] device sit0 entered promiscuous mode [ 98.730514][ T3502] syz.2.851[3502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 98.730597][ T3502] syz.2.851[3502] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.266658][ T3510] device sit0 entered promiscuous mode [ 99.634869][ T24] audit: type=1400 audit(1763041361.349:149): avc: denied { create } for pid=3531 comm="syz.3.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 100.014587][ T3546] device pim6reg1 entered promiscuous mode [ 100.034811][ T3548] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.042232][ T3548] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.722879][ T3555] device syzkaller0 entered promiscuous mode [ 102.858980][ T3662] device pim6reg1 entered promiscuous mode [ 103.309165][ T3687] cgroup: fork rejected by pids controller in /syz0 [ 103.532326][ T3698] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.539690][ T3698] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.547760][ T3698] device bridge_slave_0 entered promiscuous mode [ 103.558105][ T3698] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.565383][ T3698] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.573303][ T3698] device bridge_slave_1 entered promiscuous mode [ 103.620045][ T24] audit: type=1400 audit(1763041365.339:150): avc: denied { write } for pid=3698 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.625473][ T3698] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.647638][ T3698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.655161][ T3698] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.662569][ T3698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.687909][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.695357][ T24] audit: type=1400 audit(1763041365.339:151): avc: denied { read } for pid=3698 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 103.716674][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.724266][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.760449][ T3698] device veth0_vlan entered promiscuous mode [ 103.771108][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 103.780154][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 103.788458][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 103.796264][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 103.804438][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.813321][ T531] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.820396][ T531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 103.828262][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 103.836557][ T531] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.843686][ T531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 103.855234][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 103.863302][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 103.873332][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 103.891785][ T3698] device veth1_macvtap entered promiscuous mode [ 103.915033][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 103.923948][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 105.529991][ T296] device bridge_slave_1 left promiscuous mode [ 105.546403][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.625883][ T296] device bridge_slave_0 left promiscuous mode [ 105.632374][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.648449][ T296] device veth1_macvtap left promiscuous mode [ 107.074411][ T3805] device syzkaller0 entered promiscuous mode [ 107.149514][ T3810] device wg2 entered promiscuous mode [ 109.434413][ T3863] device syzkaller0 entered promiscuous mode [ 109.872722][ T3885] device sit0 left promiscuous mode [ 109.965126][ T24] audit: type=1400 audit(1763041371.679:152): avc: denied { create } for pid=3895 comm="syz.1.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 110.843208][ T3955] cgroup: fork rejected by pids controller in /syz2 [ 111.846430][ T4069] bridge0: port 1(bridge_slave_0) entered blocking state [ 111.855621][ T4069] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.866337][ T4069] device bridge_slave_0 entered promiscuous mode [ 111.889151][ T4088] device pim6reg1 entered promiscuous mode [ 111.896526][ T4069] bridge0: port 2(bridge_slave_1) entered blocking state [ 111.910000][ T4069] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.921109][ T4069] device bridge_slave_1 entered promiscuous mode [ 112.032465][ T4069] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.039751][ T4069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.047736][ T4069] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.054773][ T4069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.179834][ T4103] device pim6reg1 entered promiscuous mode [ 112.260479][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 112.272605][ T2146] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.284651][ T2146] bridge0: port 2(bridge_slave_1) entered disabled state [ 112.305936][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 112.317425][ T2146] bridge0: port 1(bridge_slave_0) entered blocking state [ 112.324493][ T2146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 112.342185][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 112.351109][ T2146] bridge0: port 2(bridge_slave_1) entered blocking state [ 112.358205][ T2146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 112.379196][ T4111] device sit0 left promiscuous mode [ 112.399331][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 112.412648][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 112.421942][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 112.435997][ T4111] device sit0 entered promiscuous mode [ 112.437319][ T4115] syz.3.995[4115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.441991][ T4115] syz.3.995[4115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.458166][ T4116] syz.3.995[4116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.470090][ T4116] syz.3.995[4116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 113.040224][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 113.060066][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 113.068297][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 113.092529][ T4069] device veth0_vlan entered promiscuous mode [ 113.147626][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 113.166190][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 113.183035][ T4069] device veth1_macvtap entered promiscuous mode [ 113.241796][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 113.257814][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 113.274666][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 113.288224][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 113.357815][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 113.586044][ T4169] device macsec0 left promiscuous mode [ 114.928278][ T4228] device pim6reg1 entered promiscuous mode [ 116.534275][ T4280] device veth0_vlan left promiscuous mode [ 116.553628][ T4280] device veth0_vlan entered promiscuous mode [ 117.445061][ T4318] device wg2 entered promiscuous mode [ 117.577465][ T4319] device pim6reg1 entered promiscuous mode [ 117.609300][ T4321] device pim6reg1 entered promiscuous mode [ 118.914242][ T4355] device syzkaller0 entered promiscuous mode [ 119.273805][ T4369] device pim6reg1 entered promiscuous mode [ 120.877714][ T4424] device syzkaller0 entered promiscuous mode [ 121.447208][ T4457] device veth1_macvtap left promiscuous mode [ 121.586589][ T24] audit: type=1400 audit(1763041383.299:153): avc: denied { create } for pid=4471 comm="syz.2.1087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 122.436537][ T4484] device sit0 entered promiscuous mode [ 123.229418][ T24] audit: type=1400 audit(1763041384.949:154): avc: denied { create } for pid=4533 comm="syz.2.1103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 123.755996][ T4544] device syzkaller0 entered promiscuous mode [ 123.767671][ T24] audit: type=1400 audit(1763041385.489:155): avc: denied { create } for pid=4543 comm="syz.2.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 124.990268][ T4602] ÿÿÿÿÿÿ: renamed from vlan1 [ 125.312102][ T4608] device veth0_vlan left promiscuous mode [ 125.340718][ T4608] device veth0_vlan entered promiscuous mode [ 125.516775][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 125.529162][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 125.543287][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 125.795989][ T4615] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.803180][ T4615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 125.810480][ T4615] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.817548][ T4615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 125.840768][ T4615] device bridge0 entered promiscuous mode [ 126.105366][ T24] audit: type=1400 audit(1763041387.819:156): avc: denied { create } for pid=4633 comm="syz.2.1133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 126.567577][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.194373][ T4652] tap0: tun_chr_ioctl cmd 1074025675 [ 127.207937][ T4652] tap0: persist enabled [ 127.219545][ T4652] tap0: tun_chr_ioctl cmd 1074025675 [ 127.226143][ T4652] tap0: persist disabled [ 127.717603][ T4665] device syzkaller0 entered promiscuous mode [ 127.981423][ T4674] device syzkaller0 entered promiscuous mode [ 128.185743][ T4693] device pim6reg1 entered promiscuous mode [ 128.578795][ T4703] device sit0 left promiscuous mode [ 129.241315][ T4714] device sit0 left promiscuous mode [ 129.252824][ T4715] device sit0 entered promiscuous mode [ 130.183636][ T4720] device syzkaller0 entered promiscuous mode [ 130.465861][ T4764] ------------[ cut here ]------------ [ 130.471775][ T4764] trace type BPF program uses run-time allocation [ 130.478526][ T4764] WARNING: CPU: 1 PID: 4764 at kernel/bpf/verifier.c:10513 check_map_prog_compatibility+0x5d6/0x740 [ 130.490270][ T4764] Modules linked in: [ 130.494244][ T4764] CPU: 1 PID: 4764 Comm: syz.0.1167 Not tainted syzkaller #0 [ 130.505164][ T4764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 130.515861][ T4764] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 130.523189][ T4764] Code: 85 e9 14 fe ff ff e8 99 fa ef ff 31 c0 e9 15 fe ff ff e8 8d fa ef ff c6 05 34 c9 2c 05 01 48 c7 c7 80 7a 05 85 e8 7a a4 fb 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 130.548914][ T4764] RSP: 0018:ffffc9000146f468 EFLAGS: 00010246 [ 130.555121][ T4764] RAX: dba598c448de5400 RBX: 0000000000000001 RCX: 0000000000080000 [ 130.565108][ T4765] device pim6reg1 entered promiscuous mode [ 130.571554][ T4764] RDX: ffffc90008f1e000 RSI: 0000000000002d0a RDI: 0000000000002d0b [ 130.584271][ T4764] RBP: ffffc9000146f4b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 130.597152][ T4764] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff888139074000 [ 130.608613][ T4764] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff8881371e2800 [ 130.705169][ T4764] FS: 00007fbff7f806c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 130.734844][ T4764] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 130.822518][ T4764] CR2: 0000000100000001 CR3: 000000013bfdd000 CR4: 00000000003506a0 [ 130.923087][ T4764] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 130.987002][ T4764] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 130.995965][ T4764] Call Trace: [ 131.020291][ T4764] ? __fdget+0x1a1/0x230 [ 131.024566][ T4764] resolve_pseudo_ldimm64+0x526/0x1020 [ 131.030230][ T4764] ? bpf_check+0xd680/0xd680 [ 131.034850][ T4764] ? kvmalloc_node+0x88/0x130 [ 131.042146][ T4778] syz.2.1170 uses obsolete (PF_INET,SOCK_PACKET) [ 131.052948][ T4764] bpf_check+0x8d4b/0xd680 [ 131.052968][ T4764] ? bpf_get_btf_vmlinux+0x60/0x60 [ 131.052976][ T4764] ? 0xffffffffa0026bfc [ 131.052988][ T4764] ? is_bpf_text_address+0x177/0x190 [ 131.053000][ T4764] ? selinux_bpf_prog_alloc+0x51/0x140 [ 131.053011][ T4764] ? __kernel_text_address+0xa0/0x100 [ 131.053023][ T4764] ? unwind_get_return_address+0x4d/0x90 [ 131.053032][ T4764] ? stack_trace_save+0xe0/0xe0 [ 131.053041][ T4764] ? arch_stack_walk+0xee/0x140 [ 131.053054][ T4764] ? stack_trace_save+0x98/0xe0 [ 131.053063][ T4764] ? stack_trace_snprint+0xf0/0xf0 [ 131.053074][ T4764] ? __kasan_slab_alloc+0x69/0xf0 [ 131.053085][ T4764] ? selinux_bpf_prog_alloc+0x51/0x140 [ 131.053095][ T4764] ? __kasan_kmalloc+0xec/0x110 [ 131.053104][ T4764] ? __kasan_kmalloc+0xda/0x110 [ 131.053115][ T4764] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 131.053124][ T4764] ? selinux_bpf_prog_alloc+0x51/0x140 [ 131.053134][ T4764] ? security_bpf_prog_alloc+0x62/0x90 [ 131.053142][ T4764] ? bpf_prog_load+0x949/0x1420 [ 131.053151][ T4764] ? __se_sys_bpf+0x442/0x680 [ 131.053159][ T4764] ? __x64_sys_bpf+0x7b/0x90 [ 131.053168][ T4764] ? do_syscall_64+0x31/0x40 [ 131.053188][ T4764] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 131.053213][ T4764] ? memset+0x35/0x40 [ 131.053225][ T4764] ? bpf_obj_name_cpy+0x193/0x1e0 [ 131.053235][ T4764] bpf_prog_load+0xf5a/0x1420 [ 131.053247][ T4764] ? map_freeze+0x320/0x320 [ 131.053262][ T4764] ? selinux_bpf+0xc7/0xf0 [ 131.053271][ T4764] ? security_bpf+0x82/0xa0 [ 131.053281][ T4764] __se_sys_bpf+0x442/0x680 [ 131.053290][ T4764] ? __x64_sys_bpf+0x90/0x90 [ 131.053305][ T4764] ? __kasan_check_read+0x11/0x20 [ 131.053315][ T4764] __x64_sys_bpf+0x7b/0x90 [ 131.053324][ T4764] do_syscall_64+0x31/0x40 [ 131.053336][ T4764] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 131.053345][ T4764] RIP: 0033:0x7fbff95186c9 [ 131.053354][ T4764] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.053361][ T4764] RSP: 002b:00007fbff7f80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 131.053375][ T4764] RAX: ffffffffffffffda RBX: 00007fbff976efa0 RCX: 00007fbff95186c9 [ 131.053382][ T4764] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 131.053389][ T4764] RBP: 00007fbff959af91 R08: 0000000000000000 R09: 0000000000000000 [ 131.053395][ T4764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 131.053402][ T4764] R13: 00007fbff976f038 R14: 00007fbff976efa0 R15: 00007fff77cb3418 [ 131.053413][ T4764] ---[ end trace c307b25abcad9fb2 ]--- [ 131.834577][ T4814] device syzkaller0 entered promiscuous mode [ 131.845348][ T4813] tap0: tun_chr_ioctl cmd 1074025675 [ 131.852302][ T4813] tap0: persist enabled [ 131.981456][ T4828] device veth1_macvtap left promiscuous mode [ 132.102204][ T4838] device veth1_macvtap entered promiscuous mode [ 132.115737][ T4838] device macsec0 entered promiscuous mode [ 132.430585][ T4876] device syzkaller0 entered promiscuous mode [ 132.993824][ T4912] syz.1.1207[4912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.993876][ T4912] syz.1.1207[4912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.507313][ T4930] device sit0 left promiscuous mode [ 133.544323][ T24] audit: type=1400 audit(1763041395.259:157): avc: denied { create } for pid=4932 comm="syz.1.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 133.693151][ T4937] ÿÿÿÿÿÿ: renamed from vlan1 [ 133.770120][ T4930] device sit0 entered promiscuous mode [ 133.931260][ T24] audit: type=1400 audit(1763041395.649:158): avc: denied { read } for pid=4964 comm="syz.3.1222" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 134.067814][ T24] audit: type=1400 audit(1763041395.689:159): avc: denied { open } for pid=4964 comm="syz.3.1222" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 134.100645][ T4971] device veth1_macvtap left promiscuous mode [ 134.117842][ T4971] device macsec0 left promiscuous mode [ 134.466168][ T4987] device veth1_macvtap entered promiscuous mode [ 134.490807][ T4987] device macsec0 entered promiscuous mode [ 135.082902][ T5012] device veth1_macvtap entered promiscuous mode [ 135.094841][ T5012] device macsec0 entered promiscuous mode [ 135.111044][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 135.216052][ T5039] device wg2 left promiscuous mode [ 137.190005][ T5135] tap1: tun_chr_ioctl cmd 1074025677 [ 137.195367][ T5135] tap1: linktype set to 780 [ 137.201169][ T5135] tap1: tun_chr_ioctl cmd 2147767517 [ 137.816199][ T5155] device veth1_macvtap left promiscuous mode [ 137.837273][ T5155] device macsec0 left promiscuous mode [ 139.616166][ T5229] device pim6reg1 entered promiscuous mode [ 139.986200][ T24] audit: type=1400 audit(1763041401.699:160): avc: denied { create } for pid=5233 comm="syz.1.1295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 141.678726][ T5252] device pim6reg1 entered promiscuous mode [ 143.808764][ T5300] device syzkaller0 entered promiscuous mode [ 143.904116][ T5300] device sit0 left promiscuous mode [ 144.320303][ T5302] device sit0 entered promiscuous mode [ 146.206175][ T5378] device pim6reg1 entered promiscuous mode [ 147.106404][ T5408] cgroup: fork rejected by pids controller in /syz1 [ 147.713275][ T5422] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.847321][ T5422] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.950782][ T5422] device bridge_slave_0 entered promiscuous mode [ 148.061944][ T5422] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.101314][ T5422] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.109359][ T5422] device bridge_slave_1 entered promiscuous mode [ 148.219540][ T5431] device pim6reg1 entered promiscuous mode [ 148.280445][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.307589][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.344042][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.360252][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.382590][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.389791][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.424689][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.433918][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.448705][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.455931][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.466052][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.475126][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.504717][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.525510][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 148.551722][ T5422] device veth0_vlan entered promiscuous mode [ 148.559048][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.568146][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.576384][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.591814][ T5422] device veth1_macvtap entered promiscuous mode [ 148.599466][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 148.612773][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 148.641644][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 149.104301][ T5476] bridge0: port 2(bridge_slave_1) entered disabled state [ 149.111519][ T5476] bridge0: port 1(bridge_slave_0) entered disabled state [ 149.703765][ T5493] device veth1_macvtap left promiscuous mode [ 149.819047][ T531] device bridge_slave_1 left promiscuous mode [ 149.839379][ T5509] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 149.840213][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 150.228424][ T531] device bridge_slave_0 left promiscuous mode [ 150.234686][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 150.338069][ T531] device veth0_vlan left promiscuous mode [ 150.885872][ T5509] device veth1_to_bridge entered promiscuous mode [ 153.127734][ T5557] device sit0 left promiscuous mode [ 153.389419][ T5564] device sit0 entered promiscuous mode [ 154.395183][ T5624] device veth1_macvtap left promiscuous mode [ 154.509352][ T5633] device veth0_vlan left promiscuous mode [ 154.546117][ T5633] device veth0_vlan entered promiscuous mode [ 154.718586][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 154.737578][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 154.757615][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 154.816341][ T5645] device sit0 left promiscuous mode [ 154.855584][ T5650] device veth0_vlan left promiscuous mode [ 154.873584][ T5650] device veth0_vlan entered promiscuous mode [ 155.019696][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 155.030882][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 155.038924][ T2146] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 155.048647][ T5645] device sit0 entered promiscuous mode [ 156.094148][ T5728] device sit0 entered promiscuous mode [ 157.401056][ T5797] device pim6reg1 entered promiscuous mode [ 157.488176][ T5799] device sit0 left promiscuous mode [ 158.050692][ T5836] device veth0_vlan left promiscuous mode [ 158.115456][ T5836] device veth0_vlan entered promiscuous mode [ 158.761378][ T5895] device veth0_vlan left promiscuous mode [ 158.769413][ T5895] device veth0_vlan entered promiscuous mode [ 158.998397][ T5935] device sit0 left promiscuous mode [ 159.126354][ T5939] device sit0 entered promiscuous mode [ 159.756909][ T5961] device syzkaller0 entered promiscuous mode [ 160.236347][ T24] audit: type=1400 audit(1763041421.949:161): avc: denied { create } for pid=5969 comm="syz.0.1495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 160.434930][ T5979] device syzkaller0 entered promiscuous mode [ 160.523433][ T5991] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 160.529363][ T5991] syzkaller0: linktype set to 0 [ 162.108278][ T6117] device sit0 entered promiscuous mode [ 163.646414][ T94] udevd[94]: worker [299] terminated by signal 33 (Unknown signal 33) [ 163.692822][ T94] udevd[94]: worker [299] failed while handling '/devices/virtual/block/loop2' [ 163.960190][ T6178] device bridge_slave_1 left promiscuous mode [ 164.161255][ T6178] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.233990][ T6178] device bridge_slave_0 left promiscuous mode [ 164.282229][ T6178] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.935416][ T6245] device syzkaller0 entered promiscuous mode [ 167.307860][ T6321] device wg2 left promiscuous mode [ 167.416507][ T6318] device wg2 entered promiscuous mode [ 168.171487][ T6332] device syzkaller0 entered promiscuous mode [ 169.753172][ T6412] device wg2 entered promiscuous mode [ 170.012340][ T6429] device sit0 left promiscuous mode [ 170.185024][ T6439] device sit0 entered promiscuous mode [ 170.221506][ T6433] device veth0_vlan left promiscuous mode [ 170.237921][ T6433] device veth0_vlan entered promiscuous mode [ 170.897718][ T6495] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 170.915288][ T6495] device syzkaller0 entered promiscuous mode [ 171.054292][ T6527] device macsec0 left promiscuous mode [ 172.069325][ T6566] device syzkaller0 entered promiscuous mode [ 172.098458][ T6572] device pim6reg1 entered promiscuous mode [ 172.449858][ T6708] device pim6reg1 entered promiscuous mode [ 172.783194][ T6737] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.795443][ T6737] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.823849][ T6737] device bridge_slave_0 entered promiscuous mode [ 172.859912][ T6737] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.897802][ T6737] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.905431][ T6737] device bridge_slave_1 entered promiscuous mode [ 173.011329][ T6737] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.018510][ T6737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.025860][ T6737] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.033091][ T6737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.431794][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.461992][ T531] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.542742][ T531] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.637601][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.710129][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.730352][ T531] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.737538][ T531] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.780062][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.797836][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.817350][ T531] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.824484][ T531] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.491510][ T6780] device syzkaller0 entered promiscuous mode [ 174.583640][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.638058][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.706106][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.737458][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.757474][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 174.776093][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 174.801543][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 174.817479][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 174.852469][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 174.863933][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 174.920234][ T6737] device veth0_vlan entered promiscuous mode [ 175.046126][ T6737] device veth1_macvtap entered promiscuous mode [ 175.212780][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 175.350789][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 175.480723][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 175.686088][ T6806] device sit0 left promiscuous mode [ 176.371287][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.380822][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.389336][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 176.408196][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.133509][ T296] device bridge_slave_1 left promiscuous mode [ 177.157294][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.165340][ T296] device bridge_slave_0 left promiscuous mode [ 177.171738][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.180076][ T296] device veth1_macvtap left promiscuous mode [ 178.025962][ T6872] device team_slave_1 entered promiscuous mode [ 178.034346][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.124707][ T531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 180.234393][ T6961] device syzkaller0 entered promiscuous mode SYZFAIL: failed to send rpc fd=3 want=848 sent=0 n=-1 (errno 32: Broken pipe) [ 215.507340][ T24] audit: type=1400 audit(1763041477.219:162): avc: denied { write } for pid=267 comm="syz-executor" path="pipe:[1685]" dev="pipefs" ino=1685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 216.398089][ T2146] device veth1_macvtap left promiscuous mode [ 217.838221][ T2146] device bridge_slave_1 left promiscuous mode [ 217.844354][ T2146] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.851987][ T2146] device bridge_slave_0 left promiscuous mode [ 217.858190][ T2146] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.865901][ T2146] device bridge_slave_1 left promiscuous mode [ 217.872110][ T2146] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.879597][ T2146] device bridge_slave_0 left promiscuous mode [ 217.885818][ T2146] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.894267][ T2146] device bridge_slave_1 left promiscuous mode [ 217.900587][ T2146] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.908727][ T2146] device bridge_slave_0 left promiscuous mode [ 217.914912][ T2146] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.923626][ T2146] device veth1_macvtap left promiscuous mode [ 217.929920][ T2146] device veth0_vlan left promiscuous mode