last executing test programs: 22.12606644s ago: executing program 1 (id=591): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0xc, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x5a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x97, &(0x7f00000001c0)=""/151}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000000c0)=@framed, &(0x7f00000001c0)='GPL\x00'}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x74}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000140)=ANY=[@ANYRES64=r0], &(0x7f0000000340)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xfeffff, 0x78, 0x0, &(0x7f0000000700)="c45c573d395de5b2891a7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aa", 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)='0', 0x1}], 0x1}, 0x4040001) 21.838217144s ago: executing program 1 (id=597): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)="84e50c2506b0cb83d19600b017bb404595d60c600ae061904c7ad0257fadc0c3b4ce6437bba12c3181f2627961a82891b9854c337310d8df9f461c2e05054e7a09e10357e9da16352c0b3b958f2f798d7bdda9233e34841781507ac80ddec86544b0066fa768aef8c34e5f0f0fe9938db009281567feab78514fb5a82516654e2e26c23a9a") gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xde, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xe1}, 0x106055, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030408000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000006c0), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000700000018000000010000800000000005b69408cf024a50f511d2c2"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x6a, &(0x7f0000000280)=""/106, 0x40f00, 0xd, '\x00', r1, 0x29, r5, 0x8, &(0x7f0000000700)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0x1, 0x8000, 0x4}, 0x10, r6, r0, 0x8, &(0x7f00000007c0), &(0x7f0000000800)=[{0x3, 0x4, 0x10}, {0x5, 0x3, 0x2, 0x2}, {0x2, 0x1, 0x1, 0xf}, {0x3, 0x3, 0x9, 0x9}, {0x2, 0x3, 0xa, 0x46f6d1982efe07c5}, {0x5, 0x1, 0x5}, {0x5, 0x1, 0x5, 0x3}, {0x2, 0x1, 0xe, 0x3}], 0x10, 0x5}, 0x90) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r8}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r8, &(0x7f0000000380), &(0x7f00000009c0)=""/180}, 0x20) syz_clone(0x4b022800, &(0x7f00000038c0)="af3c34e94631a2b8bd5d35b8f18c4bbce459724b031b3446007f1f59475b5ba85fcb127b142b44ef675b5c1e350105d9d6c3fc594b76905811121e7bc51756d889a70004e06bf4a1584f917763bc612503b72cde46bafabd323f3572d9007c68d80eec3d7cd90de9d366f581e3c3ed66ff5c95180eeae099077d5f8bca4039c92ae68d726b70ed24bc0fc6464c3bcbcfedccea91baa86e5ea7e03b3865081f096a508b927ac34b71ce3de8a289db4edb0f176c522a764d84f14a1a2c4255f38c14653622362d0a78d9c35915fc98893363457ef041a9eeca62e174d485357241c6f444e89b159205b054beac1e754af90e85849fc145", 0xf6, &(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)="d95112ecfcb8ec4ff88ae2175b7eab664baa29812b8305f6e99f262664f643e11bc51693fc88672a084bb332f0874614f566a7663b09ef188c4b3aaaf1af2b102a836cbda7060745efbb") r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup(r9, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 14.754443923s ago: executing program 1 (id=597): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)="84e50c2506b0cb83d19600b017bb404595d60c600ae061904c7ad0257fadc0c3b4ce6437bba12c3181f2627961a82891b9854c337310d8df9f461c2e05054e7a09e10357e9da16352c0b3b958f2f798d7bdda9233e34841781507ac80ddec86544b0066fa768aef8c34e5f0f0fe9938db009281567feab78514fb5a82516654e2e26c23a9a") gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xde, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xe1}, 0x106055, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030408000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000006c0), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000700000018000000010000800000000005b69408cf024a50f511d2c2"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x6a, &(0x7f0000000280)=""/106, 0x40f00, 0xd, '\x00', r1, 0x29, r5, 0x8, &(0x7f0000000700)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0x1, 0x8000, 0x4}, 0x10, r6, r0, 0x8, &(0x7f00000007c0), &(0x7f0000000800)=[{0x3, 0x4, 0x10}, {0x5, 0x3, 0x2, 0x2}, {0x2, 0x1, 0x1, 0xf}, {0x3, 0x3, 0x9, 0x9}, {0x2, 0x3, 0xa, 0x46f6d1982efe07c5}, {0x5, 0x1, 0x5}, {0x5, 0x1, 0x5, 0x3}, {0x2, 0x1, 0xe, 0x3}], 0x10, 0x5}, 0x90) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r8}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r8, &(0x7f0000000380), &(0x7f00000009c0)=""/180}, 0x20) syz_clone(0x4b022800, &(0x7f00000038c0)="af3c34e94631a2b8bd5d35b8f18c4bbce459724b031b3446007f1f59475b5ba85fcb127b142b44ef675b5c1e350105d9d6c3fc594b76905811121e7bc51756d889a70004e06bf4a1584f917763bc612503b72cde46bafabd323f3572d9007c68d80eec3d7cd90de9d366f581e3c3ed66ff5c95180eeae099077d5f8bca4039c92ae68d726b70ed24bc0fc6464c3bcbcfedccea91baa86e5ea7e03b3865081f096a508b927ac34b71ce3de8a289db4edb0f176c522a764d84f14a1a2c4255f38c14653622362d0a78d9c35915fc98893363457ef041a9eeca62e174d485357241c6f444e89b159205b054beac1e754af90e85849fc145", 0xf6, &(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)="d95112ecfcb8ec4ff88ae2175b7eab664baa29812b8305f6e99f262664f643e11bc51693fc88672a084bb332f0874614f566a7663b09ef188c4b3aaaf1af2b102a836cbda7060745efbb") r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup(r9, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 9.686106832s ago: executing program 1 (id=597): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)="84e50c2506b0cb83d19600b017bb404595d60c600ae061904c7ad0257fadc0c3b4ce6437bba12c3181f2627961a82891b9854c337310d8df9f461c2e05054e7a09e10357e9da16352c0b3b958f2f798d7bdda9233e34841781507ac80ddec86544b0066fa768aef8c34e5f0f0fe9938db009281567feab78514fb5a82516654e2e26c23a9a") gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xde, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xe1}, 0x106055, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030408000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000006c0), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000700000018000000010000800000000005b69408cf024a50f511d2c2"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x6a, &(0x7f0000000280)=""/106, 0x40f00, 0xd, '\x00', r1, 0x29, r5, 0x8, &(0x7f0000000700)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0x1, 0x8000, 0x4}, 0x10, r6, r0, 0x8, &(0x7f00000007c0), &(0x7f0000000800)=[{0x3, 0x4, 0x10}, {0x5, 0x3, 0x2, 0x2}, {0x2, 0x1, 0x1, 0xf}, {0x3, 0x3, 0x9, 0x9}, {0x2, 0x3, 0xa, 0x46f6d1982efe07c5}, {0x5, 0x1, 0x5}, {0x5, 0x1, 0x5, 0x3}, {0x2, 0x1, 0xe, 0x3}], 0x10, 0x5}, 0x90) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r8}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r8, &(0x7f0000000380), &(0x7f00000009c0)=""/180}, 0x20) syz_clone(0x4b022800, &(0x7f00000038c0)="af3c34e94631a2b8bd5d35b8f18c4bbce459724b031b3446007f1f59475b5ba85fcb127b142b44ef675b5c1e350105d9d6c3fc594b76905811121e7bc51756d889a70004e06bf4a1584f917763bc612503b72cde46bafabd323f3572d9007c68d80eec3d7cd90de9d366f581e3c3ed66ff5c95180eeae099077d5f8bca4039c92ae68d726b70ed24bc0fc6464c3bcbcfedccea91baa86e5ea7e03b3865081f096a508b927ac34b71ce3de8a289db4edb0f176c522a764d84f14a1a2c4255f38c14653622362d0a78d9c35915fc98893363457ef041a9eeca62e174d485357241c6f444e89b159205b054beac1e754af90e85849fc145", 0xf6, &(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)="d95112ecfcb8ec4ff88ae2175b7eab664baa29812b8305f6e99f262664f643e11bc51693fc88672a084bb332f0874614f566a7663b09ef188c4b3aaaf1af2b102a836cbda7060745efbb") r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup(r9, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 4.186032677s ago: executing program 1 (id=597): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)="84e50c2506b0cb83d19600b017bb404595d60c600ae061904c7ad0257fadc0c3b4ce6437bba12c3181f2627961a82891b9854c337310d8df9f461c2e05054e7a09e10357e9da16352c0b3b958f2f798d7bdda9233e34841781507ac80ddec86544b0066fa768aef8c34e5f0f0fe9938db009281567feab78514fb5a82516654e2e26c23a9a") gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xde, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xe1}, 0x106055, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030408000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000006c0), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000700000018000000010000800000000005b69408cf024a50f511d2c2"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x6a, &(0x7f0000000280)=""/106, 0x40f00, 0xd, '\x00', r1, 0x29, r5, 0x8, &(0x7f0000000700)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0x1, 0x8000, 0x4}, 0x10, r6, r0, 0x8, &(0x7f00000007c0), &(0x7f0000000800)=[{0x3, 0x4, 0x10}, {0x5, 0x3, 0x2, 0x2}, {0x2, 0x1, 0x1, 0xf}, {0x3, 0x3, 0x9, 0x9}, {0x2, 0x3, 0xa, 0x46f6d1982efe07c5}, {0x5, 0x1, 0x5}, {0x5, 0x1, 0x5, 0x3}, {0x2, 0x1, 0xe, 0x3}], 0x10, 0x5}, 0x90) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r8}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r8, &(0x7f0000000380), &(0x7f00000009c0)=""/180}, 0x20) syz_clone(0x4b022800, &(0x7f00000038c0)="af3c34e94631a2b8bd5d35b8f18c4bbce459724b031b3446007f1f59475b5ba85fcb127b142b44ef675b5c1e350105d9d6c3fc594b76905811121e7bc51756d889a70004e06bf4a1584f917763bc612503b72cde46bafabd323f3572d9007c68d80eec3d7cd90de9d366f581e3c3ed66ff5c95180eeae099077d5f8bca4039c92ae68d726b70ed24bc0fc6464c3bcbcfedccea91baa86e5ea7e03b3865081f096a508b927ac34b71ce3de8a289db4edb0f176c522a764d84f14a1a2c4255f38c14653622362d0a78d9c35915fc98893363457ef041a9eeca62e174d485357241c6f444e89b159205b054beac1e754af90e85849fc145", 0xf6, &(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)="d95112ecfcb8ec4ff88ae2175b7eab664baa29812b8305f6e99f262664f643e11bc51693fc88672a084bb332f0874614f566a7663b09ef188c4b3aaaf1af2b102a836cbda7060745efbb") r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup(r9, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 3.615948334s ago: executing program 4 (id=736): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) write$cgroup_int(r2, &(0x7f00000001c0), 0xfffffdef) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001280)={0x18, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000046000000000000000000000095"], &(0x7f0000000440)='GPL\x00'}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000540)='ext4_ext_convert_to_initialized_enter\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) ioctl$TUNSETOFFLOAD(r5, 0x541b, 0x2000ff00) write$cgroup_subtree(r0, &(0x7f0000001340)=ANY=[], 0x1a000) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x2, 0x1, 0x1, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000025c0)={{r8}, &(0x7f0000002540), &(0x7f0000002580)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r8}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) r9 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x3c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000}, 0x48) 3.482575245s ago: executing program 0 (id=738): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x78}}, &(0x7f0000000480)='syzkaller\x00'}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x0, 0x1}, 0x48) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000d80)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4902c0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 3.170151513s ago: executing program 0 (id=742): r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0xe6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000002c0), 0x8, 0x8000006a, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x20000000, 0x10000, 0x100, 0x2010, 0x1, 0x81, '\x00', 0x0, r3, 0x0, 0x5, 0x7, 0x4}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280), 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x7, &(0x7f0000000700)=ANY=[@ANYBLOB="0500000000000000691165000000000085100000050000001800000009000000000000001f0000de95000000000000009500a50500000000"], &(0x7f0000000740)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x6}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000500000085000000500000002f000000ab0100001800000000000000000000000000000095000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r7, 0x58, &(0x7f0000000600)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x7}, 0x8) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xf) 2.689094457s ago: executing program 2 (id=743): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffd2a) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x13502, 0x0, 0xfffffffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xf3, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xea, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9febbd376000020000000000"], 0x0, 0x1a}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x4, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r6}, 0x10) write$cgroup_type(r4, &(0x7f0000000140), 0x9) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x98, '\x00', r2, r3, 0x3, 0x2, 0x4}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f2, &(0x7f0000000080)) 2.688601917s ago: executing program 4 (id=744): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='!~u<-0&|!') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000000000000000000000000000007fffffff0001"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b70800d6b931d3bd92057c51936b00000000007b8a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0xa2, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) r3 = getpid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x4, 0x8}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r4}, 0x48) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="660a0000000000007910a8000000000018100000", @ANYRES32=r5, @ANYBLOB="00000000f0ff00"/16], &(0x7f0000000000)='GPL\x00'}, 0x80) r7 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r3, r7, 0x0, 0x0, 0x0}, 0x30) ioctl$TUNSETOFFLOAD(r2, 0x40086607, 0x20001419) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000500000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfefc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8f6eb968f200e011ea665c45a34b8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8f23e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae0000c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da09fe8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c31082ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a3d19c158a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b884057aeb68f3d675a79907a72ace70902459f6950a06a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb511164f1502ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbd488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc816df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d044fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c52be71d780c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f9863800f127d6b4518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c104fe52837a19dd6952fe2724c0105ab158a54a6a73000000000000000000"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r8, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000300)="0000000000000000000200000000", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x5, 0xb68, 0x4, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7}, 0x48) 2.457664583s ago: executing program 0 (id=746): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x7fe2, 0x2}, 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001100), 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r8}, 0xc) r10 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000180)={r0, &(0x7f0000000140)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x69, 0x11, 0x4b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, r10, 0x108fdc83, '\x00', r9, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8922, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r11 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000800)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018140000", @ANYRES32=r11, @ANYBLOB="00000000000000001600000001000000180000000000000000000000000000009500000000000000360a000000000000180200002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000720afbff0000000485000000060000009500000000000000d582a27ce32b3947c7c45798672fcaf17e2b51e4404c630e959cc93ee9330cfe642b3f8ba76956f1fc3004640135562bf8621156cc6699e3075b151c08388c0ca3aeff2b52cdca7798f1354cf55fc4a3dcec3062ac8d686ad3dd8a4b4a7fda190a97bea718"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x78) 2.170868437s ago: executing program 4 (id=748): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2}, 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000300)={0x1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0], 0x0, 0x4a, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x35, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x12, 0x26, &(0x7f0000000700)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6c200000}}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x40}, @exit, @ldst={0x1, 0x3, 0x3, 0x1, 0x4, 0x80, 0x10}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000840)='syzkaller\x00', 0x400, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, &(0x7f00000008c0)=[0xffffffffffffffff, 0x1, 0x1], &(0x7f0000000900)=[{0x5, 0x1, 0xf, 0xe}, {0x0, 0x2, 0x10, 0xb}, {0x4, 0x3, 0x1, 0x6}, {0x1, 0x1, 0x9, 0x5}], 0x10, 0x7}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x13, 0xb, &(0x7f0000000100)=@raw=[@ldst={0x1, 0x3, 0x0, 0x7, 0x9, 0xfffffffffffffff0, 0xf10c0d41b4213ba5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @alu={0x7, 0x1, 0x9, 0x6, 0x3, 0x80, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000180)='GPL\x00', 0x100, 0x84, &(0x7f00000001c0)=""/132, 0x41000, 0x34, '\x00', r3, 0x1f, r4, 0x8, &(0x7f0000000380)={0x6, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x6, 0x0, 0xc20}, 0x10, r6, r7, 0x0, &(0x7f0000000a00)=[0x1], 0x0, 0x10, 0x6}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1, 0xf, &(0x7f0000000b00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000b80)='GPL\x00', 0xb8, 0xb8, &(0x7f0000000bc0)=""/184, 0x41100, 0x4, '\x00', r5, 0x8, r4, 0x8, &(0x7f0000000c80)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000cc0)={0x3, 0xf, 0x8, 0x7}, 0x10, r6, r7, 0x3, &(0x7f0000000d40)=[r1, r1, r8], &(0x7f0000000d80)=[{0x0, 0x1, 0x4, 0x8}, {0x5, 0x2, 0xd, 0x4}, {0x2, 0x4, 0x6, 0xa}], 0x10, 0xb}, 0x90) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80), 0x80, 0x0) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001080)=@bpf_tracing={0x1a, 0x18, &(0x7f0000000ec0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x2}, @generic={0x2, 0x5, 0x0, 0x0, 0x3}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x4}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffff8}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffff9}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], &(0x7f0000000f80)='syzkaller\x00', 0x0, 0x8, &(0x7f0000000fc0)=""/8, 0x41000, 0x31, '\x00', r5, 0x18, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001000)={0x5, 0x4, 0x80000000, 0x401}, 0x10, 0x1f569, r7, 0x0, &(0x7f0000001040)=[r8, r0, r8, r0], 0x0, 0x10, 0x1}, 0x90) ioctl$TUNSETSTEERINGEBPF(r9, 0x800454e0, &(0x7f0000001140)=r10) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000001180), 0x8) r12 = openat$cgroup_ro(r11, &(0x7f00000011c0)='blkio.bfq.io_queued\x00', 0x0, 0x0) openat$cgroup_procs(r11, &(0x7f0000001200)='cgroup.threads\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001280)={r2, 0x9, 0x10}, 0xc) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001600)={&(0x7f0000001500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0xc, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x2e, 0x61, 0x2e]}}, &(0x7f0000001540)=""/136, 0x29, 0x88, 0x0, 0x4}, 0x20) r16 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001740)={0x11, 0x22, &(0x7f00000012c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@ldst={0x3, 0x2, 0x4, 0x2, 0x6, 0x59, 0x8}, @alu={0x7, 0x1, 0xc, 0x7, 0x3, 0xfffffffffffffffc, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, r14, 0x0, 0x0, 0x0, 0xb4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x1}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001400)='syzkaller\x00', 0x8, 0xa7, &(0x7f0000001440)=""/167, 0x40f00, 0x58, '\x00', r5, 0x0, r15, 0x8, &(0x7f0000001640)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000001680)={0x5, 0x2, 0x3d5}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000016c0)=[r12], &(0x7f0000001700)=[{0x2, 0x3, 0x6, 0x7}], 0x10, 0x2}, 0x90) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000001800)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001ac0)={r14, 0x58, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r18 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b80)={r2, 0x0, 0xc}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001c40)={0x6, 0x2e, &(0x7f0000001840)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @generic={0x1, 0x0, 0x2, 0x7ff, 0x40}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7}}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x6f2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc96d}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7f}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r12}}], &(0x7f00000019c0)='GPL\x00', 0xf1, 0x35, &(0x7f0000001a00)=""/53, 0x40f00, 0x0, '\x00', r17, 0x1d, r12, 0x8, &(0x7f0000001b00)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001b40)={0x4, 0x3, 0x8, 0x5}, 0x10, r6, r16, 0x2, &(0x7f0000001bc0)=[r18, r1, r12, r15, r0, r12], &(0x7f0000001c00)=[{0x2, 0x2, 0x4, 0x8}, {0x2, 0x4, 0xd, 0x2}], 0x10, 0x9}, 0x90) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, &(0x7f0000001d00)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001fc0)={r16, 0x0, 0x66, 0xb9, &(0x7f0000001d40)="8b5c0db0d44194c4a8e99b8630112199266367e68150ea8705398d95f50fc39d17bad27511fd472b5891a9176c16b3f3478e38c8d32e84a281313dfd8ffdf923a364044976ae867e0e18f4a97e5e012ed4447af4a331abda0616ba448511d238e584f478499e", &(0x7f0000001dc0)=""/185, 0x7fffffff, 0x0, 0x4f, 0xc0, &(0x7f0000001e80)="cba21808554d6377f73e6c56ff0cb151a0131455b7f7e04b7eb836122059ec99c3ae098a494b9c2de7fd13102fa8b5d70cd535348430b2026308dd28ec52e86980ca57fcb843650957c08d75f24959", &(0x7f0000001f00)="b0919179b5d63798130385e652dc99cad3bf3383b5356d33aee8a4696bb9ae853854db1170a956155d03c6f19929893cc52bf9b48b87b3a414a6f9de5a935b493b7b980a30ab15e733f80bf8598266e097729c9fd51ff3b45c73aa79e7438acbbf84a19910c40e4ac7679fa9cd825038aa81c768963783e4f57f5730d6f4af1e04ff03ef25ff06a7700bd65a5817ebd08f6e7b2e0fb910d9fd8beb69933eb36e4c35b0b17eb470368cb45b7077421968426d6a5e79ad0dddfa2d19c127a1635c", 0x1, 0x0, 0x8}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000020c0)={{r14, 0xffffffffffffffff}, &(0x7f0000002040), &(0x7f0000002080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002380)={0x20, 0x14, &(0x7f0000002100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r19}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000021c0)='syzkaller\x00', 0x0, 0x3c, &(0x7f0000002200)=""/60, 0x41000, 0x50, '\x00', r3, 0x2a, r11, 0x8, &(0x7f0000002240)={0x1, 0x5}, 0x8, 0x10, 0x0, 0x0, r6, r12, 0x9, &(0x7f0000002280)=[r11, r0, r18, r0, r1], &(0x7f00000022c0)=[{0x0, 0x1, 0xa, 0x2}, {0x1, 0x4, 0x7, 0x3}, {0x2, 0x1, 0xa, 0x5}, {0x0, 0x4, 0xc, 0x8}, {0x3, 0x5, 0x6, 0x3}, {0x1, 0x5, 0x9}, {0x1, 0x2, 0x0, 0xc}, {0x2, 0x2, 0x2, 0x9}, {0x4, 0x5, 0xb, 0x2}], 0x10, 0xcabe}, 0x90) r20 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002480)={&(0x7f0000002440)='vm_unmapped_area\x00', r1}, 0x10) r21 = perf_event_open$cgroup(&(0x7f0000002500)={0x4, 0x80, 0x20, 0x0, 0x0, 0x4, 0x0, 0x20, 0x88200, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f00000024c0), 0xe}, 0x1, 0xc43e, 0xa58a, 0x5, 0x1, 0x9, 0x1000, 0x0, 0x1e41, 0x0, 0x7fff}, r12, 0xc, r20, 0xc2111959f1aa8cd0) ioctl$PERF_EVENT_IOC_PERIOD(r21, 0x40082404, &(0x7f0000002580)=0x6a52) 1.960263849s ago: executing program 2 (id=750): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x16060}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000003c0), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x13, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003880)=ANY=[@ANYBLOB="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"], 0x2008}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb010018000000000000000c00006500000000020000000000000000000009000000050000f473fe93ec2ce68e89723cc43660fb244f5b730c2302bacd8540d9d0bf2c2b49decb962aef0db97a22c527c2dab99968f9489dabfc57853edfd03690fbf0fbed5ca68b22"], 0x0, 0x26}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x800}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r2, &(0x7f0000000840), 0x2, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000300), 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0xfdef) 1.873702842s ago: executing program 3 (id=751): perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x5c}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0xd6, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000640)=@generic={&(0x7f0000000200)='./file0/file0\x00', r0}, 0x18) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001040)) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000180)=@base={0x1, 0x100, 0xfc, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_PROG_GET_NEXT_ID(0x6, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) 1.873291922s ago: executing program 4 (id=752): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000200)={'caif0\x00', 0x400}) (fail_nth: 4) 1.802631483s ago: executing program 0 (id=753): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3e}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_free_batched\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f00000003c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r3, 0x58, &(0x7f0000000a40)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0x0, 0x800004}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xd, &(0x7f00000001c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000280)='syzkaller\x00', 0x3f, 0x37, &(0x7f00000002c0)=""/55, 0x0, 0x10, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x4, 0x4, 0x0, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1, r1, r1, r1, r1, 0xffffffffffffffff], 0x0, 0x10, 0x55}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f00000007c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000800), 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) 1.654697976s ago: executing program 2 (id=754): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) (async) ioctl$TUNSETOFFLOAD(r1, 0x40086607, 0x20001412) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x6, &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4a, &(0x7f0000000680)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000006c0), &(0x7f0000000780), 0x8, 0x5a, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x8, [@struct={0x6, 0x7, 0x0, 0x4, 0x1, 0xfffffbd6, [{0xe, 0x2, 0x5e}, {0x7, 0x4, 0x3}, {0xb, 0x2, 0x3f}, {0x8, 0x2, 0x6}, {0xb, 0x2, 0x80}, {0x2, 0x3, 0xfffffff9}, {0x2, 0x0, 0x80000000}]}, @func={0x10, 0x0, 0x0, 0xc, 0x4}, @restrict={0xe, 0x0, 0x0, 0xb, 0x4}, @ptr={0xb, 0x0, 0x0, 0x2, 0x1}, @volatile={0x10, 0x0, 0x0, 0x9, 0x3}, @func={0x7, 0x0, 0x0, 0xc, 0x1}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0x40, 0x0, 0x9, 0x3}, @ptr={0xe}]}, {0x0, [0x30, 0x0, 0x5f, 0x0, 0x2e, 0x61]}}, &(0x7f0000000a40)=""/170, 0xd8, 0xaa, 0x0, 0x4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e80)={0xffffffffffffffff, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000bc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000c00)=[0x0], &(0x7f0000000c40)=[0x0, 0x0], 0x0, 0x91, &(0x7f0000000c80)=[{}], 0x8, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xf6, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e80)={0xffffffffffffffff, 0xe0, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000bc0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000c00)=[0x0], &(0x7f0000000c40)=[0x0, 0x0], 0x0, 0x91, &(0x7f0000000c80)=[{}], 0x8, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xf6, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000f00)=@generic={&(0x7f0000000ec0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x1, 0x12, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000140)='GPL\x00', 0x1d5, 0xaf, &(0x7f0000000500)=""/175, 0x41000, 0x28, '\x00', r2, 0x10, r3, 0x8, &(0x7f0000000b40)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x10, 0x5, 0xb4c}, 0x10, r4, r5, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x1, 0x12, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@map_idx_val={0x18, 0x5, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x101}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000140)='GPL\x00', 0x1d5, 0xaf, &(0x7f0000000500)=""/175, 0x41000, 0x28, '\x00', r2, 0x10, r3, 0x8, &(0x7f0000000b40)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x10, 0x5, 0xb4c}, 0x10, r4, r5, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b4000000000000006111800000000000170000"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r6 = syz_clone(0x800, &(0x7f0000001340)="38833dcee5f652e4213837902beab5103bfd039811ea04e56e5bde8130094e93bb14353c5af76e908ce69ee86096e2a60b511d316bc0dd508c37f481e732c2eb", 0x40, &(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)="59abe0660e6afa326e46d592e1f7eef016") perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x26121, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x5e6}, r6, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r7, 0x40086602, 0x87dc72b1640eee1e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001040)={r6, r7, 0x0, 0x1, &(0x7f0000001000)='\x00'}, 0x30) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001040)={r6, r7, 0x0, 0x1, &(0x7f0000001000)='\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x9f}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @union={0x0, 0x0, 0x0, 0xd}, @restrict]}}, &(0x7f0000000180)=""/253, 0x3e, 0xfd, 0x1}, 0x20) 1.5639057s ago: executing program 0 (id=755): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) write$cgroup_devices(r0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0xffdd) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5}}]}}, &(0x7f0000000800)=""/227, 0x32, 0xe3, 0x8}, 0x20) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x8, [@fwd={0x9}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x1a, 0x0, 0x42}, @restrict={0x3, 0x0, 0x0, 0xb, 0x2}, @func={0xa, 0x0, 0x0, 0xc, 0x1}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x17, 0x0, 0x77, 0x1}]}, {0x0, [0x30, 0x0, 0x5f, 0x61, 0x2e, 0x30]}}, &(0x7f00000000c0)=""/56, 0x64, 0x38, 0x0, 0x38e8}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={r2, 0x20, &(0x7f0000000480)={&(0x7f00000002c0)=""/171, 0xab, 0x0, &(0x7f0000000380)=""/252, 0xfc}}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x29, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5421, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000061122000000000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.449586597s ago: executing program 4 (id=756): r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200), 0x0, 0xe6, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000002c0), 0x8, 0x8000006a, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x20000000, 0x10000, 0x100, 0x2010, 0x1, 0x81, '\x00', 0x0, r3, 0x0, 0x5, 0x7, 0x4}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000280), 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xb, 0x7, &(0x7f0000000700)=ANY=[@ANYBLOB="0500000000000000691165000000000085100000050000001800000009000000000000001f0000de95000000000000009500a50500000000"], &(0x7f0000000740)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, r4, 0x6}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40086602, &(0x7f0000000180)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xf, 0x9, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000500000085000000500000002f000000ab0100001800000000000000000000000000000095000000000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={r7, 0x58, &(0x7f0000000600)}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x7}, 0x8) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[], 0xf) 1.447640188s ago: executing program 3 (id=757): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x14, 0xf, &(0x7f0000000f40)=@ringbuf={{0x18, 0x8, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x2}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000d00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.346659994s ago: executing program 2 (id=758): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x2d}]}) 1.121855718s ago: executing program 3 (id=759): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001200)=ANY=[@ANYBLOB="9feb01001a"], &(0x7f0000000140)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x3e}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 1.037659161s ago: executing program 3 (id=760): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfffffd2a) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x13502, 0x0, 0xfffffffd}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], 0x0, 0xf3, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xea, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9febbd376000020000000000"], 0x0, 0x1a}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x5, 0x4, 0x3, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='scsi_dispatch_cmd_start\x00', r6}, 0x10) write$cgroup_type(r4, &(0x7f0000000140), 0x9) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x98, '\x00', r2, r3, 0x3, 0x2, 0x4}, 0x48) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f2, &(0x7f0000000080)) 822.353224ms ago: executing program 0 (id=761): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r1], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r0}, &(0x7f0000000280), &(0x7f0000000300)='%-5lx \x00'}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="7a0a00ff0000000071cc42eb20bb77c8107800000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="7a0a00070000000071106f00000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x10) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000280)={'ipvlan0\x00'}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r6, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x3, 0x8, 0x40bb, 0x4, 0x0, 0xffffffffffffffff, 0x3, '\x00', r7, r5, 0x2}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000500)={r4, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x10001}, [@generic={0x4, 0xc, 0x0, 0x6d9, 0x2c1b}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xe}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0xba, &(0x7f0000000380)=""/186, 0x40f00, 0xdd767ad6ec77a937, '\x00', r7, 0x25, r3, 0x8, &(0x7f0000000240)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x4, 0x4, 0x10001}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000540)=[r8, r0, r0], &(0x7f0000000580)=[{0x4, 0x2, 0xe, 0x9}, {0x1, 0x1, 0x5, 0xa}], 0x10, 0x9}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x8, 0x0, 0x1}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r6, 0x20, &(0x7f00000006c0)={&(0x7f0000000dc0)=""/4096, 0x1000, 0x0, &(0x7f00000008c0)=""/243, 0xf3}}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000d80)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4902c0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 162.559725ms ago: executing program 2 (id=762): ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x1, 0x11000000, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x48) 112.640563ms ago: executing program 2 (id=763): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x9, 0x2, 0x9}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f0000000bc0), 0x0}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'ip6_vti0\x00', @local}) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="8fedcb5d07081175f37538e488ca"], 0xe) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(0x0, 0x0, 0x40, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="b405ab0bc58b00007910a80000000000150000000000000095000000000000005bd7795ced200e680bd8818dd12d52f6fc89be93189b798f7f2d1ce1e2538257119bc0988f569a7161ab3ccd402e591574346ed74c20a5b6ce14dcccd176d89c93470a5beaa7f5c3fad813f5165d56ac1de5d38967a40b61a200c19da66794a7c6a8900afb363145b3006a7457da3fc6f66dcc5f980a817b0013dfb7baebc59633c1ee9aad61c36acca70e3109672cad352d4341d6a4b0c76db5c117f01df48cced9648c4fd9b4a04472f2c66a64045064b3578ae1ad2eb0a58f5ecb46a6a4e0de82d07e4349d7c4e3a50e59174058"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x268, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0xffffffffffffffee}, 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x92}, 0x48) 79.585288ms ago: executing program 3 (id=764): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}}, &(0x7f0000000180)=""/253, 0x26, 0xfd, 0x1}, 0x20) 564.501µs ago: executing program 4 (id=765): openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f}, 0x48) (async, rerun: 64) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="61084d4c8ceece0d"], 0x8) (async, rerun: 64) r1 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x600, 0x0, 0xfffffff7}, r1, 0xffffffffffffffff, r0, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x7e}, {}]}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_1\x00', 0x1}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8924, &(0x7f0000000080)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="9ffb010018210000161000bd000000000009030000000000070000000000000000000024b45ccbc1b67e40c4195ac3f8075a3943065a56e37751b49733ae6134a29547760a6caf81e41b3f1dda37e2c36f4a30e75b0accaba9b81cf288eefb985c696b417c2d7d1bc302a83cbccd198d472e467773a36d050f7003766947b19716e8e7d4af934d2737998efed976e302db400ab5b0e6a5112730"], &(0x7f0000000180)=""/253, 0xfffffffffffffea7, 0xfd, 0x1}, 0x20) 197.241µs ago: executing program 1 (id=597): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000003700), &(0x7f0000003740), &(0x7f0000003780)="84e50c2506b0cb83d19600b017bb404595d60c600ae061904c7ad0257fadc0c3b4ce6437bba12c3181f2627961a82891b9854c337310d8df9f461c2e05054e7a09e10357e9da16352c0b3b958f2f798d7bdda9233e34841781507ac80ddec86544b0066fa768aef8c34e5f0f0fe9938db009281567feab78514fb5a82516654e2e26c23a9a") gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000300)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f00000003c0)=[{}], 0x8, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xde, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xe1}, 0x106055, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102030408000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000006c0), 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000780)={0x4, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000700000018000000010000800000000005b69408cf024a50f511d2c2"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x6a, &(0x7f0000000280)=""/106, 0x40f00, 0xd, '\x00', r1, 0x29, r5, 0x8, &(0x7f0000000700)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0x1, 0x8000, 0x4}, 0x10, r6, r0, 0x8, &(0x7f00000007c0), &(0x7f0000000800)=[{0x3, 0x4, 0x10}, {0x5, 0x3, 0x2, 0x2}, {0x2, 0x1, 0x1, 0xf}, {0x3, 0x3, 0x9, 0x9}, {0x2, 0x3, 0xa, 0x46f6d1982efe07c5}, {0x5, 0x1, 0x5}, {0x5, 0x1, 0x5, 0x3}, {0x2, 0x1, 0xe, 0x3}], 0x10, 0x5}, 0x90) r7 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='pids.max\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r8}, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000800)={r8, &(0x7f0000000380), &(0x7f00000009c0)=""/180}, 0x20) syz_clone(0x4b022800, &(0x7f00000038c0)="af3c34e94631a2b8bd5d35b8f18c4bbce459724b031b3446007f1f59475b5ba85fcb127b142b44ef675b5c1e350105d9d6c3fc594b76905811121e7bc51756d889a70004e06bf4a1584f917763bc612503b72cde46bafabd323f3572d9007c68d80eec3d7cd90de9d366f581e3c3ed66ff5c95180eeae099077d5f8bca4039c92ae68d726b70ed24bc0fc6464c3bcbcfedccea91baa86e5ea7e03b3865081f096a508b927ac34b71ce3de8a289db4edb0f176c522a764d84f14a1a2c4255f38c14653622362d0a78d9c35915fc98893363457ef041a9eeca62e174d485357241c6f444e89b159205b054beac1e754af90e85849fc145", 0xf6, &(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)="d95112ecfcb8ec4ff88ae2175b7eab664baa29812b8305f6e99f262664f643e11bc51693fc88672a084bb332f0874614f566a7663b09ef188c4b3aaaf1af2b102a836cbda7060745efbb") r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='ext4_alloc_da_blocks\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) openat$cgroup(r9, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) 0s ago: executing program 3 (id=766): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3e}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffff7f850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mm_page_free_batched\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000e80), 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, &(0x7f00000003c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0x7c, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r3, 0x58, &(0x7f0000000a40)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0x0, 0x800004}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xd, &(0x7f00000001c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000280)='syzkaller\x00', 0x3f, 0x37, &(0x7f00000002c0)=""/55, 0x0, 0x10, '\x00', r4, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x4, 0x4, 0x0, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[r1, r1, r1, r1, r1, 0xffffffffffffffff], 0x0, 0x10, 0x55}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000700)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f0000000740)=[0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xf0, &(0x7f00000007c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000800), 0x0, 0x0, 0x0, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) kernel console output (not intermixed with test programs): [ 21.000491][ T23] audit: type=1400 audit(1719611658.100:62): avc: denied { noatsecure } for pid=287 comm="sshd" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.007671][ T23] audit: type=1400 audit(1719611658.100:63): avc: denied { write } for pid=287 comm="sh" path="pipe:[10620]" dev="pipefs" ino=10620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 21.024732][ T23] audit: type=1400 audit(1719611658.100:64): avc: denied { rlimitinh } for pid=287 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.047898][ T23] audit: type=1400 audit(1719611658.100:65): avc: denied { siginh } for pid=287 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.0.195' (ED25519) to the list of known hosts. [ 28.279894][ T23] audit: type=1400 audit(1719611665.390:66): avc: denied { mounton } for pid=342 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 28.284806][ T342] cgroup1: Unknown subsys name 'net' [ 28.303738][ T23] audit: type=1400 audit(1719611665.390:67): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.308783][ T342] cgroup1: Unknown subsys name 'net_prio' [ 28.336562][ T342] cgroup1: Unknown subsys name 'devices' [ 28.344392][ T23] audit: type=1400 audit(1719611665.450:68): avc: denied { unmount } for pid=342 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 28.518667][ T342] cgroup1: Unknown subsys name 'hugetlb' [ 28.524752][ T342] cgroup1: Unknown subsys name 'rlimit' [ 28.718643][ T23] audit: type=1400 audit(1719611665.820:69): avc: denied { setattr } for pid=342 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=9263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 28.742138][ T23] audit: type=1400 audit(1719611665.820:70): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 28.767078][ T23] audit: type=1400 audit(1719611665.820:71): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 28.784756][ T344] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 28.801053][ T23] audit: type=1400 audit(1719611665.900:72): avc: denied { relabelto } for pid=344 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.826612][ T23] audit: type=1400 audit(1719611665.910:73): avc: denied { write } for pid=344 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.864103][ T23] audit: type=1400 audit(1719611665.970:74): avc: denied { read } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.890227][ T23] audit: type=1400 audit(1719611665.970:75): avc: denied { open } for pid=342 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 28.960391][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.752743][ T356] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.759748][ T356] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.768072][ T356] device bridge_slave_0 entered promiscuous mode [ 29.775428][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.782906][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.791204][ T353] device bridge_slave_0 entered promiscuous mode [ 29.816344][ T356] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.823534][ T356] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.831822][ T356] device bridge_slave_1 entered promiscuous mode [ 29.838541][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.845967][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.854230][ T353] device bridge_slave_1 entered promiscuous mode [ 29.909611][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.916547][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.925207][ T354] device bridge_slave_0 entered promiscuous mode [ 29.942254][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.949156][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.957336][ T354] device bridge_slave_1 entered promiscuous mode [ 30.184688][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.191787][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.199715][ T355] device bridge_slave_0 entered promiscuous mode [ 30.222111][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.229164][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.237489][ T352] device bridge_slave_0 entered promiscuous mode [ 30.245977][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.253597][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.261870][ T352] device bridge_slave_1 entered promiscuous mode [ 30.268824][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.275822][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.284006][ T355] device bridge_slave_1 entered promiscuous mode [ 30.928285][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.936996][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.969625][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.978341][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.015526][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.024573][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.033881][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.040729][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.048620][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.057713][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.066142][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.073004][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.080336][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.088841][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.097317][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.105907][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.114603][ T373] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.121491][ T373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.129087][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.137186][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.172424][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.181241][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.190048][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.197045][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.204829][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.213289][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.221018][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.229885][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.238246][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.245151][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.252670][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.261205][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.269957][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.276838][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.284550][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 31.292308][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 31.300390][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.308981][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.341412][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.350265][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.360463][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.367500][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.375998][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 31.384706][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 31.393006][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.399846][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 31.407323][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.415984][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.424248][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.433164][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.441550][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.448582][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.456196][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.465015][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.475280][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 31.501609][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 31.510456][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 31.519417][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.526332][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 31.558342][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.567426][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.575830][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.585823][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.601569][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 31.610075][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.643175][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.652244][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.680508][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.704621][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 31.713553][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.731747][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 31.740251][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 31.749016][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.758746][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.804288][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.815535][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.824847][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.834781][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 31.843665][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.852178][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.871601][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.880035][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.889399][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 31.900759][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 31.942619][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 31.951088][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 31.971399][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 31.980210][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.001385][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.010008][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.021386][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 32.030177][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 32.051389][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.059752][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.068801][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.078279][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.116078][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.125205][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.137122][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.145779][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.183922][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.192657][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.201161][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.211365][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.219844][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 32.228797][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 32.236980][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.245575][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 32.270331][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.280369][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.311637][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.320206][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.381343][ C1] hrtimer: interrupt took 35476 ns [ 32.411662][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 32.420222][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 32.700248][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 32.710327][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 32.748479][ T387] bridge0: port 3(veth0_to_batadv) entered blocking state [ 32.764111][ T387] bridge0: port 3(veth0_to_batadv) entered disabled state [ 32.773511][ T387] device veth0_to_batadv entered promiscuous mode [ 32.780076][ T387] bridge0: port 3(veth0_to_batadv) entered blocking state [ 32.787083][ T387] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 32.813676][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 32.838628][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.075087][ T389] device syzkaller0 entered promiscuous mode [ 33.185988][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.202453][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 33.226962][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 33.247583][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 33.455001][ T23] kauditd_printk_skb: 25 callbacks suppressed [ 33.455029][ T23] audit: type=1400 audit(1719611670.560:101): avc: denied { create } for pid=398 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.502708][ T23] audit: type=1400 audit(1719611670.590:102): avc: denied { setopt } for pid=398 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.836161][ T23] audit: type=1400 audit(1719611670.600:103): avc: denied { write } for pid=398 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 34.257756][ T401] device syzkaller0 entered promiscuous mode [ 34.522892][ T23] audit: type=1400 audit(1719611671.550:104): avc: denied { create } for pid=399 comm="syz.4.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 34.649552][ T23] audit: type=1400 audit(1719611671.700:105): avc: denied { read } for pid=411 comm="syz.2.3" name="ppp" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 34.700845][ T23] audit: type=1400 audit(1719611671.740:106): avc: denied { open } for pid=411 comm="syz.2.3" path="/dev/ppp" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 35.028670][ T23] audit: type=1400 audit(1719611672.130:107): avc: denied { cpu } for pid=429 comm="syz.3.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.946478][ T23] audit: type=1400 audit(1719611673.040:108): avc: denied { ioctl } for pid=450 comm="syz.2.24" path="/dev/ppp" dev="devtmpfs" ino=837 ioctlcmd=0x7452 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 36.642459][ T480] cgroup: syz.3.32 (480) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 36.730845][ T480] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 37.190120][ T491] device xfrm0 entered promiscuous mode [ 37.922214][ T492] syz.2.34 (492) used greatest stack depth: 22648 bytes left [ 38.936564][ T521] syz.2.45 (521) used greatest stack depth: 22360 bytes left [ 39.201460][ T554] device xfrm0 entered promiscuous mode [ 40.822973][ T602] device xfrm0 entered promiscuous mode [ 42.932762][ T23] audit: type=1400 audit(1719611680.040:109): avc: denied { relabelfrom } for pid=653 comm="syz.2.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 43.002604][ T655] FAULT_INJECTION: forcing a failure. [ 43.002604][ T655] name failslab, interval 1, probability 0, space 0, times 1 [ 43.091130][ T23] audit: type=1400 audit(1719611680.060:110): avc: denied { relabelto } for pid=653 comm="syz.2.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 43.101606][ T655] CPU: 1 PID: 655 Comm: syz.2.80 Not tainted 5.4.274-syzkaller-00003-g51e9abf68baf #0 [ 43.119718][ T655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 43.129594][ T655] Call Trace: [ 43.132769][ T655] dump_stack+0x1d8/0x241 [ 43.136960][ T655] ? panic+0x89d/0x89d [ 43.140816][ T655] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 43.146480][ T655] should_fail+0x71f/0x880 [ 43.150733][ T655] ? setup_fault_attr+0x3d0/0x3d0 [ 43.155588][ T655] ? __alloc_skb+0x7a/0x4d0 [ 43.159910][ T655] should_failslab+0x5/0x20 [ 43.164261][ T655] kmem_cache_alloc+0x28/0x250 [ 43.168861][ T655] __alloc_skb+0x7a/0x4d0 [ 43.173032][ T655] ? mutex_lock+0xa5/0x110 [ 43.177267][ T655] alloc_uevent_skb+0x74/0x220 [ 43.181892][ T655] ? netdev_queue_release+0x80/0x80 [ 43.187010][ T655] kobject_uevent_net_broadcast+0x176/0x560 [ 43.192825][ T655] kobject_uevent_env+0x54d/0x710 [ 43.197679][ T655] ? kernfs_put+0x31a/0x4b0 [ 43.202029][ T655] kobject_put+0x174/0x2f0 [ 43.206301][ T655] netdev_queue_update_kobjects+0x337/0x3a0 [ 43.212019][ T655] netif_set_real_num_tx_queues+0x17a/0x840 [ 43.217743][ T655] __tun_detach+0xb56/0x1390 [ 43.222169][ T655] __tun_chr_ioctl+0xbcd/0x1d00 [ 43.226847][ T655] ? tun_flow_create+0x250/0x250 [ 43.231633][ T655] ? memset+0x1f/0x40 [ 43.235428][ T655] ? fsnotify+0x1280/0x1340 [ 43.241088][ T655] ? tun_chr_poll+0x670/0x670 [ 43.245591][ T655] do_vfs_ioctl+0x742/0x1720 [ 43.250035][ T655] ? ioctl_preallocate+0x250/0x250 [ 43.254982][ T655] ? __fget+0x407/0x490 [ 43.258980][ T655] ? fget_many+0x20/0x20 [ 43.263044][ T655] ? debug_smp_processor_id+0x20/0x20 [ 43.268352][ T655] ? security_file_ioctl+0x7d/0xa0 [ 43.273298][ T655] __x64_sys_ioctl+0xd4/0x110 [ 43.277897][ T655] do_syscall_64+0xca/0x1c0 [ 43.282240][ T655] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 43.287983][ T655] RIP: 0033:0x7fbf33c9eb99 [ 43.292210][ T655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.311841][ T655] RSP: 002b:00007fbf32f20048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 43.320092][ T655] RAX: ffffffffffffffda RBX: 00007fbf33e2cfa0 RCX: 00007fbf33c9eb99 [ 43.327894][ T655] RDX: 0000000020000200 RSI: 00000000400454d9 RDI: 0000000000000003 [ 43.336346][ T655] RBP: 00007fbf32f200a0 R08: 0000000000000000 R09: 0000000000000000 [ 43.344649][ T655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.352635][ T655] R13: 000000000000000b R14: 00007fbf33e2cfa0 R15: 00007ffcb7dc4b68 [ 46.506355][ T23] audit: type=1400 audit(1719611683.610:111): avc: denied { create } for pid=710 comm="syz.4.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 46.763732][ T716] device xfrm0 entered promiscuous mode [ 54.927735][ T23] audit: type=1400 audit(1719611691.950:112): avc: denied { append } for pid=884 comm="syz.0.130" name="ppp" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 56.784049][ T922] [ 56.786230][ T922] ********************************************************** [ 56.794716][ T922] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 56.804909][ T922] ** ** [ 56.813720][ T922] ** trace_printk() being used. Allocating extra memory. ** [ 56.821125][ T922] ** ** [ 56.828942][ T922] ** This means that this is a DEBUG kernel and it is ** [ 56.836981][ T922] ** unsafe for production use. ** [ 56.849215][ T922] ** ** [ 56.857830][ T922] ** If you see this message and you are not debugging ** [ 57.035706][ T922] ** the kernel, report this immediately to your vendor! ** [ 57.077480][ T922] ** ** [ 57.136026][ T922] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 57.175202][ T922] ********************************************************** [ 60.141981][ T354] syz-executor (354) used greatest stack depth: 19768 bytes left [ 62.078676][ T967] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.221365][ T967] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.268905][ T967] device bridge_slave_0 entered promiscuous mode [ 62.347068][ T967] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.354685][ T967] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.363078][ T967] device bridge_slave_1 entered promiscuous mode [ 63.839629][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.880692][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.943680][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.968286][ T23] audit: type=1400 audit(1719611701.070:113): avc: denied { create } for pid=1040 comm="syz.4.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 64.003815][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.087995][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.094943][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.160579][ T7] device bridge_slave_1 left promiscuous mode [ 64.169648][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.186148][ T7] device bridge_slave_0 left promiscuous mode [ 64.195037][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.406460][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.414474][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.423373][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.433894][ T108] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.440757][ T108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.548370][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.560102][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.637442][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.652542][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.737541][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 64.756891][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 64.893563][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 64.920742][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 64.956233][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 64.973031][ T376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 65.098977][ T1055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 65.108173][ T1055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 65.249458][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 65.520086][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.354518][ T1150] syz.1.200[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.354634][ T1150] syz.1.200[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.356727][ T23] audit: type=1400 audit(1719611704.460:114): avc: denied { read } for pid=1149 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 67.505644][ T1150] syz.1.200[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 67.505757][ T1150] syz.1.200[1150] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 70.021806][ T23] audit: type=1400 audit(1719611707.120:115): avc: denied { create } for pid=1233 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 70.627526][ T23] audit: type=1400 audit(1719611707.730:116): avc: denied { create } for pid=1258 comm="syz.2.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 71.481840][ T24] cfg80211: failed to load regulatory.db [ 71.766347][ T23] audit: type=1400 audit(1719611708.870:117): avc: denied { sys_admin } for pid=1305 comm="syz.3.254" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 71.917913][ T1320] ip6_tunnel: non-ECT from fc02:0000:0000:0000:4c00:0000:0000:003e with DS=0x31 [ 72.630632][ T23] audit: type=1400 audit(1719611709.730:118): avc: denied { create } for pid=1343 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 74.322404][ T1378] syz.3.275[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.322512][ T1378] syz.3.275[1378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.443567][ T23] audit: type=1400 audit(1719611711.550:119): avc: denied { create } for pid=1377 comm="syz.3.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 74.655855][ T23] audit: type=1400 audit(1719611711.760:120): avc: denied { create } for pid=1392 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 75.201029][ T23] audit: type=1400 audit(1719611712.300:121): avc: denied { write } for pid=1418 comm="syz.1.287" name="ppp" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 75.472544][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 75.481297][ T1420] device syzkaller0 entered promiscuous mode [ 76.464551][ T23] audit: type=1400 audit(1719611713.460:122): avc: denied { create } for pid=1473 comm="syz.2.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 79.865919][ T1598] device wg2 entered promiscuous mode [ 84.698810][ T1724] device syzkaller0 entered promiscuous mode [ 89.547022][ T1835] ip6_tunnel: non-ECT from fc02:0000:0000:0000:4c00:0000:0000:003e with DS=0x91 [ 91.249180][ T1826] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.260108][ T1826] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.269133][ T1826] device bridge_slave_0 entered promiscuous mode [ 91.296252][ T1826] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.313414][ T1826] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.336181][ T1826] device bridge_slave_1 entered promiscuous mode [ 91.672088][ T1862] device bridge0 entered promiscuous mode [ 91.931879][ T102] device bridge_slave_1 left promiscuous mode [ 91.938050][ T102] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.973544][ T102] device bridge_slave_0 left promiscuous mode [ 91.979637][ T102] bridge0: port 1(bridge_slave_0) entered disabled state [ 92.530869][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 92.543995][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 92.583111][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 92.595190][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 92.614722][ T108] bridge0: port 1(bridge_slave_0) entered blocking state [ 92.621676][ T108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 92.640023][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 92.655429][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 92.672522][ T108] bridge0: port 2(bridge_slave_1) entered blocking state [ 92.679438][ T108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 92.700732][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 92.761097][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 92.776497][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.822601][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.848715][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.975916][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 93.006783][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 93.086831][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 93.112124][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 93.171481][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 93.180018][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 94.182547][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 94.191196][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 94.278227][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 94.302822][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 95.109152][ T23] audit: type=1400 audit(1719611732.190:123): avc: denied { create } for pid=1947 comm="syz.3.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 104.053317][ T2218] syz.1.524[2218] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 105.399328][ T2254] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 3283 (only 8 groups) [ 106.230297][ T2284] device wg2 entered promiscuous mode [ 106.431714][ T2287] bridge0: port 4(ip6gretap0) entered blocking state [ 106.449150][ T2287] bridge0: port 4(ip6gretap0) entered disabled state [ 106.478022][ T2287] device ip6gretap0 entered promiscuous mode [ 106.501176][ T2287] bridge0: port 4(ip6gretap0) entered blocking state [ 106.507778][ T2287] bridge0: port 4(ip6gretap0) entered forwarding state [ 108.469310][ T2346] device wg2 entered promiscuous mode [ 109.865509][ T2401] device syzkaller0 entered promiscuous mode [ 110.118222][ T2395] device wg2 entered promiscuous mode [ 110.865983][ T23] audit: type=1400 audit(1719611747.960:124): avc: denied { ioctl } for pid=2440 comm="syz.2.582" path="socket:[18170]" dev="sockfs" ino=18170 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 111.094723][ T2443] device wg2 entered promiscuous mode [ 113.354383][ T2495] bridge0: port 1(bridge_slave_0) entered blocking state [ 113.365132][ T2495] bridge0: port 1(bridge_slave_0) entered disabled state [ 113.378996][ T23] audit: type=1400 audit(1719611750.480:125): avc: denied { create } for pid=2525 comm="syz.4.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 113.380660][ T2495] device bridge_slave_0 entered promiscuous mode [ 113.495899][ T2528] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 231 (only 8 groups) [ 113.513237][ T2495] bridge0: port 2(bridge_slave_1) entered blocking state [ 113.521514][ T2495] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.535167][ T2495] device bridge_slave_1 entered promiscuous mode [ 113.555766][ T993] device bridge_slave_1 left promiscuous mode [ 113.562626][ T993] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.577940][ T993] device bridge_slave_0 left promiscuous mode [ 113.586509][ T993] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.338923][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 115.347755][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 115.426456][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 115.437241][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 115.512461][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.519396][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 115.666842][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 115.703013][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 115.732914][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 115.741297][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.748222][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 115.910347][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 115.920031][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 115.981507][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 115.997789][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 116.054598][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 116.085322][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 116.154006][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 116.229667][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 116.353086][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 116.422203][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 116.485619][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 116.494324][ T108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 116.524079][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 116.538510][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 116.671814][ T2614] device syzkaller0 entered promiscuous mode [ 121.161797][ T2700] EXT4-fs warning (device sda1): verify_group_input:147: Cannot add at group 0 (only 8 groups) [ 121.297879][ T2675] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.306263][ T2675] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.315893][ T2675] device bridge_slave_0 entered promiscuous mode [ 121.325414][ T993] device bridge_slave_1 left promiscuous mode [ 121.332728][ T993] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.347328][ T993] device bridge_slave_0 left promiscuous mode [ 121.368803][ T993] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.549519][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.558774][ T2675] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.587441][ T2675] device bridge_slave_1 entered promiscuous mode [ 122.099602][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.108346][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.118438][ T2675] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.129305][ T2675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.272929][ T373] bridge0: port 1(bridge_slave_0) entered disabled state [ 122.284010][ T373] bridge0: port 2(bridge_slave_1) entered disabled state [ 122.369057][ T2733] device syzkaller0 entered promiscuous mode [ 122.554768][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.563781][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.598078][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 122.625926][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 122.636019][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 122.642946][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 122.824263][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 122.840688][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 122.850263][ T373] bridge0: port 2(bridge_slave_1) entered blocking state [ 122.857503][ T373] bridge0: port 2(bridge_slave_1) entered forwarding state [ 122.881502][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 122.889853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.918435][ T536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 122.953609][ T536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.005136][ T1055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 123.014482][ T1055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.121270][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 123.185134][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.307659][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 123.355103][ T1051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.456464][ T536] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 123.472422][ T536] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.541587][ T536] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 123.560970][ T536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 125.287516][ T2814] bridge0: port 1(bridge_slave_0) entered blocking state [ 125.397648][ T2814] bridge0: port 1(bridge_slave_0) entered disabled state [ 125.412607][ T2814] device bridge_slave_0 entered promiscuous mode [ 125.466516][ T2814] bridge0: port 2(bridge_slave_1) entered blocking state [ 125.501465][ T2814] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.607448][ T2814] device bridge_slave_1 entered promiscuous mode [ 126.285846][ T993] device bridge_slave_1 left promiscuous mode [ 126.292141][ T993] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.300900][ T993] device bridge_slave_0 left promiscuous mode [ 126.307125][ T993] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.567643][ T2885] device bridge0 entered promiscuous mode [ 126.734509][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.746943][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.893407][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.913064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.925448][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.932363][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.015873][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.073807][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.173455][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.180344][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.327704][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.342139][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.360861][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.392796][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.401204][ T1109] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.263960][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 128.305581][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.541980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 128.550791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.675575][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 128.689593][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 128.806960][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 128.828657][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.874154][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 128.893252][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.232680][ T995] device bridge_slave_1 left promiscuous mode [ 130.246046][ T995] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.303486][ T995] device bridge_slave_0 left promiscuous mode [ 130.309946][ T995] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.311672][ T2984] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.318901][ T2984] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.327173][ T2984] device bridge_slave_0 entered promiscuous mode [ 131.335434][ T2984] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.342520][ T2984] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.350878][ T2984] device bridge_slave_1 entered promiscuous mode [ 131.494049][ T2984] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.500945][ T2984] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.508231][ T2984] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.515127][ T2984] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.837181][ T1054] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.871747][ T1054] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.936344][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 131.954449][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 132.041448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 132.119078][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 132.167826][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 132.174738][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 132.212772][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.222691][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.231059][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.237976][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.261542][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.269885][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.278156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.286734][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.320987][ T1054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 132.330161][ T1054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 132.347979][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 132.358429][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.469710][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.514117][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.539432][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.548639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.724444][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.802377][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 133.836034][ T3071] ================================================================== [ 133.844207][ T3071] BUG: KASAN: use-after-free in enqueue_timer+0xb7/0x300 [ 133.851558][ T3071] Write of size 8 at addr ffff8881eb2cf1c8 by task syz.2.763/3071 [ 133.859179][ T3071] [ 133.861454][ T3071] CPU: 0 PID: 3071 Comm: syz.2.763 Not tainted 5.4.274-syzkaller-00003-g51e9abf68baf #0 [ 133.871000][ T3071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 133.880881][ T3071] Call Trace: [ 133.884071][ T3071] dump_stack+0x1d8/0x241 [ 133.888190][ T3071] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 133.893869][ T3071] ? printk+0xd1/0x111 [ 133.897910][ T3071] ? enqueue_timer+0xb7/0x300 [ 133.903122][ T3071] ? wake_up_klogd+0xb2/0xf0 [ 133.907541][ T3071] ? enqueue_timer+0xb7/0x300 [ 133.912051][ T3071] print_address_description+0x8c/0x600 [ 133.917433][ T3071] ? panic+0x89d/0x89d [ 133.921347][ T3071] ? enqueue_timer+0xb7/0x300 [ 133.925863][ T3071] __kasan_report+0xf3/0x120 [ 133.930282][ T3071] ? enqueue_timer+0xb7/0x300 [ 133.934803][ T3071] kasan_report+0x30/0x60 [ 133.939174][ T3071] enqueue_timer+0xb7/0x300 [ 133.943485][ T3071] internal_add_timer+0x240/0x430 [ 133.948343][ T3071] __mod_timer+0x6f1/0x13e0 [ 133.952698][ T3071] ? mod_timer_pending+0x20/0x20 [ 133.957465][ T3071] ? selinux_tun_dev_alloc_security+0x4d/0x130 [ 133.963450][ T3071] ? selinux_tun_dev_alloc_security+0x5e/0x130 [ 133.969460][ T3071] ? init_timer_key+0x2d/0x1f0 [ 133.974123][ T3071] tun_net_init+0x287/0x540 [ 133.978471][ T3071] register_netdevice+0x1c0/0x12a0 [ 133.983419][ T3071] ? kasan_kmalloc_large+0x131/0x140 [ 133.988545][ T3071] ? netdev_update_lockdep_key+0x10/0x10 [ 133.994037][ T3071] ? memset+0x1f/0x40 [ 133.997899][ T3071] tun_set_iff+0x7f7/0xdc0 [ 134.002161][ T3071] __tun_chr_ioctl+0x8a9/0x1d00 [ 134.006875][ T3071] ? tun_flow_create+0x250/0x250 [ 134.011629][ T3071] ? tun_chr_poll+0x670/0x670 [ 134.016513][ T3071] do_vfs_ioctl+0x742/0x1720 [ 134.021113][ T3071] ? ioctl_preallocate+0x250/0x250 [ 134.026439][ T3071] ? __fget+0x407/0x490 [ 134.031262][ T3071] ? fget_many+0x20/0x20 [ 134.035498][ T3071] ? switch_fpu_return+0x1d4/0x410 [ 134.040444][ T3071] ? security_file_ioctl+0x7d/0xa0 [ 134.045548][ T3071] __x64_sys_ioctl+0xd4/0x110 [ 134.050065][ T3071] do_syscall_64+0xca/0x1c0 [ 134.054403][ T3071] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 134.060119][ T3071] RIP: 0033:0x7f3f86f39b99 [ 134.064355][ T3071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 134.083937][ T3071] RSP: 002b:00007f3f861bb048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 134.092164][ T3071] RAX: ffffffffffffffda RBX: 00007f3f870c7fa0 RCX: 00007f3f86f39b99 [ 134.099972][ T3071] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000006 [ 134.107786][ T3071] RBP: 00007f3f86fba77e R08: 0000000000000000 R09: 0000000000000000 [ 134.115595][ T3071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 134.123419][ T3071] R13: 000000000000000b R14: 00007f3f870c7fa0 R15: 00007ffed7a3ed78 [ 134.131233][ T3071] [ 134.133393][ T3071] Allocated by task 5: [ 134.137316][ T3071] __kasan_kmalloc+0x171/0x210 [ 134.141904][ T3071] __kmalloc_track_caller+0x100/0x2b0 [ 134.147198][ T3071] __alloc_skb+0xb4/0x4d0 [ 134.151366][ T3071] ndisc_alloc_skb+0xee/0x2c0 [ 134.155878][ T3071] ndisc_send_ns+0x29d/0x830 [ 134.160306][ T3071] addrconf_dad_work+0xb91/0x16f0 [ 134.165171][ T3071] process_one_work+0x765/0xd20 [ 134.169858][ T3071] worker_thread+0xaef/0x1470 [ 134.174364][ T3071] kthread+0x2da/0x360 [ 134.178272][ T3071] ret_from_fork+0x1f/0x30 [ 134.182507][ T3071] [ 134.184684][ T3071] Freed by task 5: [ 134.188251][ T3071] __kasan_slab_free+0x1b5/0x270 [ 134.193027][ T3071] kfree+0x123/0x370 [ 134.196755][ T3071] kfree_skb+0xb8/0x3c0 [ 134.200752][ T3071] ip6_mc_input+0x236/0x2a0 [ 134.205093][ T3071] ipv6_rcv+0xee/0x280 [ 134.209015][ T3071] __netif_receive_skb+0x1c6/0x530 [ 134.213947][ T3071] process_backlog+0x34f/0x680 [ 134.218567][ T3071] net_rx_action+0x53f/0x1160 [ 134.223060][ T3071] __do_softirq+0x23b/0x6b7 [ 134.227381][ T3071] [ 134.229565][ T3071] The buggy address belongs to the object at ffff8881eb2cf000 [ 134.229565][ T3071] which belongs to the cache kmalloc-512 of size 512 [ 134.243554][ T3071] The buggy address is located 456 bytes inside of [ 134.243554][ T3071] 512-byte region [ffff8881eb2cf000, ffff8881eb2cf200) [ 134.256658][ T3071] The buggy address belongs to the page: [ 134.262136][ T3071] page:ffffea0007acb300 refcount:1 mapcount:0 mapping:ffff8881f5c02500 index:0x0 compound_mapcount: 0 [ 134.272901][ T3071] flags: 0x8000000000010200(slab|head) [ 134.278195][ T3071] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5c02500 [ 134.286729][ T3071] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 134.295108][ T3071] page dumped because: kasan: bad access detected [ 134.301374][ T3071] page_owner tracks the page as allocated [ 134.306932][ T3071] page last allocated via order 2, migratetype Unmovable, gfp_mask 0x1d2a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL) [ 134.322561][ T3071] prep_new_page+0x18f/0x370 [ 134.326986][ T3071] get_page_from_freelist+0x2d13/0x2d90 [ 134.332364][ T3071] __alloc_pages_nodemask+0x393/0x840 [ 134.337568][ T3071] alloc_slab_page+0x39/0x3c0 [ 134.342181][ T3071] new_slab+0x97/0x440 [ 134.346161][ T3071] ___slab_alloc+0x2fe/0x490 [ 134.350593][ T3071] __slab_alloc+0x62/0xa0 [ 134.354755][ T3071] __kmalloc_track_caller+0x16d/0x2b0 [ 134.359959][ T3071] __alloc_skb+0xb4/0x4d0 [ 134.364244][ T3071] __ipv6_ifa_notify+0x2e1/0x1290 [ 134.369078][ T3071] addrconf_dad_completed+0x181/0xdb0 [ 134.374291][ T3071] addrconf_dad_work+0xe4d/0x16f0 [ 134.379156][ T3071] process_one_work+0x765/0xd20 [ 134.383839][ T3071] worker_thread+0xaef/0x1470 [ 134.388342][ T3071] kthread+0x2da/0x360 [ 134.392247][ T3071] ret_from_fork+0x1f/0x30 [ 134.396505][ T3071] page last free stack trace: [ 134.401111][ T3071] __free_pages_ok+0x847/0x950 [ 134.405751][ T3071] __free_pages+0x91/0x140 [ 134.409977][ T3071] device_release+0x6b/0x190 [ 134.414412][ T3071] kobject_put+0x1e6/0x2f0 [ 134.418678][ T3071] tun_set_iff+0x870/0xdc0 [ 134.422916][ T3071] __tun_chr_ioctl+0x8a9/0x1d00 [ 134.427603][ T3071] do_vfs_ioctl+0x742/0x1720 [ 134.432047][ T3071] __x64_sys_ioctl+0xd4/0x110 [ 134.436538][ T3071] do_syscall_64+0xca/0x1c0 [ 134.440879][ T3071] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 134.446591][ T3071] [ 134.448761][ T3071] Memory state around the buggy address: [ 134.454277][ T3071] ffff8881eb2cf080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 134.462231][ T3071] ffff8881eb2cf100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 134.470130][ T3071] >ffff8881eb2cf180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 134.478104][ T3071] ^ SYZFAIL: failed to recv rpc fd=3 want=4 sent=0 n=0 (errno 9: Bad file descriptor) [ 134.484469][ T3071] ffff8881eb2cf200: fc fc