last executing test programs: 26.872837142s ago: executing program 4 (id=1457): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0xde, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791192000000000016150000000000009500740000000000"], &(0x7f0000003ff6)='GPL\x00', 0x42, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x0, 0x9}, 0x10}, 0x94) 26.798624523s ago: executing program 4 (id=1459): ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000000)) r0 = syz_clone(0x42605000, &(0x7f0000000040)="77b87a6a590ac5df43adee5583bcb840605d7d75c5e7797c7c34f1d72915068b35d9e2dbcb763cd70f9ee5cbf3262d82b1ae92aed709e1aec85ed196eb3207e907b0cf708809ba06f76fcbae5e4b6971de9e6efbaa4b3828ff52644dc65de143707019ecbcb31a89b74c26c2b73b9d0df43ab167b929f6908a08232cb77086fc6bb4f4fef8236b279e64ad3bf8e1e5ec950dc1a722b88d02f07d4c43e50ef0cfca485cdc42f9a4303ae699ab4c8a6784cb7705aa1b9802cfeea0f45743338fe2c16ce7f95a5214ab1a3c87700b7d9338e827284d7e1dfea225ba31ebac86594d48e093f2b78a9a2e72ed0ccf5fff6062be", 0xf1, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="4ed8c0cc4b5be056") r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000200)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x1}, 0x50) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x10, 0x7, 0x5, 0x1, 0x100, r1, 0xca4, '\x00', 0x0, r2, 0x3, 0x1, 0x1}, 0x50) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='flush_foreign\x00', r2, 0x0, 0xbd6c}, 0x18) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x80002, 0x0) ioctl$TUNSETPERSIST(r5, 0x400454cb, 0x1) openat$cgroup_devices(r2, &(0x7f0000000400)='devices.allow\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r0, r2, 0x0, 0xe, &(0x7f0000000440)='flush_foreign\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001680)={r2, 0x0, 0xe2, 0x31, &(0x7f00000004c0)="0ef0f1708535f43cd8fe0710755599e5b65c99e2bf8bde5317ff983f840a32771b2071c59785f3ea80828845ebda554ee113ace6074e25c3ee489538658a7b601402effdc9ccf24f00197b4bc947af65ec4c8948c05714eb11113144a1804563177ca912268b6bbd637e0ac17bfb1e4b203534b71817e6be449dc93de9a571ca8a5381851b9135dbf29b401e4333bcbd7867bff676756816b41a99ceb7607ebaee333ce5a296dbe0874649e8a6e035fd289976a8b892ba58cf21c6bb75d8c8e48a346bf17b47e1da1f94e80b0f752ba5a4ff306617b9b61cd5d1d7e38a7822cf58bc", &(0x7f00000005c0)=""/49, 0x57e, 0x0, 0x7a, 0x1000, &(0x7f0000000600)="95f6fab34aa2e0fa8a93b8838ee11374fee09148c4ff3c1cc6cddb78fab6314e715a139a0c098705e3dccc564a4305385b519e55f335d336f98f9f6fa4bc17421a9e446df0e2962718a5b16e35cb45279d2e74066371a27d98b1fa17f537c6ed3a16da04e00517a4b21c4b755ca1ad67371cdaa926505fa09ed6", &(0x7f0000000680)="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", 0x1, 0x0, 0x1}, 0x50) r6 = syz_clone(0x28082000, &(0x7f0000001700)="f23f8e99d0a9d65d654bbc04f83ca85d477d442d6371ae49b3d06219197301be2348799e4e8734ee199ec1440bfdda2a40d182d2637b557c10214973c69950a8113784850ab144a98bcf3da56b0804e2f5d44d3b02fc9320d3b2464d8bbb065b16c292a296499b3ceba2c3d76d6c71b3c3fc4946ac7433a7c1c54b", 0x7b, &(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)="d872558538c059f2b5d186e02256370698fda52ae3a5fc39faf42686c2ef816a2e") socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001840)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001880)={0xffffffffffffffff}) write$cgroup_devices(r2, &(0x7f00000018c0)={'b', ' *:* ', 'w\x00'}, 0x8) r8 = syz_open_procfs$namespace(r6, &(0x7f0000001900)='ns/ipc\x00') write$cgroup_pressure(r2, &(0x7f0000001940)={'some', 0x20, 0xfffffffffffffff4, 0x20, 0x4e0b}, 0x2f) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001e40)={r2, 0xe0, &(0x7f0000001d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001b80)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000001bc0)=[0x0], &(0x7f0000001c00)=[0x0, 0x0], 0x0, 0xd1, &(0x7f0000001c40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001c80), &(0x7f0000001cc0), 0x8, 0x9f, 0x8, 0x8, &(0x7f0000001d00)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000021c0)={r2, 0xe0, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000001f00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000001f40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001f80)=[0x0, 0x0], 0x0, 0x69, &(0x7f0000001fc0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000002000), &(0x7f0000002040), 0x8, 0x6d, 0x8, 0x8, &(0x7f0000002080)}}, 0x10) r12 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002240)=@o_path={&(0x7f0000002200)='./file0\x00', 0x0, 0x10, r8}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000002280)={r1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x5, 0x29, &(0x7f0000001980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x9}, @printk={@x, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @exit, @generic={0x4, 0xe, 0x9, 0xd3c3, 0x8}, @alu={0x7, 0x0, 0x4, 0x8, 0x1, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x31b2c3b4dd9a2bb9}}}, &(0x7f0000001b00)='GPL\x00', 0x3, 0x11, &(0x7f0000001b40)=""/17, 0x41000, 0x4, '\x00', r9, @fallback=0x1f, r2, 0x8, &(0x7f0000001e80)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001ec0)={0x3, 0x6, 0x1, 0xa0c}, 0x10, r11, r12, 0x2, &(0x7f00000022c0)=[r13], &(0x7f0000002300)=[{0x5, 0x3, 0xc, 0x9}, {0x1, 0x4, 0xf, 0x6}], 0x10, 0x7ff}, 0x94) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000002400), 0x8003, 0x0) ioctl$TUNSETVNETHDRSZ(r14, 0x400454d8, &(0x7f0000002440)=0x2) r15 = openat$tun(0xffffffffffffff9c, &(0x7f0000002480), 0x2001, 0x0) ioctl$TUNSETPERSIST(r15, 0x400454cb, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f00000024c0), 0x4) ioctl$TUNSETLINK(r3, 0x400454cd, 0x322) bpf$PROG_LOAD(0x5, &(0x7f0000002680)={0x19, 0x16, &(0x7f0000002500)=@raw=[@exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @map_fd={0x18, 0xa, 0x1, 0x0, r15}, @alu={0x4, 0x1, 0x6, 0x4, 0x8, 0xfffffffffffffff8, 0x8}, @call={0x85, 0x0, 0x0, 0x16}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x8, 0x2, 0x0, r13, 0x0, 0x0, 0x0, 0x15}], &(0x7f00000025c0)='GPL\x00', 0xc8, 0x0, 0x0, 0x82100, 0x58, '\x00', r10, @fallback=0x32, r7, 0x8, &(0x7f0000002600)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, r11, r12, 0x0, &(0x7f0000002640)=[r3, r2, r13], 0x0, 0x10, 0x3dc}, 0x94) 26.741816975s ago: executing program 4 (id=1462): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x7f, 0xffffffff, 0x10000, 0xffffffffffffffff, 0x3a, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x1, 0xf}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, 0x0}, 0x20) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x8}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500), 0xc) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 26.001256049s ago: executing program 4 (id=1466): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x480783, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x403, 0x6, 0x0, 0x34d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000a850000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 25.076941847s ago: executing program 4 (id=1472): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='devices.list\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x23, &(0x7f0000000000), 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0xe, 0x4, &(0x7f0000000580)=ANY=[@ANYRES16=r2, @ANYRES64, @ANYRESDEC=r2, @ANYRESDEC=r3, @ANYRESDEC=r1, @ANYRESHEX=r1, @ANYRES64=r3, @ANYRES8=r1, @ANYRES64=r3, @ANYRES8=r0], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r4, &(0x7f0000000300), 0x0}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000074"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfc, 0x5, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x1000010, 0x0, 0x2, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r7 = syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) syz_open_procfs$namespace(r7, &(0x7f0000000000)='ns/mnt\x00') perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x67f}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000001000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x2000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r10}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x15, 0x4, 0x0, &(0x7f0000000080)) 24.91022587s ago: executing program 4 (id=1473): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r1 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x30801, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xe4a, 0x2}, 0x2610, 0x7, 0x0, 0x1, 0xfffffffff7ffbbfe, 0x80, 0x0, 0x0, 0xfffffffe, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x20000000000001, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x50, 0x0, 0x0, 0x0, '\x00', r3, @cgroup_skb}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x2000000, 0xe, 0x0, &(0x7f00000001c0)="5cdd3086f1ffff6633c9bbac88a8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 24.815221622s ago: executing program 32 (id=1473): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r1 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x30801, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xe4a, 0x2}, 0x2610, 0x7, 0x0, 0x1, 0xfffffffff7ffbbfe, 0x80, 0x0, 0x0, 0xfffffffe, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x20000000000001, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)={0x1, 0x0, [0x0]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x3, &(0x7f0000000100)=ANY=[], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x50, 0x0, 0x0, 0x0, '\x00', r3, @cgroup_skb}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x2000000, 0xe, 0x0, &(0x7f00000001c0)="5cdd3086f1ffff6633c9bbac88a8", 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 24.664400535s ago: executing program 5 (id=1474): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b000000000000000000000000000400000c1a00", @ANYRES32=0x0, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x2, 0xfff, 0x9}, 0x50) r1 = getpid() r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05f02ea76376ed95ddba58125934000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{r2}, &(0x7f0000001040), &(0x7f0000001080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xe, 0x3, &(0x7f0000001100)=ANY=[@ANYBLOB="18000000fffffeff00000000000000009700000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f05, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x8, 0x8, 0xe6, 0x2, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4000000000000000, 0x7ff}, 0x6278, 0x8000000000000001, 0x2, 0x3, 0x1c00, 0x7c39, 0x7, 0x0, 0x1000, 0x0, 0x1}, r1, 0x8, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 24.546918487s ago: executing program 33 (id=1474): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x730, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b000000000000000000000000000400000c1a00", @ANYRES32=0x0, @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x2, 0xfff, 0x9}, 0x50) r1 = getpid() r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="05f02ea76376ed95ddba58125934000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000f9000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{r2}, &(0x7f0000001040), &(0x7f0000001080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xe, 0x3, &(0x7f0000001100)=ANY=[@ANYBLOB="18000000fffffeff00000000000000009700000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f05, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x8, 0x8, 0xe6, 0x2, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4000000000000000, 0x7ff}, 0x6278, 0x8000000000000001, 0x2, 0x3, 0x1c00, 0x7c39, 0x7, 0x0, 0x1000, 0x0, 0x1}, r1, 0x8, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.367397005s ago: executing program 0 (id=1708): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01b1180000000000000024000000240000000200000000000000020000040000000300000000000c000000000000"], 0xffffffffffffffff, 0x3e, 0xb2, 0x2}, 0x20) (async) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0xcf72dc13ae611bff, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r2}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='blkio.throttle.io_service_bytes\x00', 0x26e1, 0x0) (async) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r6}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={@ifindex, 0x26, 0x0, 0x5, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], &(0x7f00000004c0)=[0x0], 0x0}, 0x40) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r6, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0), 0x0, 0x65, &(0x7f0000000700)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000740), &(0x7f0000000780), 0x8, 0xeb, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r9}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r11, 0x1, 0x32, &(0x7f0000000180)=r10, 0x4) (async) sendmsg$inet(r12, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x20000000) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000000016230000000000000000850000002000000085000000a000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000600)={@ifindex=r8, r5, 0xd, 0x4, 0x0, @void, @value=r13, @void, @void, r7}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x11, &(0x7f0000000cc0)=ANY=[@ANYBLOB="18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000620c00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000085100000f9ffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000000000852819ef5af6f73f0c3500000200000000000000000000008510000001000000"], &(0x7f0000000d80)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000dc0), 0x40f00, 0x9, '\x00', r8, 0x0, r0, 0x8, &(0x7f0000000e00)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000e40)={0x1, 0x3, 0x5, 0x5}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000e80)=[r1, r1, 0xffffffffffffffff, r1, r1, r1], &(0x7f0000000ec0)=[{0x4, 0x4, 0xe, 0x8}, {0x1, 0x1, 0x9, 0xc}, {0x4, 0x3, 0xc, 0x7}, {0x5, 0x3, 0xb, 0xa}], 0x10, 0x4}, 0x94) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000000)='./file0\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f00000006c0)}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@struct={0x9, 0x2, 0x0, 0x4, 0x1, 0x2, [{0xb, 0x1, 0x8001}, {0x1, 0x2, 0x4}]}]}, {0x0, [0x48, 0x2e]}}, &(0x7f0000000740)=""/39, 0x40, 0x27, 0x1}, 0x28) 2.225350057s ago: executing program 0 (id=1711): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080040000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x3}, 0x10010, 0x2c2b, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r7, &(0x7f0000000080)='syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050000000400000004000000040000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x2a}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.808689036s ago: executing program 1 (id=1716): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x20000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3eda}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.644931949s ago: executing program 0 (id=1718): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.56190342s ago: executing program 0 (id=1720): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x0, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x4, 0xe, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="101e000000000000000000cc0500000000000000000407000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0xc}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000feffffff850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) socketpair(0xa, 0x3, 0x87, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x2, [@const={0x0, 0x0, 0x0, 0x9, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}}, 0x0, 0x66}, 0x20) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000000000000000000007919b0000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89a2, &(0x7f0000000080)) 1.514468281s ago: executing program 6 (id=1722): ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x4) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) syz_clone(0x43001000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x80000000, &(0x7f0000000500)="dc678f42b595a16c51f6c8d652f13bee7d70cdc5987089bc627555cf04c5e4aad19ab8880c65de3e8f617ee8eba284c5258d3896e61c8dd0c1777c38389147dc5d1f82fb74bf2a7003331b989f1db9e4d636c6d261b95eaf4bfcfb4703e51bad8b1c0d1e420603eb3976d649c24852e66f860455547f4758275724bbe92c0c731e5cf4f6c9553ce475648d9656df77b052237cab8d395b8c24e21fc0ec88cf94c471bb3170a6d65506691a9d29ede00910d74cff9e3549ea9ef8e4d752eb5f8f356e6a0e548d36e96bd337dfdb0ca6386403814d1bd30c161879318e2cacc56af0c7f4eea19a3c56972f71e92d0b053e", 0xf0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000a00)="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") 1.495741221s ago: executing program 1 (id=1723): bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='cpuset.mem_hardwall\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8fffffdb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000d1c3b5fd59539d8c5124aa92d5ddfce00358c21b2d762be01f8759473b555bc1354f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280), 0x6e, &(0x7f0000000800)=[{&(0x7f0000000300)=""/219, 0xdb}, {0x0}, {0x0}, {0x0}], 0x4}, 0x20000000) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600), 0x4) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) (async) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40305829, &(0x7f0000000040)) (async) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008510000002000000a6000000ffffff859500007b000000fd84000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x7, 0x92, &(0x7f0000000040)=""/146}, 0x80) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) 1.369626454s ago: executing program 6 (id=1725): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000020000006815f9b16680c8318d81720000000000000000000000cc0000001a000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0500", @ANYBLOB, @ANYRES64=0x0], 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x28, 0x0, &(0x7f0000000880)="985b9c69bd9aceab0100f19147fcee70e98b0918000048d1ff7703951bae8defd15f970794095527", 0x0, 0x6, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r8, 0x10f, 0x8a, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000010000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000040bf080000840000807b8af8ff00000000bfa200000000000007020000f8ffffffb703008008000000b70400004d44e5c58500000082aa8e009500000000000000021bbe6c43c84aec95af8e33d81b907ba5856efb45b12631888de5c9880a7180134e197faa9b7c3c691a60dd92c4f4793d4532c85779dcaa41544447fe9d6b0b73a8a8cd2a73f4b51799a857a468d4d8240a71de6d3d3070ebaddc7b2ff73367b6f7ae3ce7211e4286789461fadd78aa104c32dafcbbf34f7731f8818ac91ae1af361bf9e669b4880b0aef59a2f8691bb4b0ea2a3c487ab2180922e6b9ba5949cd1d91dd0b05cdfab8be4d18ad7f1e"], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r9}, 0x10) 1.347305235s ago: executing program 1 (id=1726): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x183040, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'lo\x00'}) socketpair(0x1, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xc, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) 1.345795794s ago: executing program 2 (id=1728): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r2}, 0x11) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000400000045"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) syz_clone(0x40000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)) (async, rerun: 32) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) unlink(0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01001800000000000000000000000002000000003ef678b358238d9e97789500000c02000000000000000100000a00000000020095000000000000005f0000000000000000"], 0x0, 0x3c}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f00000000c0)={0x0, 0x1}, 0x1}, 0x90) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="12000000040000000800000066a9000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000010000000000000000"], 0x48) (rerun: 32) 1.282792116s ago: executing program 2 (id=1729): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.281850896s ago: executing program 3 (id=1730): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x2, 0x300}, {0x6e, 0x0, 0xd}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfff0}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0xf19}, {0x3, 0x0, 0x6, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.129378429s ago: executing program 0 (id=1731): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x7018}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) 1.120123699s ago: executing program 1 (id=1732): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000000000010000702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='fib6_table_lookup\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100001100"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180100001100"/15, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0xc00, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0xc00, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="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", @ANYRES8=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b6fffec850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000000000000c000000060000000c0000000e40000a052f13d4e8b30ea0935a1e684d008000002e5f3051"], 0x0, 0x2a, 0x0, 0x0, 0x10000, 0x10000}, 0x28) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000000000000c000000060000000c0000000e40000a052f13d4e8b30ea0935a1e684d008000002e5f3051"], 0x0, 0x2a, 0x0, 0x0, 0x10000, 0x10000}, 0x28) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES8=r2, @ANYBLOB="0000000000000000b98b1d00"/28], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES8=r2, @ANYBLOB="0000000000000000b98b1d00"/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) 1.094248649s ago: executing program 2 (id=1733): bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x1, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x7}], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xcf72dc13ae611bff, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0x1, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x7}], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xcf72dc13ae611bff, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r0}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) (async) 1.028417591s ago: executing program 0 (id=1734): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x20000}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3eda}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 976.941782ms ago: executing program 2 (id=1735): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x6, 0xa}, 0x50) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xabcd21b5f2857ce8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xabcd21b5f2857ce8) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) (async) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) 453.968662ms ago: executing program 6 (id=1736): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x17, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={@cgroup, r3, 0x12, 0x0, 0x0, @void, @value=0x0}, 0x20) (async) mkdir(0x0, 0x100) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0}, 0x94) 394.857613ms ago: executing program 3 (id=1737): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[@rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x402802, 0x0) ioctl$TUNGETVNETLE(r2, 0x800454dd, &(0x7f0000000080)) 394.150313ms ago: executing program 3 (id=1738): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 393.687743ms ago: executing program 6 (id=1739): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="bc1b000000000000001d00"/22, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) openat$cgroup_ro(r2, &(0x7f0000000180)='memory.stat\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) 368.612603ms ago: executing program 1 (id=1740): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8d, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0xfb, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0xe2, '\x00', r1, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0x0, 0x2, 0x18}, 0xc) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x229, '\x00', r1, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x50) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r6}, &(0x7f0000000800), &(0x7f0000000840)=r7}, 0x20) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="ea7700"/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB="00000000050000000100000000000000000000000000000000000000f02e9eb63e9d6085f622f13dbe3bf91caafd627130cae5d72ce82cbbf6f6a02fb092ca1c39e91895d104939c45b45ebd140d39ae3974ccbf67e0043bb39cc40b5929dfb6c0bf0ee8edc0a1a0098e250b6ad96b5a36c005437718d9f9555809"], 0x50) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c40)=@bpf_ext={0x1c, 0x11, &(0x7f0000001000)=ANY=[@ANYBLOB="180000000100000000000000fcffffff18110000", @ANYRES32=r3, @ANYBLOB="0000000000030000000080008500000083000000bf2000000000000055090100000000009500000000000000181700000d70ce804e62726ddd8d816c9819f650192c09dc5a8d3539b4916655ae885f715fc30e", @ANYRES32, @ANYBLOB="0000000000000000bf91000000000000b70200000000000085000000c7000000b7000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x8c2b, 0x1d, &(0x7f0000000900)=""/29, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x1, 0xff, 0x8}, 0x10, 0x116c1, r0, 0x2, &(0x7f0000000a80)=[r4, 0xffffffffffffffff, r5, r6, r8], &(0x7f0000000c00)=[{0x5, 0x5, 0x9, 0xb}, {0x0, 0x5, 0x1, 0x6}], 0x10, 0xddb}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@base={0x0, 0x2, 0x4, 0x0, 0x700, r5, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x3}, 0x50) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='signal_generate\x00', r9}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000f40)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f00000095", @ANYBLOB="194af1dbb5ed5dd16faf7afec976ab4caf1f696fe2e871a6658e0d00605ed1b6035c8fa3a265b0cb658df43b713607632b8d34ec7d9445ca2b8b271534b2d5534330c304542e776c85c2e776e7a3e612d18f0c084004ac5d1a29c482a10b596e0996e8ffb8fdcd0107"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r10}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000120000000000000000850000006d"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='tlb_flush\x00', r11}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r13], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x47efddccfcd31127, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r14}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2040, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)="009e11b1ac54c41d5cbe0000", &(0x7f0000000e80)="a0ff4ed02a08a369b3d489ed43d6d5d0d87d5ddcdfa48248b6dd30d6bf69f7809381fb601dca4bb3454ba9f6bfcc5ec4b6ec59b65404617ba5653c75a48bb56e8c4debc72dd59df2aa80bbd97db5866dc323e81c05180e8b223ef1a1508f7a7f80d2a77108fca0a9c5332435c2677da203ff7f71736a4858a99626561af5fa570631320cdbbbb13de100aecf", 0x5, r12}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008bd6000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000740)={&(0x7f0000000540)="86e87f25447376c1a9913f6b21cde3bf660087be0ed319cb0fdc3dc568c0b55938b04428dde355f406c9e43829fb743bf3bd784557dbc423781e266c10c5ec76ce368ccbe2a5f57d6aadb9b73d2f14663397165a9e0e69682658eeea0ef8b78e80415acab7d0c780adddc824a8ccee7faa7e9c4cc88ef0f9f174c8d161da635ac5c96198f221b42c9cd14d66470ed9260a5ca029670be3de94e79e4756ff3be1243b47fde98c53f38b7d511f9fbd58a86ec2da8c0400964e678bdb", &(0x7f0000000040)=""/19, &(0x7f0000000600)="d6be4cd59ce756c698c7135e04a453951d9939aaea600d355d760bf37952b1266352614cf28b799c938d4c4bc185937584cafe1e1e3f0443520dd15cb484f533e49516d3d3816b742901c480bea907", &(0x7f0000000680)="6f23f73f5ca09988a24984b2a751feb653c372224481c902e91b5bd9c56ba8ccdde10c6799f01ea2ed0c1215f59834cfa4f17b2b22331b86b89c1c920dc14c1d827f840ee4bbf3f7f9ef13adf427c390650eb296c35f6cca7ee1542e9ab25d706fc9430c1a50d6e9f94cd4b9a137a34a370bef269b7c6c2eb147c5b885882dfa496a2a27c310f58c2302404181e9fd8d316a010cf61bb89803fc7957a36ccc58cd23549e50a0", 0x2, r12, 0x4}, 0x38) 315.140274ms ago: executing program 6 (id=1741): r0 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x1f, 0x10, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000005000000000000008000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000a800000018010000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000a600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000ff000000000000000000008500000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095000000"], &(0x7f0000000080)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa5bc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) close(r3) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, 0x0) close(r3) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000007c0)={0xc}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r5, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0x1}, 0x0, &(0x7f00000005c0)='%-5lx \x00'}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 269.965195ms ago: executing program 1 (id=1742): perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791048000000000061040000"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f00000005c0)=""/240, 0x0, 0xf0, 0x4}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180200008010000000000000040000008500000027"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000019c0)=ANY=[], 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x34, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x14, 0x16, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@exit, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0xf}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xb}, @generic={0x0, 0x7, 0x3, 0xffff, 0x9}, @call={0x85, 0x0, 0x0, 0x20}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x4, 0x86, &(0x7f0000000c00)=""/134, 0x0, 0x2, '\x00', 0x0, @lirc_mode2, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000d40)={0x2, 0x9, 0x62, 0xd}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001000)=[0xffffffffffffffff, 0x1], &(0x7f0000001040)=[{0x0, 0x2, 0xa, 0x7}], 0x10, 0x81}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00', r5}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xe, 0x4, 0x4, 0x3}, 0x48) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r7, 0x0, '\x00', 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x2b, 'freezer'}, {0x2b, 'freezer'}, {0x2d, 'freezer'}, {0x2d, 'freezer'}, {0x2b, 'pids'}, {0x2b, 'freezer'}, {0x2d, 'io'}]}, 0x37) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3, 0x9, 0x0, 0x1, 0x300}, {0x95, 0x0, 0x0, 0x700}}, [], {{0x6, 0x1, 0x5, 0x2}, {0x6, 0x0, 0x5, 0x8, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0xd, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0xf, 0x8, 0x1, 0xf6, 0x0, 0x6, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_config_ext={0x7, 0x2}, 0x1, 0x3f, 0x7, 0x2, 0x1, 0x9, 0x4, 0x0, 0x7, 0x0, 0xd}, 0xffffffffffffffff, 0x1, r6, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0)={0x3, 0x4, 0x4, 0xa, 0x0, r8, 0x3, '\x00', r9, r0, 0x5, 0x5}, 0x50) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000f80)=ANY=[@ANYBLOB="1802000001000000000000000000000085000000870000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000480)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r10, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xeb7c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 218.233526ms ago: executing program 6 (id=1743): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xa0b41, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(r1) (async) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x2044}, 0x60) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x40047451, &(0x7f0000000180)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600), 0x280b40, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'veth0_macvtap\x00', 0x8000}) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB="417cbec1d1b1a4a625eda177c85e5b37804ed5fbd89aa5b3ab32dd543951b49ee79bb7d8cea96efc3b95a41d43cf24ffe1ac64274c9b3c922f75a5049a47a03d7d16dd4a0b384e7c12c08ccbfa674471ad32292b6ab643af7e5a7a77af03413142400f67aedf9973a00dfb5567c8c765f9f128475a71384335dc498460d75edfe43effc36bab9ad9a7e93bc5ddc44d347bd0164c35a0b743dfd80c6633ce55093ddd5d342728619af7bcedeb1ec007344cb6499c20056a3d4424304b75de89e98c186ecc03413d717693bc6731f0557e9a2b965befc5adac67202fa1444fb0", @ANYRES32=0x0, @ANYRES32, @ANYRES16=r3], 0x50) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB="417cbec1d1b1a4a625eda177c85e5b37804ed5fbd89aa5b3ab32dd543951b49ee79bb7d8cea96efc3b95a41d43cf24ffe1ac64274c9b3c922f75a5049a47a03d7d16dd4a0b384e7c12c08ccbfa674471ad32292b6ab643af7e5a7a77af03413142400f67aedf9973a00dfb5567c8c765f9f128475a71384335dc498460d75edfe43effc36bab9ad9a7e93bc5ddc44d347bd0164c35a0b743dfd80c6633ce55093ddd5d342728619af7bcedeb1ec007344cb6499c20056a3d4424304b75de89e98c186ecc03413d717693bc6731f0557e9a2b965befc5adac67202fa1444fb0", @ANYRES32=0x0, @ANYRES32, @ANYRES16=r3], 0x50) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r6], 0x0}, 0x94) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r8}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x8922, &(0x7f0000000080)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 132.321738ms ago: executing program 3 (id=1744): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 20.32775ms ago: executing program 3 (id=1745): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000c0000611004000000000063012c00000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) (async, rerun: 32) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r5) (async, rerun: 32) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 32) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) (async) ioctl$TUNGETVNETLE(r5, 0x40047451, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000008000000850000009e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x3c}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)) (rerun: 64) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3f, 0x3, 0x0, 0x0, 0x0, 0x0, 0xb000b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x8000, 0x9, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) (rerun: 64) 20.03856ms ago: executing program 2 (id=1746): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xf, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000181100009c29d26c9f1e746e95e0c1a5a6dd210c3adceae7d51f2aa635aacbeb6471f8fc2321bc8142dc1650d9a7b031afb5cb09ab6e7e84dc309a3cb77c8478144e83058c95f179b83855c891d016f36f0632f78a720b6cd2045f08da75267d367852ab526925899437b299315ac56a3f123be250bf5818d3134816c825cd77488afae4f3de434b5f88d19ce10662b59c888344f9e6348b781d9c0c2f808459ef096ad576f049a5e0", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r0}, 0x10) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x118800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xe, 0x0, 0x0, 0xfffffffffff7bbfe, 0x3, 0x0, 0x0, 0x602}, 0x0, 0x0, 0xffffffffffffffff, 0x2) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xa}, 0x8080, 0x5, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c23003f) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x800000}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x6, 0x0, 0xd, 0x9, 0x0, 0x0, 0xffffff1f}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x9}, {}, {0x4, 0x0, 0x6}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 15.12007ms ago: executing program 2 (id=1747): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x81, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x5c0a, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xe, &(0x7f0000000000)=@raw=[@ldst={0x2, 0x2, 0x4, 0x3, 0x9, 0x2, 0xfffffffffffffffc}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x40}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], &(0x7f0000000180)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback=0x8, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0x4, 0x4, 0xfff}, 0x10, 0xffffffffffffffff, r0, 0x9, &(0x7f0000000300)=[r3, 0xffffffffffffffff, r4], &(0x7f0000000400)=[{0x0, 0x4, 0x8, 0x1}, {0x3, 0x2, 0xe, 0x4}, {0x2, 0x3, 0xd, 0x4}, {0x3, 0x1, 0x7, 0x4}, {0x2, 0x5, 0x0, 0x3}, {0x0, 0x4, 0x5, 0x1}, {0x2, 0x3, 0x5, 0x7}, {0x3, 0x1, 0xa, 0xb}, {0x0, 0x3, 0xa, 0x1}], 0x10, 0x6}, 0x94) 0s ago: executing program 3 (id=1748): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x84}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0xa7f10723c5e5444d}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000400000085000000060000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000280)="b9ff03076804268c989e14f088a8", 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r3 = perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x7f, 0x6, 0x5, 0x8, 0x0, 0x331, 0x4020, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000040), 0xb}, 0x6185, 0x8000000000000001, 0x8, 0x6, 0x10, 0x9, 0x200, 0x0, 0x5, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffefffffffffffff, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) kernel console output (not intermixed with test programs): [ 12.551661][ T28] audit: type=1400 audit(1756936629.361:62): avc: denied { rlimitinh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.554133][ T28] audit: type=1400 audit(1756936629.361:63): avc: denied { siginh } for pid=225 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.45' (ED25519) to the list of known hosts. [ 19.486462][ T28] audit: type=1400 audit(1756936636.301:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.487498][ T275] cgroup: Unknown subsys name 'net' [ 19.489671][ T28] audit: type=1400 audit(1756936636.301:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.493513][ T28] audit: type=1400 audit(1756936636.311:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.493689][ T275] cgroup: Unknown subsys name 'devices' [ 19.612116][ T275] cgroup: Unknown subsys name 'hugetlb' [ 19.617736][ T275] cgroup: Unknown subsys name 'rlimit' [ 19.720109][ T28] audit: type=1400 audit(1756936636.531:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.743291][ T28] audit: type=1400 audit(1756936636.531:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 19.768075][ T28] audit: type=1400 audit(1756936636.541:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.776783][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 19.800069][ T28] audit: type=1400 audit(1756936636.621:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.825573][ T28] audit: type=1400 audit(1756936636.621:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.865255][ T28] audit: type=1400 audit(1756936636.681:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.865619][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.890815][ T28] audit: type=1400 audit(1756936636.681:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.706868][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.714280][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.721767][ T283] device bridge_slave_0 entered promiscuous mode [ 20.729666][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.736802][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.744174][ T283] device bridge_slave_1 entered promiscuous mode [ 20.832491][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.839548][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.846988][ T284] device bridge_slave_0 entered promiscuous mode [ 20.863856][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.870954][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.878369][ T284] device bridge_slave_1 entered promiscuous mode [ 20.907717][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.914793][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.922253][ T285] device bridge_slave_0 entered promiscuous mode [ 20.939337][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.946404][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.953856][ T285] device bridge_slave_1 entered promiscuous mode [ 20.981666][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.988722][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.996306][ T286] device bridge_slave_0 entered promiscuous mode [ 21.012410][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.019457][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.026887][ T288] device bridge_slave_0 entered promiscuous mode [ 21.037425][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.044501][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.051907][ T286] device bridge_slave_1 entered promiscuous mode [ 21.062093][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.069128][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.076555][ T288] device bridge_slave_1 entered promiscuous mode [ 21.092519][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.099553][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.106886][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.113921][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.266599][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.274219][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.283464][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.291250][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.313377][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.321618][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.328623][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.336024][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.344298][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.351349][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.379962][ T283] device veth0_vlan entered promiscuous mode [ 21.396347][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.404964][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.412578][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.421428][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.428791][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.436659][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.444673][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.452568][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.460753][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.467793][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.475197][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.483349][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.490400][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.497715][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.517066][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.530455][ T283] device veth1_macvtap entered promiscuous mode [ 21.561022][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.568715][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.577067][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.590872][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.599317][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.612198][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.620708][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.627746][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.635215][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.642958][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.651209][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.658221][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.665598][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.683090][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.691773][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.698786][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.706289][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.714658][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.721714][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.729279][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 21.750487][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.759082][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.767563][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.775706][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.783784][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.792007][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.799921][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.808411][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.816491][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.824561][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.834777][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.842311][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.858749][ T283] request_module fs-gadgetfs succeeded, but still no fs? [ 21.864988][ T285] device veth0_vlan entered promiscuous mode [ 21.875060][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.884072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.892673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.901765][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.910131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.918568][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.926706][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.934292][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.944455][ T288] device veth0_vlan entered promiscuous mode [ 21.961210][ T288] device veth1_macvtap entered promiscuous mode [ 21.970878][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.981122][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.989154][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.997730][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.006339][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.013389][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.020986][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.029230][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.037676][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.044763][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.052156][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.060478][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.068678][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.078168][ T286] device veth0_vlan entered promiscuous mode [ 22.093243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.100796][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.108290][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.117275][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.125982][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.134436][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 22.143888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.153995][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 22.162861][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.171347][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.179654][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.192664][ T285] device veth1_macvtap entered promiscuous mode [ 22.208884][ T286] device veth1_macvtap entered promiscuous mode [ 22.220504][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.229146][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.238112][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.247029][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.252742][ C1] hrtimer: interrupt took 26745 ns [ 22.255864][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.268028][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.276587][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.285353][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.293871][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.302351][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.326454][ T284] device veth0_vlan entered promiscuous mode [ 22.347641][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.363244][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.373003][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.381566][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.389926][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.398742][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.408106][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.416772][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.425219][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.433791][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.442583][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.451192][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.465930][ T284] device veth1_macvtap entered promiscuous mode [ 22.484835][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.525093][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.533032][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.541361][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.549676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.701779][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.725020][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.773094][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.853993][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.605333][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 24.605350][ T28] audit: type=1400 audit(1756936641.401:110): avc: denied { setopt } for pid=375 comm="syz.2.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 25.652352][ T394] syz.1.16[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.652423][ T394] syz.1.16[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.674733][ T28] audit: type=1400 audit(1756936642.491:111): avc: denied { cpu } for pid=392 comm="syz.3.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 25.782117][ T394] syz.1.16[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.782187][ T394] syz.1.16[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.886248][ T394] syz.1.16[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 25.933539][ T401] device wg2 entered promiscuous mode [ 25.958807][ T394] syz.1.16[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.130046][ T398] device pim6reg1 entered promiscuous mode [ 27.083378][ T28] audit: type=1400 audit(1756936643.901:112): avc: denied { create } for pid=423 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 28.540278][ C1] sched: RT throttling activated [ 29.684509][ T28] audit: type=1400 audit(1756936646.491:113): avc: denied { create } for pid=445 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.071303][ T28] audit: type=1400 audit(1756936646.601:114): avc: denied { relabelfrom } for pid=456 comm="syz.3.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.226228][ T28] audit: type=1400 audit(1756936646.601:115): avc: denied { relabelto } for pid=456 comm="syz.3.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 30.694463][ T362] syz.0.7 (362) used greatest stack depth: 21920 bytes left [ 31.215451][ T28] audit: type=1400 audit(1756936648.031:116): avc: denied { tracepoint } for pid=472 comm="syz.3.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 31.406781][ T28] audit: type=1400 audit(1756936648.221:117): avc: denied { create } for pid=485 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 31.606015][ T28] audit: type=1400 audit(1756936648.291:118): avc: denied { create } for pid=489 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 31.954548][ T504] device pim6reg1 entered promiscuous mode [ 32.502330][ T561] bond_slave_1: mtu less than device minimum [ 32.608483][ T551] device pim6reg1 entered promiscuous mode [ 32.820370][ T577] device pim6reg1 entered promiscuous mode [ 33.661914][ T599] syz.1.74[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.661994][ T599] syz.1.74[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.718878][ T599] syz.1.74[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.787062][ T599] syz.1.74[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.888741][ T599] syz.1.74[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.903200][ T618] device pim6reg1 entered promiscuous mode [ 33.953850][ T599] syz.1.74[599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 34.134897][ T626] device sit0 entered promiscuous mode [ 34.258314][ T633] device sit0 entered promiscuous mode [ 34.921330][ T661] device pim6reg1 entered promiscuous mode [ 35.047579][ T675] syz.1.93[675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.047651][ T675] syz.1.93[675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.063714][ T675] syz.1.93[675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.125950][ T675] syz.1.93[675] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.364330][ T691] bridge0: port 3(veth1_macvtap) entered blocking state [ 35.394447][ T691] bridge0: port 3(veth1_macvtap) entered disabled state [ 35.588426][ T28] audit: type=1400 audit(1756936652.401:119): avc: denied { create } for pid=713 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 35.923042][ T734] device pim6reg1 entered promiscuous mode [ 36.097676][ T28] audit: type=1400 audit(1756936652.911:120): avc: denied { create } for pid=736 comm="syz.4.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 36.159213][ T737] device veth1_macvtap left promiscuous mode [ 36.381406][ T28] audit: type=1400 audit(1756936653.191:121): avc: denied { create } for pid=731 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 37.911677][ T789] device veth1_macvtap left promiscuous mode [ 38.115512][ T799] device pim6reg1 entered promiscuous mode [ 39.943217][ T862] device wg2 entered promiscuous mode [ 41.114528][ T879] bpf_get_probe_write_proto: 2 callbacks suppressed [ 41.114546][ T879] syz.1.142[879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.141265][ T884] syz.2.143[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.152646][ T879] syz.1.142[879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.180406][ T884] syz.2.143[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.201518][ T879] syz.1.142[879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.242286][ T884] syz.2.143[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.270429][ T879] syz.1.142[879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.285117][ T884] syz.2.143[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.349966][ T884] syz.2.143[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 41.387521][ T884] syz.2.143[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.512152][ T28] audit: type=1400 audit(1756936659.331:122): avc: denied { ioctl } for pid=922 comm="syz.0.153" path="/dev/ppp" dev="devtmpfs" ino=158 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 42.963924][ T28] audit: type=1400 audit(1756936659.761:123): avc: denied { create } for pid=929 comm="syz.0.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 43.162042][ T928] device veth0_vlan left promiscuous mode [ 43.211984][ T928] device veth0_vlan entered promiscuous mode [ 43.260515][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.269400][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.277188][ T863] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.602364][ T966] Driver unsupported XDP return value 0 on prog (id 350) dev N/A, expect packet loss! [ 44.917890][ T1034] device pim6reg1 entered promiscuous mode [ 45.209214][ T28] audit: type=1400 audit(1756936662.021:124): avc: denied { create } for pid=1022 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 45.460668][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 45.588012][ T1070] device syzkaller0 entered promiscuous mode [ 46.260339][ T28] audit: type=1400 audit(1756936663.071:125): avc: denied { ioctl } for pid=1087 comm="syz.0.194" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 47.340357][ T28] audit: type=1400 audit(1756936664.151:126): avc: denied { create } for pid=1137 comm="syz.4.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 48.383803][ T1171] bpf_get_probe_write_proto: 4 callbacks suppressed [ 48.383818][ T1171] syz.0.218[1171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.503287][ T1171] syz.0.218[1171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.640666][ T1175] syz.0.218[1175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 48.695449][ T1175] syz.0.218[1175] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 49.787521][ T1204] device pim6reg1 entered promiscuous mode [ 50.201156][ T1219] syz.4.231[1219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.201244][ T1219] syz.4.231[1219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.686110][ T1243] device pim6reg1 entered promiscuous mode [ 51.065572][ T1265] device pim6reg1 entered promiscuous mode [ 51.195667][ T1268] device pim6reg1 entered promiscuous mode [ 51.314031][ T1270] kfree: port 1(veth0) entered blocking state [ 51.325976][ T1270] kfree: port 1(veth0) entered disabled state [ 51.342685][ T1270] device veth0 entered promiscuous mode [ 51.443405][ T1270] device vlan1 entered promiscuous mode [ 51.475891][ T1287] device pim6reg1 entered promiscuous mode [ 51.764847][ T1319] device pim6reg1 entered promiscuous mode [ 51.897948][ T1322] device pim6reg1 entered promiscuous mode [ 52.452175][ T28] audit: type=1400 audit(1756936669.271:127): avc: denied { associate } for pid=1340 comm="syz.2.268" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 52.811836][ T1354] device pim6reg1 entered promiscuous mode [ 54.404369][ T1407] tun0: tun_chr_ioctl cmd 1074025681 [ 57.113499][ T1516] device pim6reg1 entered promiscuous mode [ 58.962857][ T1576] device syzkaller0 entered promiscuous mode [ 59.348088][ T1594] device pim6reg1 entered promiscuous mode [ 59.728222][ T1596] device syzkaller0 entered promiscuous mode [ 59.983312][ T28] audit: type=1400 audit(1756936676.801:128): avc: denied { create } for pid=1605 comm="syz.4.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 61.412913][ T1659] device wg2 entered promiscuous mode [ 61.442156][ T28] audit: type=1400 audit(1756936678.261:129): avc: denied { create } for pid=1654 comm="syz.0.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 62.889440][ T1698] device syzkaller0 entered promiscuous mode [ 63.417246][ T1724] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.439307][ T1725] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.446403][ T1725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.702338][ T1860] device pim6reg1 entered promiscuous mode [ 68.017041][ T28] audit: type=1400 audit(1756936684.831:130): avc: denied { create } for pid=1869 comm="syz.4.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 68.490449][ T1892] device pim6reg1 entered promiscuous mode [ 68.539401][ T1894] device pim6reg1 entered promiscuous mode [ 68.659254][ T1903] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 68.668279][ T1903] dvmrp1: linktype set to 0 [ 68.807354][ T1903] dvmrp1: tun_chr_ioctl cmd 1074812117 [ 69.271180][ T1887] syz.2.405 (1887) used greatest stack depth: 21560 bytes left [ 69.334509][ T1929] device pim6reg1 entered promiscuous mode [ 71.500410][ T1967] device macsec0 entered promiscuous mode [ 72.284326][ T1976] device pim6reg1 entered promiscuous mode [ 72.377253][ T1977] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.384486][ T1977] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.457154][ T1977] device bridge_slave_1 left promiscuous mode [ 72.564049][ T1977] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.605903][ T28] audit: type=1400 audit(1756936689.421:131): avc: denied { create } for pid=1978 comm="syz.1.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 72.667406][ T1977] device bridge_slave_0 left promiscuous mode [ 72.810459][ T28] audit: type=1400 audit(1756936689.471:132): avc: denied { create } for pid=1978 comm="syz.1.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 72.828783][ T1977] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.136804][ T2000] device wg2 left promiscuous mode [ 74.272839][ T2002] device wg2 entered promiscuous mode [ 75.411651][ T2031] device wg2 left promiscuous mode [ 75.653550][ T2037] device syzkaller0 entered promiscuous mode [ 76.242837][ T2053] device pim6reg1 entered promiscuous mode [ 77.815268][ T2094] device wg2 left promiscuous mode [ 77.888722][ T2098] device pim6reg1 entered promiscuous mode [ 78.113247][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.173911][ T28] audit: type=1400 audit(1756936694.991:133): avc: denied { create } for pid=2099 comm="syz.4.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 78.217831][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.316500][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.622998][ T28] audit: type=1400 audit(1756936695.441:134): avc: denied { create } for pid=2115 comm="syz.1.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 78.882782][ T2110] device veth1_macvtap left promiscuous mode [ 79.406213][ T2146] bond_slave_1: mtu less than device minimum [ 80.068285][ T2140] device syzkaller0 entered promiscuous mode [ 80.272262][ T28] audit: type=1400 audit(1756936697.091:135): avc: denied { create } for pid=2174 comm="syz.1.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 80.331781][ T2176] device pim6reg1 entered promiscuous mode [ 80.373325][ T2183] syz.2.488[2183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.373396][ T2183] syz.2.488[2183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.163169][ T2211] device pim6reg1 entered promiscuous mode [ 81.332089][ T2225] device pim6reg1 entered promiscuous mode [ 82.115345][ T2245] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 82.168526][ T2245] dvmrp1: linktype set to 805 [ 82.406026][ T2261] device syzkaller0 entered promiscuous mode [ 82.562603][ T2266] device pim6reg1 entered promiscuous mode [ 83.193835][ T2285] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.324632][ T2296] device sit0 entered promiscuous mode [ 83.780915][ T2322] device pim6reg1 entered promiscuous mode [ 83.921270][ T2328] bond_slave_1: mtu less than device minimum [ 84.107264][ T2337] device sit0 left promiscuous mode [ 84.172736][ T2338] device sit0 entered promiscuous mode [ 85.079720][ T2371] device pim6reg1 entered promiscuous mode [ 85.301450][ T2381] device sit0 left promiscuous mode [ 85.425638][ T2381] device sit0 entered promiscuous mode [ 85.966288][ T2389] device pim6reg1 entered promiscuous mode [ 86.352562][ T2428] device pim6reg1 entered promiscuous mode [ 86.645574][ T2426] device pim6reg1 entered promiscuous mode [ 86.782692][ T2446] device pim6reg1 entered promiscuous mode [ 86.808511][ T2443] syz.4.566[2443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.822465][ T2443] syz.4.566[2443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.910963][ T2442] syz.4.566[2442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.923442][ T2442] syz.4.566[2442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.499673][ T2466] device syzkaller0 entered promiscuous mode [ 87.814448][ T28] audit: type=1400 audit(1756936704.631:136): avc: denied { ioctl } for pid=2489 comm="syz.2.582" path="socket:[23082]" dev="sockfs" ino=23082 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 88.135621][ T2526] device pim6reg1 entered promiscuous mode [ 88.868386][ T2540] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 88.870279][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 89.613158][ T2569] device pim6reg1 entered promiscuous mode [ 91.245078][ T2628] device veth1_macvtap left promiscuous mode [ 91.292410][ T2628] device macsec0 left promiscuous mode [ 95.061916][ T2729] device pim6reg1 entered promiscuous mode [ 95.103906][ T28] audit: type=1400 audit(1756936711.921:137): avc: denied { create } for pid=2725 comm="syz.2.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 95.281800][ T2718] device sit0 left promiscuous mode [ 95.775005][ T2724] device sit0 entered promiscuous mode [ 96.215761][ T2759] bond_slave_1: mtu less than device minimum [ 97.261392][ T2812] device sit0 left promiscuous mode [ 97.513425][ T2812] device sit0 entered promiscuous mode [ 98.653016][ T2867] device pim6reg1 entered promiscuous mode [ 99.532800][ T2881] device pim6reg1 entered promiscuous mode [ 99.868125][ T28] audit: type=1400 audit(1756936716.681:138): avc: denied { create } for pid=2892 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 100.332358][ T2924] device syzkaller0 entered promiscuous mode [ 101.162636][ T2962] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.169888][ T2962] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.639747][ T3016] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.647505][ T3016] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.705931][ T3024] device bridge_slave_1 left promiscuous mode [ 102.712582][ T3024] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.723905][ T3024] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.108640][ T28] audit: type=1400 audit(1756936719.921:139): avc: denied { create } for pid=3049 comm="syz.4.755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 103.487180][ T3059] device pim6reg1 entered promiscuous mode [ 106.861658][ T3156] device sit0 entered promiscuous mode [ 106.888671][ T3153] device pim6reg1 entered promiscuous mode [ 106.930458][ T3162] device pim6reg1 entered promiscuous mode [ 107.681850][ T3207] device pim6reg1 entered promiscuous mode [ 108.036748][ T28] audit: type=1400 audit(1756936724.851:140): avc: denied { create } for pid=3209 comm="syz.4.805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 108.920760][ T3249] device sit0 left promiscuous mode [ 109.406042][ T3252] device sit0 entered promiscuous mode [ 110.532099][ T28] audit: type=1400 audit(1756936727.341:141): avc: denied { create } for pid=3298 comm="syz.0.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 111.655157][ T28] audit: type=1400 audit(1756936728.471:142): avc: denied { create } for pid=3351 comm="syz.4.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 112.073772][ T3367] FAULT_INJECTION: forcing a failure. [ 112.073772][ T3367] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 112.088427][ T3367] CPU: 0 PID: 3367 Comm: syz.2.847 Not tainted syzkaller #0 [ 112.095731][ T3367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 112.105797][ T3367] Call Trace: [ 112.109057][ T3367] [ 112.111993][ T3367] __dump_stack+0x21/0x24 [ 112.116312][ T3367] dump_stack_lvl+0xee/0x150 [ 112.120902][ T3367] ? __cfi_dump_stack_lvl+0x8/0x8 [ 112.125906][ T3367] ? __schedule+0xb8f/0x14e0 [ 112.130472][ T3367] dump_stack+0x15/0x24 [ 112.134616][ T3367] should_fail_ex+0x3d4/0x520 [ 112.139272][ T3367] should_fail+0xb/0x10 [ 112.143407][ T3367] should_fail_usercopy+0x1a/0x20 [ 112.148427][ T3367] _copy_from_user+0x1e/0xc0 [ 112.153129][ T3367] ip6_tnl_siocdevprivate+0x474/0xe30 [ 112.158682][ T3367] ? preempt_count_add+0x90/0x1b0 [ 112.163714][ T3367] ? __cfi_ip6_tnl_siocdevprivate+0x10/0x10 [ 112.169614][ T3367] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 112.176388][ T3367] ? full_name_hash+0x9d/0xf0 [ 112.181102][ T3367] dev_ifsioc+0xbc4/0xed0 [ 112.185432][ T3367] ? ioctl_has_perm+0x391/0x4c0 [ 112.190288][ T3367] ? dev_ioctl+0xd10/0xd10 [ 112.194716][ T3367] ? __mutex_lock_slowpath+0xe/0x10 [ 112.199918][ T3367] ? mutex_lock+0xf8/0x1a0 [ 112.204334][ T3367] ? __cfi_mutex_lock+0x10/0x10 [ 112.209189][ T3367] ? dev_get_by_name_rcu+0xe5/0x130 [ 112.214385][ T3367] dev_ioctl+0x5f3/0xd10 [ 112.218644][ T3367] sock_ioctl+0x675/0x6e0 [ 112.222972][ T3367] ? __cfi_sock_ioctl+0x10/0x10 [ 112.227823][ T3367] ? security_file_ioctl+0x95/0xc0 [ 112.232935][ T3367] ? __cfi_sock_ioctl+0x10/0x10 [ 112.237789][ T3367] __se_sys_ioctl+0x12f/0x1b0 [ 112.242464][ T3367] __x64_sys_ioctl+0x7b/0x90 [ 112.247054][ T3367] x64_sys_call+0x58b/0x9a0 [ 112.251557][ T3367] do_syscall_64+0x4c/0xa0 [ 112.255969][ T3367] ? clear_bhb_loop+0x30/0x80 [ 112.260642][ T3367] ? clear_bhb_loop+0x30/0x80 [ 112.265318][ T3367] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 112.271208][ T3367] RIP: 0033:0x7f0e4e18ebe9 [ 112.275618][ T3367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.295239][ T3367] RSP: 002b:00007f0e4efa7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 112.303672][ T3367] RAX: ffffffffffffffda RBX: 00007f0e4e3c5fa0 RCX: 00007f0e4e18ebe9 [ 112.311643][ T3367] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 112.319615][ T3367] RBP: 00007f0e4efa7090 R08: 0000000000000000 R09: 0000000000000000 [ 112.327587][ T3367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.335553][ T3367] R13: 00007f0e4e3c6038 R14: 00007f0e4e3c5fa0 R15: 00007fffbafe9d38 [ 112.343536][ T3367] [ 114.017005][ T3401] device syzkaller0 entered promiscuous mode [ 114.055841][ T3417] FAULT_INJECTION: forcing a failure. [ 114.055841][ T3417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.120918][ T3417] CPU: 1 PID: 3417 Comm: syz.1.860 Not tainted syzkaller #0 [ 114.128258][ T3417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 114.138316][ T3417] Call Trace: [ 114.141601][ T3417] [ 114.144530][ T3417] __dump_stack+0x21/0x24 [ 114.149033][ T3417] dump_stack_lvl+0xee/0x150 [ 114.153714][ T3417] ? __cfi_dump_stack_lvl+0x8/0x8 [ 114.158743][ T3417] ? __schedule+0xb8f/0x14e0 [ 114.163506][ T3417] dump_stack+0x15/0x24 [ 114.167655][ T3417] should_fail_ex+0x3d4/0x520 [ 114.172339][ T3417] should_fail+0xb/0x10 [ 114.176497][ T3417] should_fail_usercopy+0x1a/0x20 [ 114.181521][ T3417] _copy_to_user+0x1e/0x90 [ 114.185942][ T3417] ip6_tnl_siocdevprivate+0x2e5/0xe30 [ 114.191313][ T3417] ? preempt_count_add+0x90/0x1b0 [ 114.196334][ T3417] ? __cfi_ip6_tnl_siocdevprivate+0x10/0x10 [ 114.202226][ T3417] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 114.208992][ T3417] ? full_name_hash+0x9d/0xf0 [ 114.213667][ T3417] dev_ifsioc+0xbc4/0xed0 [ 114.217997][ T3417] ? ioctl_has_perm+0x391/0x4c0 [ 114.222855][ T3417] ? dev_ioctl+0xd10/0xd10 [ 114.227268][ T3417] ? __mutex_lock_slowpath+0xe/0x10 [ 114.232470][ T3417] ? mutex_lock+0xf8/0x1a0 [ 114.236887][ T3417] ? __cfi_mutex_lock+0x10/0x10 [ 114.241748][ T3417] ? dev_get_by_name_rcu+0xe5/0x130 [ 114.246954][ T3417] dev_ioctl+0x5f3/0xd10 [ 114.251200][ T3417] sock_ioctl+0x675/0x6e0 [ 114.255626][ T3417] ? __cfi_sock_ioctl+0x10/0x10 [ 114.260485][ T3417] ? security_file_ioctl+0x95/0xc0 [ 114.265599][ T3417] ? __cfi_sock_ioctl+0x10/0x10 [ 114.270456][ T3417] __se_sys_ioctl+0x12f/0x1b0 [ 114.275135][ T3417] __x64_sys_ioctl+0x7b/0x90 [ 114.280170][ T3417] x64_sys_call+0x58b/0x9a0 [ 114.285200][ T3417] do_syscall_64+0x4c/0xa0 [ 114.289709][ T3417] ? clear_bhb_loop+0x30/0x80 [ 114.294391][ T3417] ? clear_bhb_loop+0x30/0x80 [ 114.299074][ T3417] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 114.304978][ T3417] RIP: 0033:0x7fd4bbf8ebe9 [ 114.309661][ T3417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.329269][ T3417] RSP: 002b:00007fd4bcda2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 114.337720][ T3417] RAX: ffffffffffffffda RBX: 00007fd4bc1c5fa0 RCX: 00007fd4bbf8ebe9 [ 114.345695][ T3417] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 0000000000000004 [ 114.353666][ T3417] RBP: 00007fd4bcda2090 R08: 0000000000000000 R09: 0000000000000000 [ 114.361635][ T3417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.369609][ T3417] R13: 00007fd4bc1c6038 R14: 00007fd4bc1c5fa0 R15: 00007ffe4ec43108 [ 114.377584][ T3417] [ 114.710378][ T3438] device pim6reg1 entered promiscuous mode [ 115.178517][ T3446] device pim6reg1 entered promiscuous mode [ 115.403827][ T3449] device pim6reg1 entered promiscuous mode [ 116.915279][ T3486] device syzkaller0 entered promiscuous mode [ 116.924791][ T3489] device pim6reg1 entered promiscuous mode [ 117.080816][ T3500] bridge0: port 3(veth1_macvtap) entered blocking state [ 117.098802][ T3500] bridge0: port 3(veth1_macvtap) entered disabled state [ 117.417499][ T28] audit: type=1400 audit(1756936734.231:143): avc: denied { read } for pid=3504 comm="syz.3.889" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 117.447038][ T28] audit: type=1400 audit(1756936734.231:144): avc: denied { open } for pid=3504 comm="syz.3.889" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 119.417845][ T3563] device pim6reg1 entered promiscuous mode [ 119.643700][ T3569] device pim6reg1 entered promiscuous mode [ 120.412682][ T3585] syz.2.911[3585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.412754][ T3585] syz.2.911[3585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 120.884434][ T3594] device pim6reg1 entered promiscuous mode [ 121.480645][ T3610] device pim6reg1 entered promiscuous mode [ 121.773321][ T3614] device pim6reg1 entered promiscuous mode [ 122.963622][ T3638] device pimreg0 entered promiscuous mode [ 123.092411][ T3649] device macsec0 entered promiscuous mode [ 123.124508][ T3651] device pim6reg1 entered promiscuous mode [ 123.170668][ T3660] device pim6reg1 entered promiscuous mode [ 123.992774][ T3685] device pim6reg1 entered promiscuous mode [ 125.243736][ T3721] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x31 [ 125.306796][ T3716] tap0: tun_chr_ioctl cmd 2147767506 [ 125.312296][ T3725] device pim6reg1 entered promiscuous mode [ 125.441787][ T3732] syz.3.951[3732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.560613][ T3738] syz.3.951[3738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 125.572312][ T3738] syz.3.951[3738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.206441][ T3782] device pim6reg1 entered promiscuous mode [ 128.667577][ T3859] device syzkaller0 entered promiscuous mode [ 128.738696][ T3868] device pim6reg1 entered promiscuous mode [ 129.644406][ T3944] device veth0_vlan left promiscuous mode [ 129.666645][ T3944] device veth0_vlan entered promiscuous mode [ 129.766793][ T3973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 129.775411][ T3973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 129.789560][ T3973] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 132.146528][ T4084] device pim6reg1 entered promiscuous mode [ 133.703778][ T4142] device pim6reg1 entered promiscuous mode [ 133.869007][ T4158] device pim6reg1 entered promiscuous mode [ 134.060627][ T4151] device wg2 entered promiscuous mode [ 134.273235][ T4178] device wg2 entered promiscuous mode [ 134.760355][ T4193] device pim6reg1 entered promiscuous mode [ 135.742026][ T4213] device sit0 left promiscuous mode [ 136.101196][ T4229] device sit0 left promiscuous mode [ 136.161040][ T4230] device sit0 entered promiscuous mode [ 136.285997][ T4244] device pim6reg1 entered promiscuous mode [ 137.027363][ T28] audit: type=1400 audit(1756936753.841:145): avc: denied { create } for pid=4254 comm="syz.1.1088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 137.348821][ T4263] bridge0: port 3(veth1_macvtap) entered blocking state [ 137.413881][ T4263] bridge0: port 3(veth1_macvtap) entered disabled state [ 137.807348][ T4285] device pim6reg1 entered promiscuous mode [ 139.423318][ T4332] device pim6reg1 entered promiscuous mode [ 142.497236][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 142.699344][ T28] audit: type=1400 audit(1756936759.511:146): avc: denied { create } for pid=4432 comm="syz.0.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 142.981469][ T4444] device pim6reg1 entered promiscuous mode [ 143.181081][ T4447] device sit0 left promiscuous mode [ 143.528500][ T4460] device syzkaller0 entered promiscuous mode [ 143.559455][ T4476] syz.2.1149[4476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.559528][ T4476] syz.2.1149[4476] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.770897][ T4485] device pim6reg1 entered promiscuous mode [ 144.817755][ T4518] device veth0_vlan left promiscuous mode [ 144.871820][ T4518] device veth0_vlan entered promiscuous mode [ 144.920590][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.945001][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 144.960377][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 145.058725][ T4526] device pim6reg1 entered promiscuous mode [ 145.244685][ T4538] device pim6reg1 entered promiscuous mode [ 146.691955][ T4590] device pim6reg1 entered promiscuous mode [ 146.813728][ T4602] bond_slave_1: mtu less than device minimum [ 147.187645][ T4614] device pim6reg1 entered promiscuous mode [ 147.414955][ T3970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.795371][ T4684] device pim6reg1 entered promiscuous mode [ 151.193434][ T4716] device sit0 entered promiscuous mode [ 151.860752][ T4732] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.041226][ T4736] device bridge_slave_1 left promiscuous mode [ 152.055234][ T4736] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.068581][ T4736] device bridge_slave_0 left promiscuous mode [ 152.076247][ T4736] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.131870][ T4737] device pim6reg1 entered promiscuous mode [ 153.107038][ T4772] tun0: tun_chr_ioctl cmd 35108 [ 153.580816][ T4797] device pim6reg1 entered promiscuous mode [ 154.227325][ T4815] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.238326][ T4815] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.702121][ T4817] device bridge_slave_1 left promiscuous mode [ 154.708323][ T4817] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.805631][ T4817] device bridge_slave_0 left promiscuous mode [ 154.811917][ T4817] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.057950][ T4866] device pim6reg1 entered promiscuous mode [ 156.165885][ T4868] device sit0 left promiscuous mode [ 156.232179][ T4870] device sit0 entered promiscuous mode [ 156.712061][ T4879] device pim6reg1 entered promiscuous mode [ 158.013029][ T4904] bridge0: port 3(veth1_macvtap) entered blocking state [ 158.020197][ T4904] bridge0: port 3(veth1_macvtap) entered disabled state [ 158.786739][ T4927] device pim6reg1 entered promiscuous mode [ 158.969232][ T4931] tap0: tun_chr_ioctl cmd 1074025677 [ 159.008538][ T4931] tap0: linktype set to 1 [ 160.374533][ T4956] device pim6reg1 entered promiscuous mode [ 160.433071][ T4951] device veth0_vlan left promiscuous mode [ 160.459588][ T4951] device veth0_vlan entered promiscuous mode [ 160.476689][ T3970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 160.485921][ T3970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 160.493789][ T3970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.696234][ T4974] syz.4.1284[4974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.696306][ T4974] syz.4.1284[4974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.743058][ T4976] syz.4.1284[4976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.871753][ T4976] syz.4.1284[4976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.922296][ T4974] syz.4.1284[4974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.994954][ T4974] syz.4.1284[4974] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.286403][ T5000] device sit0 left promiscuous mode [ 161.565115][ T5013] device pim6reg1 entered promiscuous mode [ 161.702315][ T5020] syz.0.1296[5020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.702467][ T5020] syz.0.1296[5020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.805595][ T5029] bond_slave_1: mtu less than device minimum [ 162.052240][ T5046] syz.0.1303[5046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.052319][ T5046] syz.0.1303[5046] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 162.622241][ T5072] device pim6reg1 entered promiscuous mode [ 163.345197][ T5115] device pim6reg1 entered promiscuous mode [ 163.689670][ T5129] dvmrp1: tun_chr_ioctl cmd 1074025677 [ 163.724421][ T5129] dvmrp1: linktype set to 778 [ 165.711845][ T5200] tap0: tun_chr_ioctl cmd 1074025677 [ 165.730368][ T5200] tap0: linktype set to 776 [ 166.982537][ T5234] device pim6reg1 entered promiscuous mode [ 167.013398][ T5231] device pim6reg1 entered promiscuous mode [ 167.824646][ T5273] device syzkaller0 entered promiscuous mode [ 168.418576][ T5295] device pim6reg1 entered promiscuous mode [ 168.784296][ T5322] device pim6reg1 entered promiscuous mode [ 169.998406][ T5359] bpf_get_probe_write_proto: 16 callbacks suppressed [ 169.998425][ T5359] syz.2.1386[5359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.013141][ T5359] syz.2.1386[5359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.071698][ T5356] device pim6reg1 entered promiscuous mode [ 170.111275][ T5359] syz.2.1386[5359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.111356][ T5359] syz.2.1386[5359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.239436][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.271399][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.284302][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.335887][ T5367] device pim6reg1 entered promiscuous mode [ 171.642129][ T5418] syz.2.1403[5418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.642204][ T5418] syz.2.1403[5418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.655558][ T5418] syz.2.1403[5418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.667330][ T5418] syz.2.1403[5418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.277353][ T5453] device pim6reg1 entered promiscuous mode [ 172.865539][ T5458] device syzkaller0 entered promiscuous mode [ 172.942742][ T5468] syz.4.1420[5468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.942812][ T5468] syz.4.1420[5468] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.333825][ T28] audit: type=1400 audit(1756936791.151:147): avc: denied { create } for pid=5516 comm="syz.1.1435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 176.303108][ T5571] bpf_get_probe_write_proto: 4 callbacks suppressed [ 176.303125][ T5571] syz.4.1449[5571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.347348][ T5571] syz.4.1449[5571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.551836][ T5573] device pim6reg1 entered promiscuous mode [ 177.240881][ T5579] device syzkaller0 entered promiscuous mode [ 177.608439][ T5618] €Â0: renamed from pim6reg1 [ 177.718701][ T5622] device pim6reg1 entered promiscuous mode [ 177.829517][ T5627] device syzkaller0 entered promiscuous mode [ 177.865976][ T5628] syz.1.1465[5628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.866116][ T5628] syz.1.1465[5628] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.090163][ T5686] device syzkaller0 entered promiscuous mode [ 180.765158][ T5681] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.785488][ T5681] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.970206][ T5681] device bridge_slave_0 entered promiscuous mode [ 181.040455][ T5681] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.047519][ T5681] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.099770][ T5681] device bridge_slave_1 entered promiscuous mode [ 181.316918][ T5716] device sit0 left promiscuous mode [ 181.542409][ T3970] device veth0 left promiscuous mode [ 181.550451][ T3970] kfree: port 1(veth0) entered disabled state [ 181.856118][ T28] audit: type=1400 audit(1756936798.671:148): avc: denied { create } for pid=5681 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 181.910291][ T28] audit: type=1400 audit(1756936798.691:149): avc: denied { write } for pid=5681 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 181.967921][ T28] audit: type=1400 audit(1756936798.691:150): avc: denied { read } for pid=5681 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 182.035564][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.044778][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.069701][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.089300][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.102303][ T956] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.109390][ T956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.124658][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.133446][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.142533][ T956] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.149615][ T956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.186991][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.247056][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.282048][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.330826][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 182.343622][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 182.352065][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 182.359587][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.369790][ T5681] device veth0_vlan entered promiscuous mode [ 182.487769][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 182.516808][ T5681] device veth1_macvtap entered promiscuous mode [ 182.606271][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 182.666875][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 182.769884][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.806124][ T3968] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 182.897909][ T5759] syz.3.1501 (5759) used obsolete PPPIOCDETACH ioctl [ 183.891910][ T5793] syz.1.1509 (5793) used greatest stack depth: 21472 bytes left [ 184.763050][ T28] audit: type=1400 audit(1756936801.581:151): avc: denied { ioctl } for pid=5842 comm="syz.2.1522" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 185.252131][ T5853] device wg2 entered promiscuous mode [ 186.475830][ T5906] device syzkaller0 entered promiscuous mode [ 187.199962][ T5927] device syzkaller0 entered promiscuous mode [ 187.274063][ T5942] device syzkaller0 left promiscuous mode [ 187.912646][ T5982] device veth1_macvtap left promiscuous mode [ 187.996939][ T5994] device macsec0 entered promiscuous mode [ 188.010426][ T5994] device veth1_macvtap entered promiscuous mode [ 188.092128][ T5997] device syzkaller0 entered promiscuous mode [ 188.681604][ T6034] device pim6reg1 entered promiscuous mode [ 190.658504][ T6088] device wg2 left promiscuous mode [ 190.780533][ T6086] device wg2 entered promiscuous mode [ 191.286706][ T28] audit: type=1400 audit(1756936808.101:152): avc: denied { create } for pid=6127 comm="syz.2.1599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 191.454177][ T28] audit: type=1400 audit(1756936808.271:153): avc: denied { create } for pid=6135 comm="syz.3.1601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 192.439901][ T6182] syz.2.1611[6182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 192.439978][ T6182] syz.2.1611[6182] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.000748][ T6211] device sit0 entered promiscuous mode [ 193.985476][ T6238] device syzkaller0 entered promiscuous mode [ 194.033708][ T6243] syz.3.1627[6243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.033779][ T6243] syz.3.1627[6243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.384321][ T6285] device wg2 entered promiscuous mode [ 196.051925][ T6301] syz.6.1642[6301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.051995][ T6301] syz.6.1642[6301] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.799266][ T6339] syz.2.1654[6339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.864717][ T6339] syz.2.1654[6339] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.012912][ T6358] device pim6reg1 entered promiscuous mode [ 198.523938][ T6399] syz.1.1671[6399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.524009][ T6399] syz.1.1671[6399] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.733552][ T6405] device pim6reg1 entered promiscuous mode [ 198.756591][ T6387] device veth0_vlan left promiscuous mode [ 198.774569][ T6387] device veth0_vlan entered promiscuous mode [ 198.974150][ T6417] device pim6reg1 entered promiscuous mode [ 199.167492][ T6419] device sit0 entered promiscuous mode [ 199.449402][ T6431] device veth1_macvtap entered promiscuous mode [ 199.533574][ T6431] device macsec0 entered promiscuous mode [ 199.664992][ T956] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.247918][ T6456] syz.1.1686[6456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.247987][ T6456] syz.1.1686[6456] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.399649][ T6458] device pim6reg1 entered promiscuous mode [ 200.506774][ T3947] IPv6: ADDRCONF(NETDEV_CHANGE): pim6reg1: link becomes ready [ 200.621676][ T6471] device pim6reg1 entered promiscuous mode [ 201.663739][ T6522] syz.6.1702[6522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.663815][ T6522] syz.6.1702[6522] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.676691][ T6520] device pim6reg1 entered promiscuous mode [ 201.797963][ T3947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.828774][ T6529] device pim6reg1 entered promiscuous mode [ 202.417739][ T6571] syz.1.1716[6571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.417810][ T6571] syz.1.1716[6571] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.443399][ T6569] device veth1_macvtap left promiscuous mode [ 202.568198][ T6569] device macsec0 left promiscuous mode [ 202.613364][ T6568] device veth1_macvtap entered promiscuous mode [ 202.619673][ T6568] device macsec0 entered promiscuous mode [ 202.640365][ T3947] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.707930][ T6582] device syzkaller0 entered promiscuous mode [ 202.751272][ T6593] device pim6reg1 entered promiscuous mode [ 202.983128][ T6599] syzkaller: port 1(erspan0) entered blocking state [ 202.990272][ T6599] syzkaller: port 1(erspan0) entered disabled state [ 202.997312][ T6599] device erspan0 entered promiscuous mode [ 203.044317][ T6620] device pim6reg1 entered promiscuous mode [ 203.224222][ T6633] syz.0.1734[6633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.224294][ T6633] syz.0.1734[6633] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.259994][ T6631] device sit0 entered promiscuous mode [ 204.053271][ T6639] device syzkaller0 entered promiscuous mode [ 204.134614][ T6667] bond_slave_1: mtu less than device minimum serialport: VM disconnected.