last executing test programs: 2m56.7689581s ago: executing program 0 (id=3624): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xab, 0xab, 0x5, [@datasec={0xf, 0x3, 0x0, 0xf, 0x3, [{0x1, 0x10000, 0x85e}, {0x4, 0xff, 0x1}, {0x3, 0xffffff7f, 0x40}], "ccd8a5"}, @func={0xf, 0x0, 0x0, 0xc, 0x4}, @enum={0x9, 0x5, 0x0, 0x6, 0x4, [{0xf, 0x9}, {0xd, 0x8}, {0xd, 0x9}, {0x5, 0x8}, {0x7, 0xe293}]}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @var={0xc, 0x0, 0x0, 0xe, 0x3, 0x1}, @var={0xe, 0x0, 0x0, 0xe, 0x5}, @func={0x1, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x2e, 0x0, 0x2e]}}, &(0x7f00000005c0)=""/87, 0xc9, 0x57, 0x0, 0xfffffffa, 0x10000, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x8f, 0x9, 0x200, r0, 0xcff, '\x00', r2, r3, 0x2, 0x0, 0x3, 0xa, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="08000000040003000400000022bf000000000000", @ANYRES32, @ANYBLOB="ffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r7}, &(0x7f0000000280), &(0x7f00000002c0)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r9}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m56.252845929s ago: executing program 0 (id=3629): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80040, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000480)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r0}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x9, &(0x7f0000000680)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x80, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0xffffffff, 0x1000, 0x1, 0x28, 0xffffffffffffffff, 0x9, '\x00', r1, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x3, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)) openat$cgroup_int(r5, &(0x7f0000000240)='io.bfq.weight\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x19, &(0x7f0000000a40)=@framed={{}, [@ldst={0x1, 0x1, 0x1, 0xb, 0x1, 0x0, 0x8}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xea0}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @generic={0x8, 0x1, 0x4, 0x3, 0xffffdff7}, @jmp={0x5, 0x0, 0xa, 0x7, 0x1, 0xfffffffffffffff4}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4df5}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2m50.526670604s ago: executing program 2 (id=3675): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)='\'', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) close(r3) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) (async) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) write$cgroup_pid(r3, 0x0, 0x7ffffffff000) syz_clone(0x10000, &(0x7f0000000200)="48d5f2c4ac134f67c25461a84b8e106fd5f4b6a78203280d76690ed8f7c942f8c0f376de88db88aaef2e4f6746ed0c1d0681eb32108893df038a119fe7bf92ddef5f70964682e39a20c0307c4c372d2864a34704d168760f968adaa116da5efab35b8c2b1f66b587", 0x68, &(0x7f0000000000), &(0x7f0000000380), &(0x7f00000003c0)="31c17dcf338463448d175b7f3b67ce8d7cde086bb55c1c4e17fdcd4c90c6fb5e823fcc85c56a5bf749d3ee2dc8453be5f6ca232481fd57f324afca2bc542a3c28e465c") (async) r4 = syz_clone(0x10000, &(0x7f0000000200)="48d5f2c4ac134f67c25461a84b8e106fd5f4b6a78203280d76690ed8f7c942f8c0f376de88db88aaef2e4f6746ed0c1d0681eb32108893df038a119fe7bf92ddef5f70964682e39a20c0307c4c372d2864a34704d168760f968adaa116da5efab35b8c2b1f66b587", 0x68, &(0x7f0000000000), &(0x7f0000000380), &(0x7f00000003c0)="31c17dcf338463448d175b7f3b67ce8d7cde086bb55c1c4e17fdcd4c90c6fb5e823fcc85c56a5bf749d3ee2dc8453be5f6ca232481fd57f324afca2bc542a3c28e465c") write$cgroup_pid(r3, &(0x7f0000000440)=r4, 0x12) (async) write$cgroup_pid(r3, &(0x7f0000000440)=r4, 0x12) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000280)=""/230, 0xe6}], 0x1}, 0x0) 2m50.145251273s ago: executing program 2 (id=3678): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x367, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0b06000000010000eefffffffffffffe00000039", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r12, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYRESDEC=0x0, @ANYRESOCT=r12, @ANYRES16=r4, @ANYRES32=r1, @ANYRES16=r3], 0x128}, 0x10081) recvmsg$unix(r11, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r13}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2m49.715859162s ago: executing program 0 (id=3680): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000200)='+', 0x1}, {0x0}, {0x0}], 0x4}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020f00f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19080000000000000400e6ff0300000404000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r4}, &(0x7f00000004c0), &(0x7f0000000500)=r5}, 0x20) syz_clone(0x28280000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) r9 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000c40), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r10, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x19, 0xb, &(0x7f0000000240)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x4, 0x73, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x7, 0x0, &(0x7f00000003c0)=[{0x0, 0x4, 0xc, 0x4}, {0x3, 0x3, 0x2000e, 0x5ece48105434dadb}, {0x6, 0x5, 0x1, 0x9}, {0x2, 0x5, 0x7, 0x6}, {0x0, 0x2, 0xe, 0xd}, {0x0, 0x1, 0x13, 0x5}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x11, @void, @value}, 0x94) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2m49.17174891s ago: executing program 2 (id=3684): socketpair$tipc(0x1e, 0x1, 0x0, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000c40)="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", 0x137}, {&(0x7f0000001c80)="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", 0x472}], 0x2}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009568"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000440)="ea36d639422ed9594c4014dda5b67fa3c01b411c148d6f01a4292ba874438736b6fabbd1e46a6672dca054fa829667c754e4fcde47b8c423c1050dfe4e245dafe277337a0ad7871b6b1ba36f97fb630d3129e03634fae9b10f63db8d04fecbcc14beb5339a8d8ec0164b8ced1ce481d1b35981249d20acea3dcd", &(0x7f0000000600)=""/201}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYRES16=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8912, &(0x7f0000000080)) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x1, 0x9, 0xae, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0xc00000000000000, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4002, 0x0, r4, 0x1e, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x19, 0x4, 0x4, 0x1ffff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2m48.90313449s ago: executing program 2 (id=3686): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x87, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2m48.77896192s ago: executing program 0 (id=3687): getpid() r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x10, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xdb, &(0x7f0000000100)=""/219, 0x41000, 0x41, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x6, 0x10, 0x3}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000280)=[0x1, 0x1], &(0x7f00000002c0)=[{0x1, 0x4, 0x2, 0xa}, {0x2, 0x3, 0x9, 0xd}, {0x4, 0x5, 0xe, 0x5}, {0x3, 0x4, 0xe, 0xa}, {0x3, 0x2, 0x5, 0x9}, {0x1, 0x4, 0x8, 0x7}, {0x3, 0x5, 0x8, 0x2}, {0x1, 0x1, 0xc, 0x8}, {0x5, 0x4, 0xc, 0x1}, {0x4, 0x4, 0x9, 0xb}], 0x10, 0x9393, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000000)='svcrdma_decode_wseg\x00', r0, 0x0, 0x816}, 0x18) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x2e, &(0x7f0000000740)=[{}, {}], 0x10, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xe9, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000980), 0x8) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)=@generic={&(0x7f0000000a40)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000b40)={{0x1, 0xffffffffffffffff}, &(0x7f0000000ac0), &(0x7f0000000b00)='%pi6 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)=r0}, 0x20) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)=@base={0x8, 0x80000001, 0xfffffff9, 0x80, 0x24800, 0x1, 0x3b, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000cc0)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0xfffffff0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x1d, 0xa, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @exit, @generic={0xd, 0xa, 0x7, 0x3, 0x6}]}, &(0x7f0000000580)='syzkaller\x00', 0x3, 0x76, &(0x7f00000005c0)=""/118, 0x41100, 0x1, '\x00', r4, @lsm=0x1b, r5, 0x8, &(0x7f00000009c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000a00)={0x3, 0x1, 0xf3e, 0x1}, 0x10, 0x0, r0, 0x3, &(0x7f0000000d40)=[r6, r7, r8, 0xffffffffffffffff, r9, r10], &(0x7f0000000d80)=[{0x5, 0x4, 0xe}, {0x2, 0x2, 0x10, 0x8}, {0x5, 0x4, 0xa, 0x8}], 0x10, 0x2, @void, @value}, 0x94) close(r0) openat$cgroup_freezer_state(r5, &(0x7f0000000e80), 0x2, 0x0) ioctl$TUNGETVNETBE(r5, 0x800454df, &(0x7f0000000ec0)=0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001000)={&(0x7f0000000f00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@struct={0x5, 0x2, 0x0, 0x4, 0x0, 0x1, [{0x3, 0x4, 0x7}, {0x3, 0x2, 0x2}]}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x6c, 0x0, 0x6, 0x7}]}, {0x0, [0x61, 0x61, 0x2e, 0x61, 0x0, 0x30, 0x5f]}}, &(0x7f0000000f80)=""/125, 0x55, 0x7d, 0x1, 0x6, 0x0, @void, @value}, 0x28) r11 = perf_event_open$cgroup(&(0x7f0000001080)={0x2, 0x80, 0x3a, 0x4, 0x92, 0x0, 0x0, 0x508e, 0x1c0, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000001040), 0x4}, 0x10000, 0x7, 0x0, 0x7, 0x0, 0x9, 0x8, 0x0, 0x7, 0x0, 0x6}, r0, 0x2, 0xffffffffffffffff, 0xd) write$cgroup_type(0xffffffffffffffff, &(0x7f0000001100), 0x9) r12 = openat$cgroup_ro(r5, &(0x7f0000001140)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f0000001180)='\x00') r13 = openat$tun(0xffffffffffffff9c, &(0x7f00000011c0), 0x80000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000001200)='btrfs_trigger_flush\x00', r2, 0x0, 0x8}, 0x18) ioctl$TUNSETNOCSUM(r13, 0x400454c8, 0x0) r14 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000012c0)=@generic={&(0x7f0000001280)='./file0\x00', 0x0, 0x28}, 0x18) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000001300)={'netdevsim0\x00', 0x1000}) r15 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001800)={r3}, 0x4) sendmsg$unix(r12, &(0x7f0000001880)={&(0x7f0000001340)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001780)=[{&(0x7f00000013c0)="ee8abecbacef9f11cb0bc71b321370697f6f88f6aed5eceb6c826570b2e7d8bab247454b53a8a0241453e34400266988dbedae3b19771eee251777215084dee95b456c880427090faa0fbda4b62e84cc0a300dfc7b0dc72b3bade023d4bae956129be5db5e117baada0f301d47e9f3048b9dfff4cb0bbc478553bf11b30ed17ec88a9dd328f3fcc6669043173a9820bc7bf678071fa6bfb8d81fa83204f2fe5a80efeddf1a2da0143eacec54e3d8233bb88ae125a6dc729069ddc7170fae7e529014cda50d4db3f663e84822f7771567c05337ec4e37ef3cd7229be8d5b2e674", 0xe0}, {&(0x7f00000014c0)="a208626b1b5409f55175a6401392f50ea91070", 0x13}, {&(0x7f0000001500)="79107683d5d38ea3cc93e8a51f6c7d6cb732ed3d69eb97081ce8f5c40631fc4f8ecd83a8e1d071106969dbf6846440149dc6925cd286dcb210e2944de82203435d2c1f3e9a5c9fec4bb877ab4a4dbaf607d2d48df67641081e3e6fdc447c73f61bcd6715688d3d3483fed73e30e2e378346b505114b2223b768ca3ed0f9c9f2558731fe21bf56b4cc278775bd2bcfacf4f185e506014bf5d77aea9643828547cb3083c4082741ea8187a24388bde8050e0a5ab7e57099c0c0e73e5f88c270d2abfc3633d3c67e7530f59bc10e2", 0xcd}, {&(0x7f0000001600)="0f700729613e494347ce6b32bd4adfdd3bdf2031555dcd9a4345afb6d9926341232bbdcf15f413f06b264b72153d62408cc1f3bbefb612bf207bb7dd4275692b4f3be99aff14e7f80e98bc54fc84c10578504b52dd59a086e1afe33614a25fbf57f2d4cbc53664f66a7a5975a43de2ce9013d1f628fe557d85135a3718e1", 0x7e}, {&(0x7f0000001680)="409fbda9b64143d2fd864d143f8641a4e17d2e00d764ccc6eaeb5e7c56477fbd36ff7a85d10cadbc7aacac2a1b4f65dea51e372acf656a81c1e04b8d33b1f2089c73464ba3d058fbfd92ef7ac1e211477168e32f497004c9ffb3d06e47d2633a57bf6ac44f7e4eb514f63200b61a2d30047a6568ad1b38f2ead2f77437011d5bdd0b4c3140f285530424c7cd29437f3d212415fbdf06d3e11af65e2e83b17020531ab85111d8c3124a645675916b82ea562fafce707502dd4b4178122a7c0f2de0a5ccde2b", 0xc5}], 0x5, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [r15]}}], 0x18, 0x80}, 0x4040001) r16 = bpf$TOKEN_CREATE(0x24, &(0x7f0000001940)={0x0, r14}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@base={0x1b, 0x5, 0xae8, 0xe0a, 0x12040, r8, 0x80000000, '\x00', 0x0, r12, 0x2, 0x2, 0x5, 0x0, @void, @value, @value=r16}, 0x50) 2m48.662563209s ago: executing program 2 (id=3692): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000000000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018030000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000030000008500000053000000bf0900000000000055090100000000009500000000000000b702000000000000632af0ff0000000026090800000000007b9af0ff00000000bf8600000000000044080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018280000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000015000000760000e4be980000000000001e080000000000008500000007000000b70000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_open_procfs$namespace(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000002c0)={'ip6_vti0\x00', @random="0eb15c5700df"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x15}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2e00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x8, [@type_tag={0x4, 0x0, 0x0, 0x12, 0x2}, @typedef={0x6, 0x0, 0x0, 0x8, 0x2}, @decl_tag={0x8, 0x0, 0x0, 0x11, 0x2, 0x3}, @var={0x8, 0x0, 0x0, 0xe, 0x4}]}, {0x0, [0x30, 0x5f, 0x5f, 0x0, 0x2e, 0x5f]}}, &(0x7f0000000500)=""/190, 0x58, 0xbe, 0x0, 0x8001, 0x0, @void, @value}, 0x28) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100), 0x20102, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000022000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e0500009cb20d03e7564c35a8d36774d5e5003a14817ac61e4dd19699a13477bf7e060e3670ef0e789f65f105006704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a080600000002000000ff000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3957663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964ecbeba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea69f5e4be1b8e0d6697e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f274d7fafc8d757d33dfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c338615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b5476fb20407ff7098b7174bef66fa03a99b5c1c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81abfa15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553572548104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f32744a8c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf6770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6970982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980ede51116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c60100f36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e6887dd7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbc8b8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c545b28211a92000000001501aed8972af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6b88023e80da74fdf723c7f05e96d738989f2c8b1e6b3a9716b6130a09e2698b12d8ae4d329f305fde3e8dec42eae3c69988ad568543a715755110c8dff124a6ba9ee1dc32ea7d17a35a420133c7df262a30cbff8790d80fd4def27ff1b268014daec1b0d1d2864bf010801f092efac0b349b86631d2a7455a72c0e7f43730b78e9beb255188acb12f3770fcc2223ba034181d9c3acef5b6d9ee77883ca12cfd68a5db88cc94c65a9fd1d070387a351905240b0b1920429109032ddc3cf9bf4ba32f594d45478bca432bdeb1a21fd5b5c2c416ed8eeabade9e2002b4e714dc3d7476fa52fedc0d0e6bed973e3aa468597810c13a8c40d9845bf0080850f309ec4dc5f88ef54b6674d8402f8ccd86d33edb1894e46b793641e9bf407b7c8b2b4b555f07467c96828163ce30fd4c24b108df352bc32eae5b1e3adecf6cf8d2bc3549f49c14a553683499b707a422e98082456c0dcf3f7155db062dfad1e92af9708dca9b70a77f4b88c06f8ee7a43df5f5ac21a6ed194102abaa0970000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r7, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x8004745a, 0x2000000c) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_subtree(r8, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0xfdef) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000380)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x1, 0x3}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000680)="2ef6c890d2150a4c6b30970a6aa254b41c8127ee9607c31c028b96ba60ceffecc6379632b1149718094a70a45c4b9133da85a079734a56aa4c9a278364f21f05c54fe5e6e0830d483187fe9ff59b0bfec29a444ca6b3010ea3ee8efd53343a4f54f77394ecb8c5d35c53a1a493f34b86005e5e3def4a5381407d3726e3c3f1a3719c65cb8b41259163af19f00f467a5f193b97dc1642f11595a69fc72dd526d84901afbb68531aeb60880d64c2a6474da8e530c47943ed40658910db85358403d4fc501f57e1700d24870a5500b4c4d6403360303cc56b637a18d02a45cbc7ef", 0xe0}], 0x1, &(0x7f0000000780)="565f65b814e8f1fe1cae93d739f09f1289d44319d7eb8e8ffda6f83322d387bf45b0b857d9eab83fa84eef", 0x2b, 0x1}, 0x20000000) write$cgroup_subtree(r9, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x2b, 'pids'}]}, 0xb) recvmsg$unix(r1, 0x0, 0x1) 2m48.611989799s ago: executing program 0 (id=3693): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"/2458], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="ffffffff00001300050400000180000003060000069af8d0d5", @ANYRES32, @ANYBLOB="f6ffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000010000000600"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdb, &(0x7f0000000600)=[{}], 0x8, 0x10, &(0x7f0000000640), &(0x7f0000000680), 0x8, 0x81, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x9, 0x20, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [@cb_func, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x600f28a236f51301}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000380)='GPL\x00', 0x0, 0x38, &(0x7f00000003c0)=""/56, 0x0, 0x3, '\x00', r5, @fallback=0x63885e18560bf98a, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x56, 0x3}, 0x10, r6, r2, 0x0, 0x0, 0x0, 0x10, 0x1000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r7 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) 2m48.547959989s ago: executing program 2 (id=3697): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000020000006b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="b7f569e9f34ce5912c13eb9ec7fd1989963b6dee55b5ed02c3b49d88c74842fd8c08371a677364e98ff898dbe997d23b9b1a4c6b97efc125b515cc9cc47f768a7f2a5529b0554b", @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=ANY=[@ANYRES32, @ANYBLOB="0000000000000040000000000700000000000000ff377b8856b3c93f64e29981d88a9cfaececbafdd8bc62894b32c66216ac44e01a13cfbaeb5457038884802321f102c9fdc1b313859117b7d66d07e96573842972e4", @ANYRES32=0x0, @ANYRES16, @ANYRESDEC=r6], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001340)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 2m48.544326019s ago: executing program 0 (id=3698): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x1, 0xff, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) write$cgroup_subtree(r1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m48.506402519s ago: executing program 32 (id=3697): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000020000006b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="b7f569e9f34ce5912c13eb9ec7fd1989963b6dee55b5ed02c3b49d88c74842fd8c08371a677364e98ff898dbe997d23b9b1a4c6b97efc125b515cc9cc47f768a7f2a5529b0554b", @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=ANY=[@ANYRES32, @ANYBLOB="0000000000000040000000000700000000000000ff377b8856b3c93f64e29981d88a9cfaececbafdd8bc62894b32c66216ac44e01a13cfbaeb5457038884802321f102c9fdc1b313859117b7d66d07e96573842972e4", @ANYRES32=0x0, @ANYRES16, @ANYRESDEC=r6], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001340)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 2m48.497112289s ago: executing program 33 (id=3698): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x1, 0xff, 0x0, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) write$cgroup_subtree(r1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 11.911557744s ago: executing program 1 (id=5329): bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172f55e08fb5fe56, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_config_ext={0x401, 0x3}, 0x0, 0x0, 0xfffffffc, 0x0, 0x3, 0x0, 0x401, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x10, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000069117e0000000000c6000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020722500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) close(r0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x80087601, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x3, 0x6, 0xfffffffb, 0x6240, 0xffffffffffffffff, 0xb6e, '\x00', 0x0, r2, 0x2, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x22, 0x6, 0x8, &(0x7f0000000080)) 10.986605811s ago: executing program 1 (id=5334): r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffbffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000071003100000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e2e01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cdf2ac0d93263ff755d611c4cca1684b1470af6a83366aa430ad2d700b186da622d6fba70000000000000000000000000200"/173], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 10.891729221s ago: executing program 1 (id=5338): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', r1, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={0x1, 0x58, &(0x7f0000000200)}, 0x10) (async) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000300)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0xffffffff, '\x00', r1, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r2}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 10.784400231s ago: executing program 1 (id=5341): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, r2, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000440)={0x0, r5}, 0x6) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000005000080850000007d00000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000640)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r9}, 0x18) r10 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYRESDEC=r8, @ANYRES32=r7, @ANYBLOB="0100000000000000000000000040080000000000", @ANYRESOCT=r5, @ANYRES32=r10, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x403, 0xe9589, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x401, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) socketpair(0x2a, 0x9, 0x3, &(0x7f0000000680)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r11, &(0x7f0000000000), 0xfdef) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b000000b765f3ed5000"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="0800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000000f000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000ba000000b7000000000000009500000000"], &(0x7f0000001a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) 10.57494489s ago: executing program 1 (id=5343): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={&(0x7f00000004c0)="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", 0x0, 0x0, 0x0, 0x1}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000005000000020000000700000000000000", @ANYRES32, @ANYBLOB='&f\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000f0000000000000000000016001400"/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f00000004c0), 0x75, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b708000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x80, 0x3, 0x4, 0xff, 0x99, 0x0, 0xc5f, 0x1120, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x101, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x90, 0x6, 0x7fffffff, 0x8, 0x8, 0xffff, 0xffff, 0x0, 0x200, 0x0, 0x708}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000340)='-:&&@\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r4, 0x58, &(0x7f0000000200)}, 0x10) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x9, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000040030000000000000000000007000000ffffffff2500feff000000009500000000000000039dd2c9eeaa8a9087f0edd8975c84257deb868183ba82bfaefaf4f0da82d5b11fe785bec155ed033ffc1d1c0b852b7ec786505986b8e0b6b47da413241636577a3a6f6deebf7b6bb96911f415d5e1da1d0b8c0a76bd06623a60d701576c2e3fa207b5f8f206b435121791c39ab3e0827142a59223077ae6618110d038a70d29fa702341"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000006000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYRESOCT=r0], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10.47134516s ago: executing program 1 (id=5346): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d80)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0xa, &(0x7f0000000300), 0xdb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 10.414155829s ago: executing program 34 (id=5346): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d80)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0xa, &(0x7f0000000300), 0xdb) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3.892287802s ago: executing program 4 (id=5432): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="b400000000000000dd0a0000000000006301a4000000000095000000000000006681fabfa7afdea451352385fd277a26b1928972a90713774dee000000008abeded0f241d9e16380276de7f845fb77f3942b1b2f835d2704d284651cec42865a01e610e1d8ebed3bca771dd8dfc94bf8454e0ba5feb0a8fb9c709340a7"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb5, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001d00)={r0, 0x26, &(0x7f0000002040)}, 0x6d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000800000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000eeff7b8af8ff00000000bfa200000000000007f5fffff7ffffffb703000008000000b7040000000000008500000003000000850000002a0000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r4}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}], 0x10, 0x10, &(0x7f0000000380), &(0x7f0000000180), 0x8, 0x8d, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) 3.113151599s ago: executing program 4 (id=5435): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xff0, &(0x7f000062b000)=""/4080, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3d) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x2102, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.921394969s ago: executing program 5 (id=5438): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000002c00)=ANY=[], 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) 1.899157056s ago: executing program 4 (id=5441): r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4010}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x2, 0x16, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc1, 0x0, 0x0, 0x0, 0xe}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x400}}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}}, @ldst={0x3, 0x1, 0x0, 0xb, 0x0, 0x1, 0x9c814b2d30059fe5}]}, &(0x7f0000000440)='GPL\x00', 0x40, 0x17, &(0x7f0000000480)=""/23, 0x41000, 0x3, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0x5, 0x7, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, &(0x7f0000000540)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000580)=[{0x4, 0x2, 0xf, 0xb}, {0x3, 0x2, 0x8, 0xa}], 0x10, 0x3f3, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x19, 0xb, &(0x7f0000000080)=@raw=[@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x3, 0x7, 0x6, 0xc, 0x1}, @map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000100)='GPL\x00', 0x4ff, 0xdb, &(0x7f0000000140)=""/219, 0x40f00, 0x18, '\x00', r1, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x5, 0x5, 0x8e9, 0x7}, 0x10, 0x0, r2, 0x3, &(0x7f00000006c0)=[r3], &(0x7f0000000700)=[{0x0, 0x2, 0xd, 0x9}, {0x0, 0x3, 0xb, 0x4}, {0x5, 0x1, 0xf, 0x5}], 0x10, 0x7ff, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r5, 0xffffffffffffffff}, &(0x7f00000008c0), &(0x7f0000000900)=r2}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000a40)={r0, &(0x7f0000000980)="49de5763cf98d0e3862fee3862b69b2741514d9ef06c9dcd2edb0758dbd7642469", &(0x7f00000009c0)=""/118, 0x4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff}) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000c80)=0xffffffffffffffff, 0x4) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000dc0)=@bpf_ext={0x1c, 0xc, &(0x7f0000000ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0x41}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x10}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000b40)='syzkaller\x00', 0x8, 0xe2, &(0x7f0000000b80)=""/226, 0x41100, 0x63, '\x00', 0x0, 0x0, r8, 0x8, &(0x7f0000000cc0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000d00)={0x1, 0x1, 0xfffffff7, 0xb}, 0x10, 0x1c4d0, r4, 0x1, &(0x7f0000000d40)=[r3, r3, r0, r5], &(0x7f0000000d80)=[{0x2, 0x4, 0x9}], 0x10, 0xb8d, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001140)={r2, 0xe0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000e80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000ec0), &(0x7f0000000f00)=[0x0], 0x0, 0x7a, &(0x7f0000000f40)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000f80), &(0x7f0000000fc0), 0x8, 0x55, 0x8, 0x8, &(0x7f0000001000)}}, 0x10) recvmsg(r7, &(0x7f00000026c0)={&(0x7f0000001180)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/173, 0xad}, {&(0x7f00000012c0)=""/3, 0x3}, {&(0x7f0000001300)=""/140, 0x8c}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/6, 0x6}, {&(0x7f0000002400)=""/225, 0xe1}, {&(0x7f0000002500)=""/189, 0xbd}], 0x7, &(0x7f0000002640)=""/120, 0x78}, 0x10000) r13 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002700), 0x2, 0x0) write$cgroup_subtree(r13, &(0x7f0000002740)={[{0x2d, 'pids'}, {0x2d, 'devices'}]}, 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002780)) r14 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000029c0)={r10}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000002a40)={0xc, 0x4, &(0x7f00000027c0)=@raw=[@jmp={0x5, 0x0, 0xc, 0x1, 0x9, 0xfffffffffffffffc, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x8001}], &(0x7f0000002800)='GPL\x00', 0xc0, 0xf0, &(0x7f0000002840)=""/240, 0x41100, 0x60, '\x00', r1, @fallback=0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000002940)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000002980)={0x0, 0x10, 0x8a, 0xfffffff7}, 0x10, r12, r14, 0x0, &(0x7f0000002a00)=[r0], 0x0, 0x10, 0x7fffffff, @void, @value}, 0x94) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000002b00)={'macvlan1\x00', 0x800}) close(r0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002b40)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x0, '\x00', r11, 0xffffffffffffffff, 0x5, 0x4, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002bc0)='cgroup.freeze\x00', 0x0, 0x0) sendmsg$tipc(r15, &(0x7f0000002fc0)={&(0x7f0000002c00)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}, 0x1}}, 0x10, &(0x7f0000002e80)=[{&(0x7f0000002c40)="febe483e8aa34c6bf74041d1fed353fd4f50e4f7833fb11b74b5e9f1812297a1d8b7cc59e1a211a767e702f7a8f1d2a7d0fd485e071f1491fc5183b86465212c9c8d588e845e7a5d6cf67369819b760ceb32536a0044f46826034765bc48349102cda9e1439e7869d0563bb77fb9ef9b596f51ba3f5188636907fbd109a333bab0d2aeeab4a3caf36768d3bd490739733ef9880d8236d3d7814f9e9d3f7700dd625a27b6054a2a62c41501ba23643903c4ca889d9aa78502d3b655e5f28d9640c11ec96c9771496d1c8c34057d4d2e2fe11affeaf90f0b33d1c852a72dde599c81be4b7a3f77d05d0fdd44f98319f5f3fa6cb3", 0xf3}, {&(0x7f0000002d40)="aeb682f36f324053d7b4528cab6a8e86b27275810aff09430658806ec69e8b93813352bc3ff7651fb1a023625325c84d336ad31f707a91145fe123d61adb58d29516d84b2e60ba9a42235296f87163f97ff447f153a22d728aadf84bd2d81532a3702f2ba1551443e690b464cbaabb5a889256529f1adb897569a93dcb5295e8e189", 0x82}, {&(0x7f0000002e00)="92f5b66bd260bc39ee0c8bde2400ca8493cf3421ca137dc2f4945a767f6085ebe90fbfeb33cbce511fdfb1812d2a5e08ae947f7772de4b06cd6df32583cd148053a451bdae50fca2d2b94fe8721c41bdbcd3a10f6a159efac75c24130a02ed84c1b6247336395695b3b58ae39af96b470c1bc955392083bc9ec5c0459ea12889", 0x80}], 0x3, &(0x7f0000002ec0)="e40df9e045d56bfe92a7184578b4625b113f77eeb37772b11182de3c9c44f4ecafd6a5498068fe288811b40ebacda32950f4b5c244941edc1193eebac965f7f2ac545b785e5f47789010dd0d16f3a2a983316767ca61ccc4ffa7fd01dcfc5865886c40895c7c629d9bb071fda029674036e0995b4eea6c76fd483f43213d722a4e217596adf4a6904971baac2883c85e3bcfa91a400d211cdb758482e9f9f160bd586c0c46520fb8e275d4ee6c8485cbd6651f385163d31aa73171c3c4f6c9107a3f872d496be65cf6da08cb000d94", 0xcf, 0x1}, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000003280)={&(0x7f0000003000)="c489af6a26177a73d6aacec8f097b22fc26317e9886165ea980886841ca7b894483ac2e8ef230ab4a3e2ac57f59f93ae95967bed5b6ed148fcfe3805", &(0x7f0000003040)=""/28, &(0x7f0000003080)="8524c0dfce9eb7e3b9ea7223cdc9d590428f7332f951645c3c992640ab0e3f3001bc657bebefd8e83ee35aeaec1808fd80e10efdfa847f0f4e6aca56fb10ddd1f550133f3981b2fc0a1f03b0e6f632de15f0fe96f057ef6862c0da08639834be239c1dd6491cb9b9d4359c534e243b51ee7f8abc6994a01b66c2c6ebb0d1c81a7e3a8c1664cdc926b05b839f59082a452279f67fe80e172903b06b167f3a30caf3acec6670fad18b9e4e6c32bab70bdac3324c7014ab5a9ac1b678664dd35790c36d0266b41cfeace3fb80d26f3effb91e09e0a678ff5fbfba8db423638181e142c96bb6", &(0x7f0000003180)="469c05fb8f86039a15a7b50d73f01e34f687fd14a3ef9051684fcbd6ce8a1305b9d1d915b5b9bb2ad040a937cbe2bb22799add5ea95c235e8945cc730e2b6598707806ef5f602fcbdef5c201031c1478cba4d9b23ff8e6f94ed3ece0a0a513caf7c4b1c6dc9672fe9048680224c117bd4f41fe0cb2878b3fb347141887a7a565aa3506ea2afd195b795341782f6a37d6831ecc2848a8a99d9ab035f71bcd46a2b60e086b4a1d1739937c4bfe8cbe61cea52308c00c0b999287c184179130590bb8526bf0a1f618967fb45f22e9aeb03df2c81078ba54304db8ce69c295e1cf57821e8915b336f6ee989de58adedc389fe7a5", 0x69374c43, r6, 0x4}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000003300)={&(0x7f00000032c0)='fsi_master_gpio_in\x00', r14, 0x0, 0x80}, 0x18) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r16, &(0x7f00000037c0)={&(0x7f0000003380)=@name={0x1e, 0x2, 0x0, {{0x41, 0x1}}}, 0x10, &(0x7f00000036c0)=[{&(0x7f00000033c0)="f8c36d1ff595ada7f4a9698dc6e5e50bb7c0f62422997846ed8e7c753b2f5ab2e9a21102fd0f54e20c9f5684b50948d0c379fa773ab321da7b5d1c8242ba4612d80c01a2435b4795383d495d35b8bd641f4220156679b71561b1a61e7cbe33f2a04c56f021d95f675afae82fe48f8a380e705ed9c526b9a7023e78a877c01a08e81fc26e782d7454392bd7ba1cd2366b05686a12286564c6df8f813c3859262c2a81ebbe45e575c585fe116cd32afbefaca55f50432973b54654216ec002acaad13376f27bae55d9c5ba4cad7f307c550db9892505a998d12d", 0xd9}, {&(0x7f00000034c0)="17cefd26afa794aaeb7c8239fe19210ba18ff73345464f0ac899aba514f13762e31c0d39b19e78207ef6aed9925a00c940df85ba9deb0a0a24f12434aa8fbe1143d458d62aebb77e22373d68d63ff6cc4012fde5c6ef5be3dc12c40e9e3670972eedd52b8ce6f29455985d7efedae6614fb6c97277717c7aa833bba8c5041b3f1f37bcda78980dc4ef19b8affb5bff7a0a5c5fd8066a441aa1e7b5f6d9588b3198e6b44c4fccc0a0d7d1d8403242f1bfbc9047c2ad4ecaf8756258716d95a42afc9401a0a3dceb89de50ae0d6f7c2a32722f74f372cc38f9c7b12f92dcbf928db8d2b7b9517b4b825804357f4ed9dbe3f3d793dc", 0xf4}, {&(0x7f00000035c0)="c95e6c504cf25c39010da11a2b054bab51367d64ec027b94b65dda63dff6062ab2340030b930ecb2bff02b6ed36ce42ef5df24d7d58260374290a5df2985a069bc60d881385b4c2d44df24f26db724a2476f3b67f442dc74409f55d8a6cf1420bb9b0e62fefa1d72825ebf3a4489edbc74bd12e8b68ce310acfeef9f14e4f2d7341fcaaa359d85515a2f7d8fc136e590720f56dab0512f91e1240543739a6fbd305d685fa63d77d03ba9650e497b176d4129f6cac19630dc413be1b777c54a43fa54f9ac549d4ec5347a02a220ceaef00e54bcf891aeb7f2d9e3b9f821e3c3f1510395650fbe169ba6f1a522", 0xec}], 0x3, &(0x7f0000003700)="5ad32618898dc5ee761d420ac52ab05411a811ab38bdc78152a40ddf7cfcc54b64f7d2c18a77c91655d3430d1f93705dd3b79a44437c83b7cc0f84068e61e1c57098a9c5b5b8425986e9ec1b1a78cb34711f52d91e2aa3cef7453c4fb15dfc93e56bb5b147f2a8f9ad755c7a00264149a8f1080c94cf2ad08b0e9d7c874d63bf0b371d4761181c29131155f37f8bd8f8840d69b8fca7c346f4c80b2851b25d13552bcea33c909d4e9239b5372cac40efb563348a843f1040d5b67ddb6d", 0xbd, 0x4000000}, 0x4002000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003b00)={r9, 0xe0, &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000003800)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f0000003840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000038c0)=[0x0, 0x0], 0x0, 0x22, &(0x7f0000003900)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000003940), &(0x7f0000003980), 0x8, 0xaa, 0x8, 0x8, &(0x7f00000039c0)}}, 0x10) mkdirat$cgroup(r15, &(0x7f0000003b40)='syz0\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000003bc0)={&(0x7f0000003b80)='ext4_ext_load_extent\x00', r14, 0x0, 0x7fffffffffffffff}, 0x18) 1.756840995s ago: executing program 5 (id=5442): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0xae7, 0x2020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x45) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0xffffffff, 0x7, 0x4, 0x0, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x5, 0x8, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x24, &(0x7f0000000280)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000002c0), &(0x7f00000003c0), 0x8, 0x72, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf8100000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018210000", @ANYRES32=r4, @ANYBLOB="0000000002000000b705000008000000850000005e00000095"], &(0x7f0000000300)='GPL\x00', 0x4, 0x1002, &(0x7f00000014c0)=""/4098, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe65, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=@bloom_filter={0x1e, 0x998, 0x3fe, 0x7, 0x4211c, 0xffffffffffffffff, 0x2, '\x00', r2, 0xffffffffffffffff, 0x3, 0x200000, 0x4, 0x5, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r6}, 0x10) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) close(r0) 1.630358155s ago: executing program 5 (id=5446): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) syz_clone(0x10800400, &(0x7f0000000200)="08c40bb14defe7e96ca662c8a1721a88fbffd59888b3fc46e20cfd176c44fc9366943b8403fa7111b9016f3c0313364951bef58ecc276cf4b30356cde6a5fde37ba2be3562d7760103a8156894f321b4e7effdfae1", 0x55, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000440)="5ac7ff10064c75f9751e6d1bc38236657d51b887a9ce5742cb5fefddaf9d3985b8e6ad23fe956e7d672e13f8210fd29251885da1497471f3caf849d0a907f66bb232fff0e7df81302d811c21594590aba52a0736b74581b7ffc84fd43fafe14fa112b084a8a26a54534f6d94e5edd70fe34c819158b91df5441dd79a5159d96c301e60b23a5dbe5f803769f075fbbf518f559477c2f7d73f31925335d911326a59b6061088df17d5789fa44ea7398068706b0bb6dd86a7d91b790964689877392583a188616eea4d001edc3ccde60d8a32ef51bf763bb579e662fc51600450f7c462facdbb1a") r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xe, 0x0, &(0x7f0000000240)="c3a88969eeddda9913392cd3633e", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) 1.578825625s ago: executing program 5 (id=5448): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000001040)='GPL\x00', 0x0, 0xe, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5d, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000002c0)=r1, 0x4) (async) sendmsg$unix(r3, &(0x7f0000000e80)={0x0, 0x0, 0x0}, 0x0) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) close(r4) (async) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async, rerun: 64) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1e000000000000000000000002000000b82962bd", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fefffdff00"/18], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0b00000007000000010003000800000001000000", @ANYRES32, @ANYBLOB="00ffa9efbc077b86030000000011006a5c1e0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000200"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) close(r4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000008000000000000008e683daf45945432850000000000000000000000000000000000b27d7bab4bcc3c8798647c174e1ee60e4a29cd69a277f600c4ea9a7eeecfbd3317d92b75e30c690b7e1caa0147576c436dce21e4b7f936d3f0a735e4579a1a569c73eb46d2f95228f5a998e2572783943c7148c8ef05b9c2b7e6dcd20ec43e631fbe52"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000a00)=""/164}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8}, 0x0, 0x0}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) 1.549069385s ago: executing program 6 (id=5451): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0xf5, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x1f, 0x1a, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'macvtap0\x00', 0x1}) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000340)) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000480)=0x1) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000002c00)=ANY=[], 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000680), 0x4) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) syz_clone(0xc0001480, 0x0, 0x0, &(0x7f0000000a00), 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.490676205s ago: executing program 5 (id=5452): socketpair$tipc(0x1e, 0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000001400), 0x8) openat$cgroup_procs(r2, &(0x7f0000001440)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2600, 0x4, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x5452, 0x800000020202000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0x3a) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x5e, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 559.690202ms ago: executing program 6 (id=5453): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x7, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r2}, 0x10) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r2}, 0x8) (async) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async, rerun: 32) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) (rerun: 32) openat$cgroup_ro(r3, &(0x7f00000001c0)='pids.current\x00', 0x0, 0x0) 557.694342ms ago: executing program 6 (id=5454): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/296], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='alloc_extent_state\x00', r0}, 0x18) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000002c0)={0x10, 0x0}, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x24, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xbff7b694, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, @generic={0x6, 0x9, 0xa, 0x3, 0x9}, @exit, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd}}, @map_fd, @jmp={0x5, 0x0, 0x2, 0x2, 0xa, 0x1, 0x8}, @tail_call, @alu={0x4, 0x0, 0xd, 0x3, 0x4, 0xffffffffffffffe0}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='GPL\x00', 0x2, 0x42, &(0x7f0000000280)=""/66, 0x40f00, 0x49, '\x00', 0x0, @fallback=0x27, r4, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x0, 0xb}, 0x10, 0x0, 0xffffffffffffffff, 0x4, 0x0, &(0x7f0000000a80)=[{0x1, 0x1, 0x9}, {0x3, 0x1, 0x6, 0xb}, {0x3, 0x1, 0x1, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x10000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2, 0xa, 0x4, &(0x7f0000000180)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000300)=r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a00)={r1, 0x0, 0x1000, 0x6a, &(0x7f0000001a80)="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", &(0x7f0000000800)=""/106, 0x3, 0x0, 0x44, 0xd7, &(0x7f0000000880)="b5ef04cce1cb8d0f5bc9f3a13cf5040680e3bafb9bc19f9ccb59fcc91d2427ef670ab79ed830ddd02cb55c62680319b943b5c04ee12c3420910010d39d16ac7f66da0c84", &(0x7f0000000900)="ce49cfeb2b2f37ef086163ec1ad430e9c5d483a7952e7028b55d789137af6aa2c4d5e3d317054ee3ca6708ae10443302ec68c5e99648aff6126fce3cde71181d9453da55a0e96c58894aa9ece09bb4277ead4e30b9ed26902a30e3428708ca4c408b0edb3b0f3e7ee75cc634825b395bc0ca3477d7c021ba516110e1eb224ab496007c31907f7af3212a4cd10eefb553987d42f88ffca83f465b06f0faa641d5d1dab036957fd278647669f7032105d1a3b7374790ea9ecefabd62728bc1a002f38c49f52cbc400b80af6c58161a75bd137a32df71c917", 0x0, 0x0, 0x4}, 0x50) 555.289572ms ago: executing program 4 (id=5458): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x400100, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r2}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000200)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) 530.370972ms ago: executing program 5 (id=5459): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r1, 0x400454c9, 0x3) ioctl$TUNSETLINK(r1, 0x400454cd, 0x1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r4, &(0x7f00000004c0)=ANY=[], 0xfdef) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18020000fcffffff000000000000210085000000360000009500070000000000b83f3584230b8f5ec8921327291cf4880dd3a91af830f8a476ba1b51d4eb67103b000000000000000000000000000000640f9922d207e93470686f20ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r6, 0x1800000000000060, 0x0, 0x0, 0x0, 0x0, 0x2300, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xf, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000700000020da9223b79d2fb514b52fd29fb8d121b958b839b41db69857fa426780e0b57dd8d4ca95703d04c18a47cac940251c0fb6c8c9b824d6beb79664a449f7c958d14b6cbd62e99a85567a5f19856c3b2d8a0ba448569ddb4bf8f82f6c81d3497797d6a50d21789c2ae0049c65eff06744b9a3e590fa382e2f2b543023c13d96351ab454f5b72e6a4442a6f89c2cc5897c6420a597fd864262b89d97c81c72cd7a", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) openat$cgroup_procs(r8, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r9}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 528.869322ms ago: executing program 3 (id=5460): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000400)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000050002000f0000000400000085080100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="1100cda6a91fd174a9ac0ed08d6564aa1a000000e800000000080000000000f8ff0f00000000ff", @ANYRES32=r4, @ANYBLOB], 0x50) (async, rerun: 32) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r2, 0x4) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000580)=ANY=[@ANYRES16, @ANYRES8, @ANYRES8, @ANYRES32=r2, @ANYRES8=r3, @ANYBLOB="4d3c97015476e30c39bffc9dec0c3792e0d1286b9f0411221e0ea0662ec366a8c23c886f22697d59ea0ae7c1abd9f84d2a200e54f73f3c1a2a9761a5f92b4e0bc996498c8d091d3260afd838f2e8f27fa77570cae7faab3e9f1637588aabc6787bb313c35d499ac4d56472c91898c03d3037a25b210c8fad1b2d0186ec5ccfa278e2844a61a5a7e0e2d55492f5dff0e54d2ba2e14283fa6db53adf73577ed4c5655d980c2429338ecb2a2b2e3ba0683a67985723a4827b1bd37d74ad02f0ad98443f4c548bd510ce", @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 32) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x1, 0x0, 0xff, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff8f, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd3e, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x90) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x4f6) (async, rerun: 64) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x2000, 0x0) (async, rerun: 64) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r5}, 0x10) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r6}, 0x8) write$cgroup_int(r7, &(0x7f00000001c0)=0xffff, 0x12) (async, rerun: 32) ioctl$TUNSETOFFLOAD(r7, 0x541b, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0xf) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000ca22d8"], 0x50) (async, rerun: 32) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32514, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)) (rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) 528.395022ms ago: executing program 3 (id=5461): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000070000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48080}, 0x0) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="19000000040000000800000003"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x208, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340)="c399a63fd582b76de4d2eba69d60c05ce7116144dbd5cac0aef8d6b6605a75cb092779ea373199", 0x0}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xc, 0x42, 0x40, 0xc0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) sendmsg$tipc(r8, &(0x7f0000000740)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x0, {0x4e23}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20008000) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r7}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r7}, 0x38) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r10}, 0x10) 527.199042ms ago: executing program 6 (id=5462): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) close(r0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = getpid() syz_open_procfs$namespace(r5, &(0x7f0000000040)='ns/net\x00') (async, rerun: 64) r6 = getpid() (rerun: 64) r7 = gettid() (async) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r9) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) write$cgroup_subtree(r8, &(0x7f0000000440)=ANY=[], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000980)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000280)="36473fc86f3f99c4eb7ca4a0db1980af3b395c9360b67bcffcd3147ec19dac573505b2c09b953712825e0c64396f9ef5143b866c5b68b8b9e45351f3f40bd56d9bc234c501ea892c9bc48b14650466ac2e5042750dbeef4ed9b575886935038104d0c049fb82", 0x66}, {&(0x7f0000000300)="10440bc130be294b28bedcb4c2103f25c5d8cda786de5b304457a421540d7306e0288a32674211cbae93d31d4a8bee0307323c73712ed3b9adb23e9b6c19c9fc6f41d622970b73ccfcfd0d6bca66d0bf", 0x50}, {&(0x7f00000003c0)="bf67dfbee7961de2b60687c316502f63a4904278e71d7cd7f62a0e97077dc984e51b91e8db20974c0d29d5774e4cb3268cf62016479dd8b3b9b5a3f38fa651db119f9c85ec0bb5a53616891507525177ecfe56649049e56d001c662dfba20a063bf0cc6297867354fb11f70b636119b3dde44620568e0f5acb87dbee95339ff5a9509e976c6780aa9b118471b204815831a58a5a2c6a2321e7390dd59a9ba9311f03f0d345807d455962374f952b8c561e7f7da181e69aaf310212d722196d907fbf533e351eb9e6ab57d0d2b14b18fd3ca5875f978268ac73ddfd4d2fd790bab1311f2d", 0xe4}, {&(0x7f0000000a40)="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", 0x1000}, {&(0x7f00000004c0)="6019defdfb1ef57218229fceaaaf565a01391ec8140e655f173e1d494a2c52b1350b3558c4aea47383cab11026fa47cbfcb97a8393e50eb5722a57afa2e7c400248c657810674a36dfa29a62d1949cc5d710ea9394a4ad57da40bdd673a992e76b2850", 0x63}, {&(0x7f0000000540)="2ae69c70c93ebd3cc2821b504f205784afddb90a5b2b0199ed040b980b0bc94eb570b3edbcc47f074d42ef0b86f4cb37f3ddf7eff6ddb9ea68a844c5ba82c7758885926ad07ac74f2ede66acefc041b07e348fcc1d5b62b4bfb7f750fa051ca55e3559308ba70d21bd5909238a3f61ac306876d948fbcf7e4e4bb51daa34ad46a77984c95cec3e6ca87e2c4e354b427c21d20e6d7ac31210f11853f235951555abbfedf3563f061b21c31ad88d7f7313035a45bef3296d62af65dccdcc3950b86148bda2c3d810824c3b055365c1e62c5ab9b98d74c71d7eb0b370496ff0fed11fa43a953315128fdf21261d567e18f1061c69d660591c5b", 0xf8}, {&(0x7f0000000640)="00f73c6adafe014daee8a1fd956ab8535cae65522402a0911d5ef0459a9d172a83cf9161be23bc43", 0x28}, {&(0x7f0000000680)="11a146101d31915af3f07b22edc64dfb116597a257c637a07e9bc9617b39753b865513d4ddff8d7561c7fd9d912b83907d7e505ecc11845dd879f0d31137d22589d87ab28ad00e46", 0x48}, {&(0x7f0000000700)="382d23eb900ab51a86b85206c8c146b85d3cb1f620897f5147b4b186ca6e06a85417c34bfb94b940a3d2c51aa15c676084e6dac03b5d47b2e404100ddb63714b8e52593cfcaad60e488a8e081c1bc50f337108eb197a18e3fa5a31511adf83b29dfabac67c0997e40ed7e6676281f7068d9039bdf4f89f15c35f9e3dd0473a6caedcf8a8932635f33f3a051a519d0d631e3e09a50b0973b5b6c247c80b4ad03a153f6af833ce5046a0c488b47314f698856a432d85ea8d669ad0a50763776f7395e69a214930d5a16b9d82a9a2c23e265ac587291e8fad2a6eb34159cb442bf3a3a1390fe9e5193d7efc2dede16d8cae990e", 0xf2}, {&(0x7f0000000800)="cc3f006cae1c31dbe28856aadd6d62d3bf76dc854b95dcd8952b09a525eae76b9858f709923e47d100b423b04d338eb00bf128950c6e334d40f78b3abfe73e124b", 0x41}], 0xa, &(0x7f0000001a40)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r7, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r0, r3]}}, @rights={{0x18, 0x1, 0x1, [r0, r3]}}, @rights={{0x18, 0x1, 0x1, [r2, r10]}}], 0xa8, 0x4004000}, 0x2) 486.370882ms ago: executing program 4 (id=5463): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000140)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x48, 0x4, 0x0, 0x3}, {0x44, 0x94}, {0x4}, {0x6}]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r5 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb, 0x45c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000005, 0x4, @perf_config_ext={0x10000010000000, 0x400}, 0x12328, 0x0, 0x0, 0x4}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = gettid() r8 = perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x9, 0x4, 0x1, 0xa, 0x0, 0x1, 0x84096, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0xb0e, 0x3}, 0x100, 0x9, 0x6, 0x9, 0x0, 0x5, 0xdff, 0x0, 0x4, 0x0, 0x2}, 0x0, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0xc, 0x2d, 0xdd, 0xdf, 0x0, 0xd0, 0x20802, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xc88, 0x2, @perf_config_ext={0x7, 0xfffffffffffffffd}, 0x112000, 0xc4d, 0x3, 0x4, 0x7, 0x5, 0x2, 0x0, 0x4, 0x0, 0xb2e}, r7, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0xfb, 0xff, 0x4, 0x2, 0x0, 0x1, 0x20040, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x245, 0x0, @perf_config_ext={0x6, 0x100000001}, 0x10, 0x81, 0x8, 0x1, 0x80, 0x24000000, 0x10, 0x0, 0xffff, 0x0, 0x1}, r7, 0x10, r8, 0xb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r9, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0xee03674f5648c7c2, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x80, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r4) 400.147081ms ago: executing program 3 (id=5464): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000900000000000000000000e9ffffff00000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESHEX=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x51, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0xc1842, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r6) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r10 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r9}, 0x8) close(r10) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r9, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={r10, r9, 0x4, r10}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 399.666401ms ago: executing program 7 (id=5465): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0600000004000000080010cf9300000f8b0000000000e926430b789cd4dcfc68f60facea6cad768d3ff43f6d70e9dab67bbf5cf290bdb5aa54e6601f02d763ac4b16ddff0a94b9e8158d4bad13dadcf64b4b9b3d477b622ca58f5fbb4e124d67f6a72f01be6a0b3505cc6737acfd343f6396d7e295", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000096c3000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0}, 0x1002c0, 0xc8, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x108010, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7916009875f37515e486dd6317ce62030800000000000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) ioctl$SIOCSIFHWADDR(r1, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x20004804) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000003"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540), &(0x7f0000000740), 0x75, r4}, 0x38) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) gettid() recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) write$cgroup_subtree(r5, &(0x7f0000000000)=ANY=[], 0xfdef) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x880, 0x0) close(r7) 398.429091ms ago: executing program 6 (id=5466): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x0, 0x9, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='GPL\x00') ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000c) (async) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000c) 384.173872ms ago: executing program 7 (id=5467): bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[], 0x48) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xfdef) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="00000000001efadf8f0000000000000000000000977989fca0a0303f562d3078dd111293439fa4704f76650f9765c6be7002a84c74e33038876354de19adc04c85877f8749e0d6bc11bb66d06ba5d30c26566da30ff5b2b74416951c6578d49c569edecac1e3b1e2557b362663cc53a37a21bc6e59c5a88c1621d32678e21a3b89a587ef416e196ad067296600ef5e59e28e332862131b430aee110f84538e3c3a9b46014de75fa5ce20fb344d9240aad40fb7691b37617c951d527b0f5ed1c8cc902a0ccc8faf811a02c66be52e7c90200b51a6bbd4526a8abbe90ccf63cc67c296ac0ee61c4cd41fa245ed04", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) (async, rerun: 32) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) close(r1) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) (async, rerun: 64) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) (async, rerun: 64) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64) openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xaffffffffffffffe, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x1c, &(0x7f0000000680)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000380), 0x12) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') 367.252052ms ago: executing program 3 (id=5468): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r5 = perf_event_open(&(0x7f0000001200)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001c40)=@bpf_lsm={0x1d, 0x11, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000008eeffffff0000000300f2ff170000000101000080e2000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000185800000d0000000000000000000000950000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000152f2a60c517cf8b86010001001c49b93f000000"], &(0x7f0000000080)='GPL\x00', 0x2b3d, 0x1000, &(0x7f0000000c40)=""/4096, 0x41100, 0x52, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x8, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000800)=[0xffffffffffffffff], &(0x7f0000000a40)=[{0x5, 0x5, 0x4}, {0x5, 0x2, 0x10, 0x8}, {0x5, 0x4, 0xe, 0xc}, {0x4, 0x1, 0x6}, {0x1, 0x1001, 0x2, 0x5}, {0x2, 0x1, 0x8, 0x5}, {0x3, 0x4, 0xc, 0xb}, {0x4, 0x5, 0xc, 0x9}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1b, 0x11, &(0x7f0000001d00)=ANY=[@ANYBLOB="85000000600000009500000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f8ffffff850000000600000018120000", @ANYRES32=r0, @ANYBLOB="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"/476], &(0x7f0000000340)='GPL\x00', 0x8, 0x86, &(0x7f0000000700)=""/134, 0x41000, 0x40, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0xd, 0x8, 0x5}, 0x10, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1b, 0x11, &(0x7f0000001d00)=ANY=[@ANYBLOB="85000000600000009500000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f8ffffff850000000600000018120000", @ANYRES32=r0, @ANYBLOB="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"/476], &(0x7f0000000340)='GPL\x00', 0x8, 0x86, &(0x7f0000000700)=""/134, 0x41000, 0x40, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, &(0x7f00000007c0)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000800)={0x5, 0xd, 0x8, 0x5}, 0x10, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0xa, 0x0, 0x0, 0x4412, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x82b1}, 0x110041, 0x0, 0x8, 0x2, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r4, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r6, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) mkdir(&(0x7f00000001c0)='./file0\x00', 0x45) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@o_path={&(0x7f00000000c0)='./file0\x00', r0, 0x4000, r7}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r5, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r5, 0x0) syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 319.315831ms ago: executing program 7 (id=5469): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x7459, 0x4, 0x7, 0x1208, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x3, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x134, 0x134, 0x5, [@datasec={0x4, 0x6, 0x0, 0xf, 0x1, [{0x3, 0x1de4, 0xc6}, {0x2, 0x0, 0x1}, {0x4, 0x3b, 0x5cb5f268}, {0x2, 0x2, 0x6}, {0x2, 0x3ff, 0x4}, {0x2, 0x7, 0x4}], "89"}, @datasec={0x10, 0x6, 0x0, 0xf, 0x3, [{0x4, 0x8000, 0x800}, {0x2, 0xab, 0x8001}, {0x4, 0x5, 0x2}, {0x3, 0x27, 0x5}, {0x1, 0xe4, 0x5f}, {0x2, 0x1, 0x3}], 'l 5'}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x47, 0x0, 0x6f, 0x5}, @fwd={0x7}, @fwd={0xf}, @ptr={0x3, 0x0, 0x0, 0x2, 0x5}, @struct={0xf, 0x6, 0x0, 0x4, 0x0, 0x4a49, [{0x7, 0x4, 0x6a7}, {0x10, 0x1, 0x4}, {0x2, 0x0, 0xffff}, {0x8, 0x1, 0x6}, {0x0, 0x2, 0x2}, {0x6, 0x4, 0x5}]}]}, {0x0, [0x5f, 0x0, 0x5f]}}, &(0x7f0000000600)=""/61, 0x151, 0x3d, 0x0, 0xb4ba, 0x10000, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xd5, &(0x7f00000007c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x66, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x1c, 0x26, &(0x7f0000000180)=@raw=[@exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x88}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_fd={0x18, 0x6, 0x1, 0x0, r1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f00000002c0)='syzkaller\x00', 0x6, 0xa4, &(0x7f0000000300)=""/164, 0x41000, 0x12, '\x00', r4, @fallback=0xf, r5, 0x8, &(0x7f0000000680)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x8, 0x5, 0x6}, 0x10, r7, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)=[0x1], &(0x7f0000000a40)=[{0x1, 0x1, 0x10, 0x8}, {0x5, 0x2, 0xb, 0xa}, {0x0, 0x3, 0x8, 0x6f1e328eab19d4a5}, {0x2, 0x3, 0x10, 0x6}, {0x5, 0x4, 0x5, 0x5}, {0x2, 0x2, 0x5, 0x2}, {0x1, 0x3, 0x8, 0x6}, {0x0, 0x1, 0xd, 0x1}], 0x10, 0xe, @void, @value}, 0x94) r9 = openat$cgroup_procs(r2, &(0x7f0000000b80)='cgroup.procs\x00', 0x2, 0x0) r10 = syz_clone(0x80000, &(0x7f0000000bc0)="148cdbfa00f1829f9a35aa6291dbb784366589a48188de79a2a419425284517dabdb3f8dec957912a38b8f8d6abafaed25266a5eacc7980ef1c973f97f2d606e89ecd4e3a00ab32b578943ea02379705bca6910aed497496f30c6ce3ad5da8ce8f12d74411ced3411dbe1a1a88433064f137d4cdeb51b3277e443f23bb31214f4435241d2a840da7ea9157e31bf1c1650ceec0b7f8575c034310005fa319fd1ed3727fb8e503a455fc7701f60acf5f6888494b779437f6ce4ed94e65e3c0b8b5742c5b118419695238f36de7b6", 0xcd, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="c7abc0dfc43c2920984b06ff6feb8bc3f982c7dd1c4ed9537ee2a51743d41098880622b90bc4edd2d8d77f34f0887883c6e4df9bbfdf60d16b2abc6531af6918ea7bba0aa236439dff71e4770551830f685d8065606a368bc8c3b0a01987a1ea7e156a8f33dd19e2f72d251d5e4e22435a64d3ad75686424291a8eb5ffc60bcb2922bed9b145ee075534afa7642367c86a53abd10c0e1700db33b58ccb0796398e527a3091b471670c6bc30dd9377acdf7de261514cd24bd75ee22d3da91feb40165554e58a4ab60") write$cgroup_pid(r9, &(0x7f0000000e40)=r10, 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000fc0)={&(0x7f0000000e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xa0, 0x3, [@type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @var={0x6, 0x0, 0x0, 0xe, 0x4, 0x1}, @fwd={0x4}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x3d, 0x0, 0x3b, 0x4}, @enum={0x6, 0x1, 0x0, 0x6, 0x4, [{0x2, 0xc}]}, @restrict={0x7}, @union={0xe, 0x2, 0x0, 0x5, 0x1, 0x2, [{0xd, 0x3, 0x8ed}, {0x3, 0x2, 0x1}]}, @enum={0x3, 0x3, 0x0, 0x6, 0x4, [{0x1, 0x7}, {0xb, 0x3}, {0x3, 0x766f7cb5}]}]}, {0x0, [0x30]}}, &(0x7f0000000f40)=""/119, 0xbb, 0x77, 0x1, 0x6, 0x0, @void, @value}, 0x28) openat$cgroup_procs(r2, &(0x7f0000001000)='cgroup.threads\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000001040)={'veth1_to_bond\x00', @local}) write$cgroup_devices(r2, &(0x7f0000001080)={'b', ' *:* ', 'wm\x00'}, 0x9) write$cgroup_type(r2, &(0x7f00000010c0), 0x9) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001100)={'dvmrp1\x00', 0x400}) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001140)={r3, 0x6, 0x1c}, 0xc) close(r11) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000011c0), 0xc000, 0x0) write$cgroup_netprio_ifpriomap(r12, &(0x7f0000001200)={'pimreg1', 0x32, 0x39}, 0xa) recvmsg$unix(r2, &(0x7f0000001480)={&(0x7f0000001240), 0x6e, &(0x7f00000013c0)=[{&(0x7f00000012c0)=""/254, 0xfe}], 0x1, &(0x7f0000001400)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x40000000) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x2) openat$ppp(0xffffffffffffff9c, &(0x7f00000014c0), 0x40002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001740)={r13, 0x0, 0x7d, 0x43, &(0x7f0000001500)="dd6aac0b6769f35a36f98d51a022cef87abe06f13a02de9961540fe848295737c7bd17ca1b46a9c8d02348d4dfd48c65528b78b56c8f9add1585445d9b318df56b41bf326323de0deead25d9085a9ff3ee119e877542de3b43b3cd94d2d28d8384c9eeb25185929ecdc6f72331facdee3262da08c719b52769b1f8cce8", &(0x7f0000001580)=""/67, 0x9, 0x0, 0xac, 0x6c, &(0x7f0000001600)="c09d9bd95a1bd2bfb02252d946001cc81b5e3f15983ad6f251990be881e1d11896498312430ff7e1e6ba63465f5fc10cd64fb7a3ea3cf0f4d0c7ea4f803b2d58166a315d5d68a266467ccc7d34c171f51a7ce1ddccae2389903d001b8796b1b470346310a1978d1e54a41e6e0e03f1b39bdd3976198b8962474618cfbb19d1d2629d37b2d28eb49f8e466b0d36ea79a2333522f85d2eef7563e50b61863e32e22df2753979794f477d654ac9", &(0x7f00000016c0)="bd3dfb3816651d649669cb843ab61689e2a2cf82c33197d420f04d43f881c09af20f2feca3769bf3bd5c1eac96149a070df8bcd981c75a5628e38ee3212783e2dae7efc37eb69ac9279af1faac96c81430866b62f7db013a5d7dca1d28d7e94db8213a46c3bf8557993ee503", 0x5, 0x0, 0x2}, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002980)={r8, 0x0, 0x75, 0x72, &(0x7f00000017c0)="6582bc230c6bab2a06e7db8a3d1436aa4387d8f75ac761f540e6360ca2c8c1a1f34973158e8932333116b6353f5abb701ce35715724c0923118e30b53cdc532b463b2a62e3bdf4410a2c59a20a345a4d1713197d438b4d922ea4bcce0d6a9339cedd5e83786b78936ba8fe849a5fb5a6a4b06367ca", &(0x7f0000001840)=""/114, 0x5bd3, 0x0, 0x1000, 0xb6, &(0x7f00000018c0)="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", &(0x7f00000028c0)="6e908cacb6b854a3032db18b56129cd671f77ffd549f7c2e19af1b6b9c8f768ac761edd8fbcfb1e512f0335ed29afa8c73d5b646f145df53e75dcbd5ed92b60d79064510e2d0c2fe9815a962c3819988e070bc6dac0fff9054fc94762bf6ee8896b9a6e1001f87b25c9bcc18b872a37251a2903a4b9f6319eafc61055fbf774f2dcdc755aabbf4b0aef1f5dd187f6fba8db1c4139699616b7693cdac9d189426967ff16df422a750e3c5a69c0f367ab04edad3b45d3b", 0x0, 0x0, 0x1}, 0x50) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c40)={&(0x7f0000002ac0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0xfffffffd}}, @enum={0xc, 0x7, 0x0, 0x6, 0x4, [{0xa, 0x1}, {0x1, 0xc}, {0x7, 0x4}, {0xd, 0x32}, {0xf, 0x5}, {0x0, 0x4}, {0x3, 0x8}]}, @union={0x8, 0x5, 0x0, 0x5, 0x0, 0x7, [{0xd, 0x0, 0x80000000}, {0x10, 0x5, 0xfffffca9}, {0xd, 0x2, 0x40}, {0x9, 0x4, 0xfa}, {0xc, 0x0, 0x2}]}]}, {0x0, [0x1e, 0x0, 0x5f, 0x2e, 0x2e, 0x2e]}}, &(0x7f0000002bc0)=""/74, 0xc4, 0x4a, 0x1, 0x9, 0x0, @void, @value}, 0x28) r17 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002cc0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0xfffffffd, '\x00', r4, r5, 0x2, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002dc0)={0x6, 0x9, &(0x7f0000002a00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@exit, @call={0x85, 0x0, 0x0, 0xc3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x3, 0x5, 0x8, 0x6, 0x5}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}]}, &(0x7f0000002a80)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x68, '\x00', r6, 0x25, r16, 0x8, &(0x7f0000002c80)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002d40)=[r17, r0, r0, 0xffffffffffffffff, r14, r0, r11, r15], &(0x7f0000002d80)=[{0x5, 0x4, 0xa}, {0x0, 0x3, 0xc, 0xb}], 0x10, 0x800, @void, @value}, 0x94) write$cgroup_type(r2, &(0x7f0000002e80), 0x9) 317.547631ms ago: executing program 7 (id=5470): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@datasec={0x6, 0x1, 0x0, 0xf, 0x3, [{0x2, 0x8}], "8f54b7"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '@'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000300)={'veth1_to_team\x00'}) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r3, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 316.929221ms ago: executing program 4 (id=5471): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00F\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="090000001700000008000000400000004e000000", @ANYRES32=0x1, @ANYBLOB="00a32e61cc6a408e88c0000000000000000000000000000000f622000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/306], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) r3 = getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r3, &(0x7f0000000080)='ns/pid\x00') 252.234421ms ago: executing program 6 (id=5472): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x13, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x81}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4164, 0x0, 0x400000, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) close(r1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1808c2f4448d", @ANYBLOB="0000000000000000b702000014000000b7"], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) 162.883381ms ago: executing program 7 (id=5473): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x5, 0x8f9154cbd4632091, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3b, 0x0, @perf_config_ext={0x5}, 0x0, 0xc49, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 77.106601ms ago: executing program 3 (id=5474): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x17) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r5}, 0x8) 14.63871ms ago: executing program 7 (id=5475): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x804, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r2, 0x0, 0x0}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000ff00"/28], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000d40000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000006b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000280)='sys_enter\x00', r4}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000540)={0x0, r0}, 0x8) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095", @ANYRESHEX=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/cgroup\x00') ioctl$TUNSETIFF(r6, 0xb701, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r7}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xd, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @multicast}) 0s ago: executing program 3 (id=5476): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x5, 0x4, 0x8, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00', 0x800}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="85000000070000006a0a00ff000000220c40000000000000950200000000000018100000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) r3 = gettid() r4 = getpid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001c00)=[{&(0x7f0000000300)="fd4c6179e849ea5669fada32709875db310345854a67086a1cfac6a542ce72a1e65da7e9c0cfbd787ed5bb2ce7f81d36afabf410ac2a588812d8d3bab8ddb581fe4f7a1bc8dfef251fb7f54546fe8ed0286d94be6f14a4fd805355336a76622c58a4995f14b26fea534ba56a3546da826d8e48c41d5a00b2cb8025f6da8a4404645d6a51f7b095ae77a121eff538f6f9809fe444c977d02ca597a954c4e434b1f3749e08e8ffdba4b9ccb403883a75a59c7a979d5ee63a63a3705b2019a86005ad12014a77aa76b932028a21cbf423", 0xcf}, {&(0x7f0000000180)="657e6eb284a294864a682857c994457c9599537c029eec7c8b09bd35e2977b4245c62eba28974d4a175c216d332410308afcbc38909c87fb32c29332cb998e840f81badcdfaf836cffea3bf2d8b9b1c01e6cf1d5895cf111a9b932c64dcc8834ca9c9b04c116f5254159fc4c70f25aa59e8ba308fa", 0x75}, {&(0x7f00000004c0)="7a2ab769b4f3983364cef806c19c1cbaa97ba7ee8ab08c98dc2cb9414cd9886d5c778010f3d1a4262406990c5eff59c1313a047711dda64f0f01024c7a70e94eea5b08737cb6c3a8b0", 0x49}, {&(0x7f0000000740)="e7a2ded531dcc8512041b5d2bad9764d4c04f7b417b9388a60587d419073b53c9ee818851fbded8c2bc818a3b72b0fae7e3bb7ca6e38e1809532a385e734614ca831c6bf7a0c93f4c38217d03e249fc10062cd35cceaf6105a49fa50d06558d44c961b32be429d5e5eb3bea173c70887dab62ba918dd8940442df8e2cbd35a5873d5294b4fe3ec38412c1e6c1a28dc60c6c1a41c280956a7053e093df3138ecd0d2b65f41b023f381aab3ba0d5d79c0c788ae91e21a66244072c49230d28ed29eda4329033cb9bd038b240faad4c17e35c2a97f7ed1a141dcabcb3d11e2694c1ab69d34e129f45f2b1da2e4b10e5d65784ddd514ed1832", 0xf7}, {&(0x7f0000000540)="899a5fbb2b5bd58c49bd08a338bef47a063dc379146b1c0659d41b78db562149af499129ed1b4acc584de7812f9ab6b8fd16a0a5262426f234bef05504c70f99576167d4860f604abbdcc148c32685fa900ed7dee4f6fb20d2e7af6f4589ee4322fc14089b70eea6f9778a91ce2ac24ebd9859b96434780662d036477d1204fb2e553ed1ad43ea7e2787c93286ea46f13ff92d427dd012a6d7b46c1ad70f254da183eb88db61035b48ef855061203c4aba9fd74690906bf9a8f0fed93821cf95", 0xc0}, {&(0x7f0000000840)="0391c4a3c6d4007b43139568185cd420ca607ec575a06453c6fd676ac6364f7c6729f793df9797e1290decd67c7cd13e0ffc1e1e9d7a7d08446593be390ff8e8abe9976d7902166eea64a3140866282602c426bcbcd6c4e8c00dedb28dae6a0bbc7fd60839c1", 0x66}, {&(0x7f0000000980)="666606aee28b754a6b3af4d339b4c46792236b5bdf211d3ab1852480b365f8f4cc15a5b5e866636a2100804a98a637c9bc3fdc48a2404353d5cc99d9f504c477c065cba416dcd58b56e874e65a1131c21b2f833f8f4e0c0ef5031d918c828d23d4a8db1c9ee5814e7f2c7ea14995bfabb31c1ce977272d8f8f2602d86552c0ff0f9b913d1edfa88a49dcc3d19114d97b61bc6a369b8b05301adc26872c67339b3796d48d3761486f8a6c7bcf6fedde058457c360fb28a87a23d453efc0ef483fff3f93", 0xc3}, {&(0x7f00000008c0)="7859c8f0b838fcbfa038d0122be0b970e5cddc0a4a83919680477d803ffadae4d084b86221569824bcd12e6bcf5e2c7451132bb2cbef4c09908391469ff2875cb7239fdc019f30af1d64e03123b98000", 0x50}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000000a80)="c9de9ed4e1639832593698747ca80bc30bcebd7b766dc832b270be9362848bf59bdddeeadb3e8ee3f178ec284f941cbf6b74d121761587442afea1b56d489dff3074e14f72c83b4805d2b04484b514f01c14ab1a3e2e4cb38eadcd34f1f737bc737c425f6120cc45909bf9b3ea7496a177f13b74c406413381fda2ef730311529d70848a08207dab", 0x88}], 0xa, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xffffffffffffffff, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee01, 0xffffffffffffffff}}}], 0x40, 0x4000}, 0x8000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ec0)={0x11, 0x19, &(0x7f0000002000)=ANY=[@ANYBLOB="1800000f1d2d74094cf95f4f000500000084b20000ffffffffdb654000e8ffffff64ba0001f0ffffff1837000003000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000500000085000000060000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000800000085000000060000006a78e0ff0f0000009500040000000000"], &(0x7f0000000b80)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001dc0)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000001e00)={0x4, 0xe, 0x5, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001e40)=[r0, r0], &(0x7f0000001e80)=[{0x2, 0x3, 0xc, 0xc}], 0x10, 0x20, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000070000000000000000080021850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0xd) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001fc0)={&(0x7f0000001f80)='objagg_obj_get\x00', r2, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b405000000000000711096000000000066700000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x2dc0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x3d}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): 20.117903][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.124869][ T282] device bridge_slave_0 entered promiscuous mode [ 20.133357][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.140219][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.147405][ T282] device bridge_slave_1 entered promiscuous mode [ 20.162513][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.169386][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.176451][ T284] device bridge_slave_0 entered promiscuous mode [ 20.185341][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.192201][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.199382][ T284] device bridge_slave_1 entered promiscuous mode [ 20.207762][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.214593][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.221866][ T286] device bridge_slave_0 entered promiscuous mode [ 20.229402][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.236226][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.243440][ T286] device bridge_slave_1 entered promiscuous mode [ 20.336749][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.343769][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.350975][ T285] device bridge_slave_0 entered promiscuous mode [ 20.358760][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.365595][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.372823][ T285] device bridge_slave_1 entered promiscuous mode [ 20.405351][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.412212][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.451012][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.457984][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.465057][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.471878][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.485347][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.492210][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.499297][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.506080][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.517729][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.524579][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.531725][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.538476][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.550285][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.557162][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.564218][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.571058][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.604102][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.611625][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.618863][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.625795][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.633124][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.640536][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.647617][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.654758][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.661806][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.669094][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 20.676234][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.698316][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.705684][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 20.713881][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.722273][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.729126][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.736496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.743785][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.751726][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.758565][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.765742][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.773801][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.780653][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.787814][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.795702][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.802466][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.809653][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.817629][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.824450][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.831673][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.857533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.865024][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 20.872904][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.881694][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.888551][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.896207][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.904013][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.911744][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 20.919607][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 20.927354][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 20.935232][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.942011][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 20.949167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 20.957138][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.963953][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.986515][ T285] device veth0_vlan entered promiscuous mode [ 20.993797][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.002043][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.010100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.017633][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.024791][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.033291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.041256][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.048090][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.055209][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.063127][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.069961][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.077161][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.084842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.098790][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.107269][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.119382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.127468][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.143279][ T281] device veth0_vlan entered promiscuous mode [ 21.149647][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.157936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.165965][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.174164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.182513][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.190480][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.198374][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.205949][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.214730][ T282] device veth0_vlan entered promiscuous mode [ 21.222468][ T284] device veth0_vlan entered promiscuous mode [ 21.229427][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.236681][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.244051][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.251362][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.258621][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.266212][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.274330][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.281677][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.293262][ T285] device veth1_macvtap entered promiscuous mode [ 21.303164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.311068][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.318958][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.327089][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.334967][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.349916][ T284] device veth1_macvtap entered promiscuous mode [ 21.361134][ T282] device veth1_macvtap entered promiscuous mode [ 21.367774][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.375739][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.384074][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.392160][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.400218][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.408292][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.416170][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.424563][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.432092][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.440315][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.449381][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.457594][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.467628][ T281] device veth1_macvtap entered promiscuous mode [ 21.484107][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.492031][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.500396][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.508879][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.517103][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.525157][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.533375][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.541648][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.549680][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.557775][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.565709][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 21.573945][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.582143][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.599127][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 21.608314][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 21.618577][ T285] request_module fs-gadgetfs succeeded, but still no fs? [ 21.633201][ T284] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 21.643250][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.651277][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.667626][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.674934][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.688864][ T286] device veth0_vlan entered promiscuous mode [ 21.734111][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 21.743252][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 21.755151][ T286] device veth1_macvtap entered promiscuous mode [ 21.771564][ C0] hrtimer: interrupt took 26158 ns [ 21.891943][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 21.908552][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 21.929981][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.320776][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.329794][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.346943][ T310] device veth0_vlan left promiscuous mode [ 22.352862][ T310] device veth0_vlan entered promiscuous mode [ 22.382008][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.397130][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.404533][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.992372][ T402] device veth1_macvtap left promiscuous mode [ 25.002898][ T402] device macsec0 entered promiscuous mode [ 25.094465][ T410] cgroup: syz.2.26 (410) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 25.149160][ T410] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 25.170525][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 25.170536][ T24] audit: type=1400 audit(1736620487.159:118): avc: denied { relabelfrom } for pid=417 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.236921][ T24] audit: type=1400 audit(1736620487.159:119): avc: denied { relabelto } for pid=417 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 25.855770][ T455] device syzkaller0 entered promiscuous mode [ 26.717340][ T24] audit: type=1400 audit(1736620488.709:120): avc: denied { create } for pid=494 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 28.562794][ T24] audit: type=1400 audit(1736620490.549:121): avc: denied { create } for pid=571 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 28.645019][ T24] audit: type=1400 audit(1736620490.629:122): avc: denied { create } for pid=579 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.677061][ T24] audit: type=1400 audit(1736620490.659:123): avc: denied { write } for pid=579 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.757322][ T558] device vxcan1 entered promiscuous mode [ 28.780052][ T569] device sit0 entered promiscuous mode [ 28.786769][ T24] audit: type=1400 audit(1736620490.769:124): avc: denied { write } for pid=590 comm="syz.2.77" name="ppp" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 29.292410][ T24] audit: type=1400 audit(1736620491.279:125): avc: denied { read } for pid=77 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 30.180793][ T598] device syzkaller0 entered promiscuous mode [ 30.531373][ T24] audit: type=1400 audit(1736620492.519:126): avc: denied { create } for pid=650 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 30.602571][ T24] audit: type=1400 audit(1736620492.589:127): avc: denied { create } for pid=650 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 30.741905][ T24] audit: type=1400 audit(1736620492.729:128): avc: denied { create } for pid=677 comm="syz.2.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 30.877917][ T691] device pim6reg1 entered promiscuous mode [ 30.962920][ T24] audit: type=1400 audit(1736620492.949:129): avc: denied { create } for pid=677 comm="syz.2.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 31.189701][ T24] audit: type=1400 audit(1736620493.179:130): avc: denied { create } for pid=704 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 31.293130][ T24] audit: type=1400 audit(1736620493.279:131): avc: denied { read } for pid=702 comm="syz.3.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.799395][ T24] audit: type=1400 audit(1736620493.779:132): avc: denied { create } for pid=719 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 31.826400][ T714] device syzkaller0 entered promiscuous mode [ 32.001426][ T24] audit: type=1400 audit(1736620493.989:133): avc: denied { create } for pid=731 comm="syz.0.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 32.658320][ T795] syz.2.131[795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 32.658398][ T795] syz.2.131[795] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.079952][ T24] audit: type=1400 audit(1736620495.069:134): avc: denied { setopt } for pid=809 comm="syz.3.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 33.854980][ T840] syz.2.143[840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 33.855034][ T840] syz.2.143[840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.830394][ T875] syz.2.152[875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.902105][ T875] syz.2.152[875] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.177603][ T884] syz.3.156[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.197887][ T884] syz.3.156[884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.365785][ T911] device pim6reg1 entered promiscuous mode [ 37.318256][ T24] audit: type=1400 audit(1736620499.309:135): avc: denied { create } for pid=948 comm="syz.4.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 37.447062][ T24] audit: type=1400 audit(1736620499.329:136): avc: denied { create } for pid=948 comm="syz.4.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 37.964827][ T964] device syzkaller0 entered promiscuous mode [ 38.977537][ T979] syz.4.180[979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 38.978439][ T979] syz.4.180[979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 39.647182][ T991] device syzkaller0 entered promiscuous mode [ 39.934669][ T994] device sit0 entered promiscuous mode [ 40.051849][ T1022] device pim6reg1 entered promiscuous mode [ 40.060101][ T1030] device pim6reg1 entered promiscuous mode [ 40.117182][ T1036] device veth0_vlan left promiscuous mode [ 40.218092][ T1036] device veth0_vlan entered promiscuous mode [ 40.483190][ T24] audit: type=1400 audit(1736620502.469:137): avc: denied { create } for pid=1043 comm="syz.4.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 41.034964][ T24] audit: type=1400 audit(1736620503.019:138): avc: denied { create } for pid=1072 comm="syz.2.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 41.718754][ T24] audit: type=1400 audit(1736620503.709:139): avc: denied { ioctl } for pid=1103 comm="syz.0.208" path="socket:[17530]" dev="sockfs" ino=17530 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 41.808331][ T1106] device pim6reg1 entered promiscuous mode [ 41.876896][ T24] audit: type=1400 audit(1736620503.799:140): avc: denied { tracepoint } for pid=1107 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 43.545669][ T1153] device pim6reg1 entered promiscuous mode [ 43.699355][ T1153] device syzkaller0 entered promiscuous mode [ 44.136978][ T1169] device veth1_macvtap left promiscuous mode [ 44.145400][ T1169] device macsec0 entered promiscuous mode [ 44.314289][ T1169] device veth1_macvtap entered promiscuous mode [ 45.508196][ T1249] device pim6reg1 entered promiscuous mode [ 45.609168][ T24] audit: type=1400 audit(1736620507.599:141): avc: denied { ioctl } for pid=1271 comm="syz.2.254" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 45.802479][ T24] audit: type=1400 audit(1736620507.789:142): avc: denied { create } for pid=1281 comm="syz.4.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 46.318850][ T1307] syz.3.263[1307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 46.365459][ T24] audit: type=1400 audit(1736620508.349:143): avc: denied { create } for pid=1308 comm="syz.0.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 46.960791][ T1311] device syzkaller0 entered promiscuous mode [ 47.503908][ T95] udevd[95]: worker [307] terminated by signal 33 (Unknown signal 33) [ 47.556352][ T95] udevd[95]: worker [307] failed while handling '/devices/virtual/block/loop0' [ 51.614053][ T1474] device syzkaller0 entered promiscuous mode [ 52.153482][ T24] audit: type=1400 audit(1736620514.139:144): avc: denied { create } for pid=1494 comm="syz.3.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 52.834748][ T1527] device wg2 entered promiscuous mode [ 53.144585][ T1547] device syzkaller0 entered promiscuous mode [ 53.474090][ T1567] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.481137][ T1567] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.384177][ T1664] device veth0_to_team entered promiscuous mode [ 56.393667][ T1665] ÿÿÿÿÿÿ: renamed from vlan1 [ 56.427235][ T1670] device pim6reg1 entered promiscuous mode [ 57.489932][ T1708] syz.2.377 uses obsolete (PF_INET,SOCK_PACKET) [ 58.470045][ T1708] device syzkaller0 entered promiscuous mode [ 58.984380][ T1727] device pim6reg1 entered promiscuous mode [ 60.746664][ T1773] device syzkaller0 entered promiscuous mode [ 61.326149][ T1815] syz.2.404[1815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.326201][ T1815] syz.2.404[1815] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.690435][ T1837] device syzkaller0 entered promiscuous mode [ 62.699379][ T1859] device pim6reg1 entered promiscuous mode [ 65.800349][ T24] audit: type=1400 audit(1736620527.789:145): avc: denied { create } for pid=1923 comm="syz.1.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 66.586456][ T24] audit: type=1400 audit(1736620528.569:146): avc: denied { write } for pid=1943 comm="syz.4.434" name="cgroup.subtree_control" dev="cgroup2" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 66.719388][ T24] audit: type=1400 audit(1736620528.569:147): avc: denied { open } for pid=1943 comm="syz.4.434" path="" dev="cgroup2" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 67.165559][ T1969] sock: sock_set_timeout: `syz.0.441' (pid 1969) tries to set negative timeout [ 72.997889][ T2164] device syzkaller0 entered promiscuous mode [ 77.695917][ T2349] device sit0 entered promiscuous mode [ 79.146056][ T2422] device pim6reg1 entered promiscuous mode [ 79.699226][ T2440] device sit0 entered promiscuous mode [ 80.850908][ T24] audit: type=1400 audit(1736620542.839:148): avc: denied { create } for pid=2477 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 80.884148][ T24] audit: type=1400 audit(1736620542.869:149): avc: denied { create } for pid=2480 comm="syz.4.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 80.952292][ T24] audit: type=1400 audit(1736620542.939:150): avc: denied { create } for pid=2486 comm="syz.2.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 82.509249][ T2563] device syzkaller0 entered promiscuous mode [ 82.777346][ T2598] device syzkaller0 left promiscuous mode [ 83.119636][ T2606] device pim6reg1 entered promiscuous mode [ 84.249077][ T2669] device pim6reg1 entered promiscuous mode [ 84.585705][ T2709] device macsec0 left promiscuous mode [ 85.198939][ T2719] device syzkaller0 entered promiscuous mode [ 85.210798][ T2723] device veth0_vlan left promiscuous mode [ 85.217529][ T2723] device veth0_vlan entered promiscuous mode [ 85.234827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 85.243058][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 85.250842][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 85.273785][ T2729] device pim6reg1 entered promiscuous mode [ 85.776642][ T2790] device syzkaller0 entered promiscuous mode [ 86.238151][ T2820] device veth0_vlan left promiscuous mode [ 86.338551][ T2820] device veth0_vlan entered promiscuous mode [ 88.305616][ T2879] syz.1.697[2879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.305684][ T2879] syz.1.697[2879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.757957][ T2879] device sit0 entered promiscuous mode [ 90.990319][ T2960] device wg2 entered promiscuous mode [ 91.060335][ T2957] device pim6reg1 entered promiscuous mode [ 91.555637][ T2966] device veth0_vlan left promiscuous mode [ 91.697662][ T2966] device veth0_vlan entered promiscuous mode [ 93.956691][ T24] audit: type=1400 audit(1736620555.939:151): avc: denied { create } for pid=3036 comm="syz.2.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 93.976126][ T3035] device sit0 left promiscuous mode [ 94.697926][ T3054] device veth0_vlan left promiscuous mode [ 94.724121][ T3054] device veth0_vlan entered promiscuous mode [ 94.743053][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 94.771580][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 94.806917][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 97.525104][ T3197] device syzkaller0 entered promiscuous mode [ 100.030332][ T3248] device pim6reg1 entered promiscuous mode [ 101.251868][ T24] audit: type=1400 audit(1736620563.239:152): avc: denied { create } for pid=3285 comm="syz.2.804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 102.495675][ T24] audit: type=1400 audit(1736620564.479:153): avc: denied { create } for pid=3331 comm="syz.4.815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 102.801911][ T3343] syz.4.819[3343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.801990][ T3343] syz.4.819[3343] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 103.764682][ T3365] device wg2 entered promiscuous mode [ 105.958511][ T3415] device syzkaller0 entered promiscuous mode [ 106.482140][ T3438] device pim6reg1 entered promiscuous mode [ 106.777943][ T3449] device wg2 entered promiscuous mode [ 107.030363][ T3456] device syzkaller0 entered promiscuous mode [ 107.178752][ T3462] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 107.243551][ T3462] syzkaller0: Linktype set failed because interface is up [ 107.251302][ T849] syzkaller0: tun_net_xmit 48 [ 107.325441][ T3465] syz.3.853[3465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.325489][ T3465] syz.3.853[3465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.929634][ T3529] syz.1.872[3529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.007159][ T3529] syz.1.872[3529] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.087789][ T3531] syz.1.872[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.167295][ T3531] syz.1.872[3531] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.546988][ T3553] device syzkaller0 entered promiscuous mode [ 111.183970][ T3559] Â: renamed from pim6reg1 [ 111.518986][ T3588] device pim6reg1 entered promiscuous mode [ 111.571931][ T24] audit: type=1400 audit(1736620573.559:154): avc: denied { append } for pid=3595 comm="syz.0.892" name="ppp" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 113.415346][ T3652] device dummy0 entered promiscuous mode [ 113.419631][ T24] audit: type=1400 audit(1736620575.409:155): avc: denied { create } for pid=3655 comm="syz.4.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 113.668779][ T3670] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.449261][ T24] audit: type=1400 audit(1736620576.439:156): avc: denied { create } for pid=3707 comm="syz.1.924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 114.658255][ T24] audit: type=1400 audit(1736620576.649:157): avc: denied { append } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 114.764694][ T3715] device syzkaller0 entered promiscuous mode [ 114.783354][ T24] audit: type=1400 audit(1736620576.649:158): avc: denied { open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 115.029355][ T24] audit: type=1400 audit(1736620576.649:159): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 115.140613][ T3759] device veth1_macvtap left promiscuous mode [ 115.146520][ T3759] device macsec0 entered promiscuous mode [ 115.188676][ T3751] device veth1_macvtap entered promiscuous mode [ 115.305960][ T3779] device pim6reg1 entered promiscuous mode [ 115.925360][ T3819] device syzkaller0 entered promiscuous mode [ 116.504640][ T3834] syz.0.962 (3834) used obsolete PPPIOCDETACH ioctl [ 117.298241][ T3854] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.327680][ T3861] device wg2 left promiscuous mode [ 117.542661][ T24] audit: type=1400 audit(1736620579.529:160): avc: denied { create } for pid=3865 comm="syz.2.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 117.635554][ T3866] device syzkaller0 entered promiscuous mode [ 118.171047][ T3898] device syzkaller0 entered promiscuous mode [ 118.701026][ T3940] device wg2 left promiscuous mode [ 119.201076][ T3974] device macsec0 left promiscuous mode [ 120.481560][ T4027] device pim6reg1 entered promiscuous mode [ 121.044564][ T4063] device wg2 entered promiscuous mode [ 121.263781][ T4067] syz.2.1022[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.263836][ T4067] syz.2.1022[4067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.437389][ T4072] device syzkaller0 entered promiscuous mode [ 121.832582][ T4096] syz.2.1030[4096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.832636][ T4096] syz.2.1030[4096] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.898223][ T4098] syz.2.1030[4098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.914329][ T4098] syz.2.1030[4098] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.990882][ T4091] device syzkaller0 entered promiscuous mode [ 122.810376][ T4118] device pim6reg1 entered promiscuous mode [ 122.867863][ T4127] device pim6reg1 entered promiscuous mode [ 123.287384][ T4130] device syzkaller0 entered promiscuous mode [ 123.913790][ T24] audit: type=1400 audit(1736620585.899:161): avc: denied { create } for pid=4154 comm="syz.2.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 124.255467][ T4165] device syzkaller0 entered promiscuous mode [ 126.301560][ T4298] device veth0_vlan left promiscuous mode [ 126.309919][ T4298] device veth0_vlan entered promiscuous mode [ 126.346430][ T4306] syz.1.1089[4306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.346482][ T4306] syz.1.1089[4306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.692147][ T4330] syz.2.1097[4330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.733503][ T4333] device pim6reg1 entered promiscuous mode [ 126.733511][ T4330] syz.2.1097[4330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 126.923027][ T4335] device syzkaller0 entered promiscuous mode [ 128.168707][ T4416] syz.1.1121[4416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.168755][ T4416] syz.1.1121[4416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.365508][ T4419] device syzkaller0 entered promiscuous mode [ 129.184085][ T4466] device pim6reg1 entered promiscuous mode [ 129.254685][ T4478] syz.4.1142[4478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.254741][ T4478] syz.4.1142[4478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.196970][ T4537] device veth1_macvtap left promiscuous mode [ 131.149922][ T4550] device syzkaller0 entered promiscuous mode [ 131.260987][ T4560] device sit0 left promiscuous mode [ 132.614644][ T4626] device wg2 left promiscuous mode [ 132.644441][ T4626] device wg2 entered promiscuous mode [ 132.819252][ T4640] device wg2 left promiscuous mode [ 133.141233][ T4660] device veth1_macvtap left promiscuous mode [ 134.058255][ T4703] device syzkaller0 entered promiscuous mode [ 139.475305][ T4899] device pim6reg1 entered promiscuous mode [ 140.173037][ T4937] device wg2 left promiscuous mode [ 140.492802][ T4948] device pim6reg1 entered promiscuous mode [ 140.685798][ T4962] device veth0_vlan left promiscuous mode [ 140.923277][ T4962] device veth0_vlan entered promiscuous mode [ 141.170729][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.218551][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 141.287703][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 141.714652][ T5003] device sit0 entered promiscuous mode [ 143.695498][ T5055] device syzkaller0 entered promiscuous mode [ 145.723389][ T5127] device pim6reg1 entered promiscuous mode [ 147.460562][ T5185] device macsec0 left promiscuous mode [ 147.479136][ T5197] device veth1_macvtap entered promiscuous mode [ 147.485318][ T5197] device macsec0 entered promiscuous mode [ 147.491996][ T5201] device veth0_vlan left promiscuous mode [ 147.499032][ T5201] device veth0_vlan entered promiscuous mode [ 147.516134][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 147.524056][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 147.534337][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 147.542051][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 147.957533][ T5220] device macsec0 entered promiscuous mode [ 149.560772][ T5259] device syzkaller0 entered promiscuous mode [ 149.912000][ T5288] syz.0.1370[5288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.472665][ T5319] device pim6reg1 entered promiscuous mode [ 150.645823][ T24] audit: type=1400 audit(1736620612.629:162): avc: denied { create } for pid=5328 comm="syz.3.1382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 151.149455][ T24] audit: type=1400 audit(1736620613.139:163): avc: denied { remove_name } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 151.241948][ T24] audit: type=1400 audit(1736620613.139:164): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 151.396218][ T24] audit: type=1400 audit(1736620613.139:165): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 152.239558][ T5389] device syzkaller0 entered promiscuous mode [ 152.366958][ T5400] syz.1.1401[5400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.367711][ T5400] syz.1.1401[5400] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.706602][ T5456] ªªªªªª: renamed from pim6reg1 [ 153.750312][ T5462] device wg2 left promiscuous mode [ 153.775360][ T5462] device wg2 entered promiscuous mode [ 153.934591][ T5471] ÿÿÿÿÿÿ: renamed from vlan1 [ 154.231482][ T5490] syz.2.1425[5490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.231580][ T5490] syz.2.1425[5490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.375993][ T5495] device syzkaller0 entered promiscuous mode [ 154.854652][ T5509] device wg2 entered promiscuous mode [ 157.200272][ T5573] device syzkaller0 entered promiscuous mode [ 157.388437][ T5576] : renamed from ipvlan1 [ 158.976592][ T5613] device pim6reg1 entered promiscuous mode [ 159.378375][ T5646] device veth0_vlan left promiscuous mode [ 159.407282][ T5646] device veth0_vlan entered promiscuous mode [ 159.511107][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 159.521596][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 159.540242][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 160.915684][ T5718] syz.4.1490[5718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.915741][ T5718] syz.4.1490[5718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.054071][ T5825] device sit0 left promiscuous mode [ 163.338191][ T24] audit: type=1400 audit(1736620625.329:166): avc: denied { create } for pid=5857 comm="syz.0.1526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 163.362954][ T5852] device pim6reg1 entered promiscuous mode [ 163.380251][ T5840] device pim6reg1 entered promiscuous mode [ 163.548233][ T5886] device wg2 left promiscuous mode [ 164.022966][ T5927] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.029873][ T5927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.049615][ T5927] device bridge0 entered promiscuous mode [ 164.265441][ T5941] syz.1.1549[5941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.265526][ T5941] syz.1.1549[5941] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.945552][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.140198][ T5966] device veth1_macvtap left promiscuous mode [ 165.146015][ T5966] device macsec0 left promiscuous mode [ 165.347686][ T5971] device syzkaller0 entered promiscuous mode [ 165.901885][ T6036] device veth1_macvtap entered promiscuous mode [ 165.923316][ T6036] device macsec0 entered promiscuous mode [ 166.107714][ T6040] device sit0 left promiscuous mode [ 166.146317][ T6048] ------------[ cut here ]------------ [ 166.194923][ T6048] trace type BPF program uses run-time allocation [ 166.256327][ T6048] WARNING: CPU: 0 PID: 6048 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x65b/0x7c0 [ 166.289780][ T6048] Modules linked in: [ 166.298889][ T6048] CPU: 0 PID: 6048 Comm: syz.1.1584 Not tainted 5.10.232-syzkaller-00746-g49e8ba0a684f #0 [ 166.312239][ T6048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 166.322462][ T6048] RIP: 0010:check_map_prog_compatibility+0x65b/0x7c0 [ 166.329159][ T6048] Code: c8 e9 84 fe ff ff e8 e4 f6 ee ff 31 db e9 85 fe ff ff e8 d8 f6 ee ff c6 05 2e 28 65 05 01 48 c7 c7 00 7e 45 85 e8 35 6c c2 ff <0f> 0b e9 42 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 17 fa ff [ 166.377218][ T6048] RSP: 0018:ffffc9000155ef90 EFLAGS: 00010246 [ 166.390381][ T6048] RAX: 1fd5a75899257600 RBX: ffff88810d714000 RCX: ffff888135c162c0 [ 166.400292][ T6048] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 166.408153][ T6048] RBP: ffffc9000155efd0 R08: ffffffff81523288 R09: ffffed103ee0a5f8 [ 166.424416][ T6048] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 166.432552][ T6048] R13: 1ffff9200004c204 R14: ffff888107798000 R15: ffffc90000261020 [ 166.441160][ T6048] FS: 00007f9b191b96c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 166.451159][ T6048] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 166.459860][ T6048] CR2: 0000000000000000 CR3: 0000000113231000 CR4: 00000000003506b0 [ 166.467916][ T6048] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 166.475734][ T6048] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 166.483854][ T6048] Call Trace: [ 166.487194][ T6048] ? show_regs+0x58/0x60 [ 166.491330][ T6048] ? __warn+0x160/0x2f0 [ 166.495323][ T6048] ? check_map_prog_compatibility+0x65b/0x7c0 [ 166.501491][ T6048] ? report_bug+0x3d9/0x5b0 [ 166.505899][ T6048] ? check_map_prog_compatibility+0x65b/0x7c0 [ 166.512322][ T6048] ? handle_bug+0x41/0x70 [ 166.516566][ T6048] ? exc_invalid_op+0x1b/0x50 [ 166.521305][ T6048] ? asm_exc_invalid_op+0x12/0x20 [ 166.526211][ T6048] ? wake_up_klogd+0xb8/0xf0 [ 166.530876][ T6048] ? check_map_prog_compatibility+0x65b/0x7c0 [ 166.536993][ T6048] ? __fdget+0x1bc/0x240 [ 166.541165][ T6048] resolve_pseudo_ldimm64+0x586/0x1020 [ 166.546409][ T6048] ? bpf_check+0xf230/0xf230 [ 166.551118][ T6048] ? kvmalloc_node+0x82/0x130 [ 166.557110][ T6048] bpf_check+0xaeca/0xf230 [ 166.561491][ T6048] ? stack_depot_save+0xe/0x10 [ 166.566141][ T6048] ? __se_sys_bpf+0x9856/0x11cb0 [ 166.571171][ T6048] ? 0xffffffffa002a000 [ 166.575198][ T6048] ? is_bpf_text_address+0x172/0x190 [ 166.580540][ T6048] ? bpf_get_btf_vmlinux+0x60/0x60 [ 166.585558][ T6048] ? __kernel_text_address+0x9b/0x110 [ 166.590996][ T6048] ? unwind_get_return_address+0x4d/0x90 [ 166.596509][ T6048] ? arch_stack_walk+0xf3/0x140 [ 166.601410][ T6048] ? stack_trace_save+0x113/0x1c0 [ 166.606315][ T6048] ? stack_trace_snprint+0xf0/0xf0 [ 166.611899][ T6048] ? stack_trace_snprint+0xf0/0xf0 [ 166.617066][ T6048] ? selinux_bpf_prog_alloc+0x51/0x140 [ 166.622596][ T6048] ? selinux_bpf_prog_alloc+0x51/0x140 [ 166.628226][ T6048] ? ____kasan_kmalloc+0xed/0x110 [ 166.634228][ T6048] ? ____kasan_kmalloc+0xdb/0x110 [ 166.639434][ T6048] ? __kasan_kmalloc+0x9/0x10 [ 166.644020][ T6048] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 166.649586][ T6048] ? selinux_bpf_prog_alloc+0x51/0x140 [ 166.654961][ T6048] ? security_bpf_prog_alloc+0x62/0x90 [ 166.660458][ T6048] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 166.665314][ T6048] ? __x64_sys_bpf+0x7b/0x90 [ 166.669902][ T6048] ? do_syscall_64+0x34/0x70 [ 166.674377][ T6048] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.680543][ T6048] ? __kasan_kmalloc+0x9/0x10 [ 166.691689][ T6048] __se_sys_bpf+0x107a2/0x11cb0 [ 166.700807][ T6048] ? futex_wait+0x6a0/0x7c0 [ 166.705201][ T6048] ? __x64_sys_bpf+0x90/0x90 [ 166.710017][ T6048] ? do_futex+0x17b0/0x17b0 [ 166.714509][ T6048] ? slab_post_alloc_hook+0x80/0x2f0 [ 166.719994][ T6048] ? do_futex+0x139a/0x17b0 [ 166.724485][ T6048] ? percpu_counter_add_batch+0x13d/0x160 [ 166.730442][ T6048] ? alloc_file+0x83/0x4e0 [ 166.734779][ T6048] ? memcpy+0x56/0x70 [ 166.738749][ T6048] ? errseq_sample+0x44/0x70 [ 166.743331][ T6048] ? futex_exit_release+0x1e0/0x1e0 [ 166.748735][ T6048] ? alloc_file_pseudo+0x280/0x2f0 [ 166.753850][ T6048] ? alloc_empty_file_noaccount+0x80/0x80 [ 166.759699][ T6048] ? tipc_sk_finish_conn+0x5a7/0x850 [ 166.764958][ T6048] ? __se_sys_futex+0x355/0x470 [ 166.769950][ T6048] ? fpu__clear_all+0x20/0x20 [ 166.774516][ T6048] ? __kasan_check_read+0x11/0x20 [ 166.781295][ T6048] __x64_sys_bpf+0x7b/0x90 [ 166.785602][ T6048] do_syscall_64+0x34/0x70 [ 166.790108][ T6048] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.795903][ T6048] RIP: 0033:0x7f9b1ab47d29 [ 166.800475][ T6048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.825866][ T6048] RSP: 002b:00007f9b191b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 166.835189][ T6048] RAX: ffffffffffffffda RBX: 00007f9b1ad37fa0 RCX: 00007f9b1ab47d29 [ 166.843331][ T6048] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 166.851363][ T6048] RBP: 00007f9b1abc3b08 R08: 0000000000000000 R09: 0000000000000000 [ 166.860491][ T6048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 166.868630][ T6048] R13: 0000000000000000 R14: 00007f9b1ad37fa0 R15: 00007fff4ecb0618 [ 166.877570][ T6048] ---[ end trace 25cbd08363c79c60 ]--- [ 166.924995][ T6062] device syzkaller0 entered promiscuous mode [ 166.960786][ T6072] : renamed from ipvlan1 [ 167.067907][ T6069] device veth1_macvtap left promiscuous mode [ 167.863739][ T6101] device pim6reg1 entered promiscuous mode [ 168.168935][ T6112] device syzkaller0 entered promiscuous mode [ 169.408837][ T6162] syz.1.1611[6162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.408950][ T6162] syz.1.1611[6162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 169.626648][ T6172] device macsec0 left promiscuous mode [ 169.752706][ T6166] device macsec0 entered promiscuous mode [ 170.661087][ T6207] device sit0 entered promiscuous mode [ 172.781688][ T6276] syz.3.1644[6276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.781743][ T6276] syz.3.1644[6276] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.952890][ T6276] device veth1_macvtap entered promiscuous mode [ 173.169706][ T6276] device macsec0 entered promiscuous mode [ 173.214408][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 173.663106][ T6313] GPL: port 1(erspan0) entered blocking state [ 173.747406][ T6313] GPL: port 1(erspan0) entered disabled state [ 173.827110][ T6313] device erspan0 entered promiscuous mode [ 173.868657][ T6315] device erspan0 left promiscuous mode [ 173.875684][ T6315] GPL: port 1(erspan0) entered disabled state [ 175.747300][ T6415] device pim6reg1 entered promiscuous mode [ 176.310028][ T6462] tap0: tun_chr_ioctl cmd 1074025675 [ 176.317749][ T6462] tap0: persist disabled [ 176.327336][ T6457] netpci0: tun_chr_ioctl cmd 21731 [ 176.593183][ T6477] device pim6reg1 entered promiscuous mode [ 176.915236][ T6491] device veth0_vlan left promiscuous mode [ 176.928341][ T6491] device veth0_vlan entered promiscuous mode [ 178.279953][ T6541] device lo entered promiscuous mode [ 178.291564][ T6561] device wg2 left promiscuous mode [ 179.422235][ T6617] device syzkaller0 entered promiscuous mode [ 179.559000][ T6637] syz.2.1740[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.559057][ T6637] syz.2.1740[6637] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.001940][ T6662] syzkaller0: tun_chr_ioctl cmd 35108 [ 181.828811][ T6730] device pim6reg1 entered promiscuous mode [ 182.384256][ T6747] ªªªªªª: renamed from vlan0 [ 182.783453][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.803175][ T1024] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.810086][ T1024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.674918][ T6812] device sit0 left promiscuous mode [ 183.759788][ T6823] device sit0 entered promiscuous mode [ 184.573763][ T6859] device pim6reg1 entered promiscuous mode [ 186.830853][ T6913] device pim6reg1 entered promiscuous mode [ 186.899457][ T6933] device pim6reg1 entered promiscuous mode [ 187.404021][ T6950] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.431569][ T6950] device bridge0 left promiscuous mode [ 188.474045][ T6990] device macsec0 left promiscuous mode [ 190.125286][ T7058] device veth1_macvtap left promiscuous mode [ 190.573313][ T7062] device veth1_macvtap entered promiscuous mode [ 190.597857][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 190.689140][ T7058] device veth1_macvtap left promiscuous mode [ 190.844017][ T7078] syz.0.1856[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.844075][ T7078] syz.0.1856[7078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.979405][ T7074] device syzkaller0 entered promiscuous mode [ 194.794586][ T7251] device pim6reg1 entered promiscuous mode [ 194.920925][ T7272] device macsec0 entered promiscuous mode [ 194.927062][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 202.363239][ T24] audit: type=1400 audit(1736620664.349:167): avc: denied { attach_queue } for pid=7385 comm="syz.2.1936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 203.104856][ T7396] device syzkaller0 entered promiscuous mode [ 204.930042][ T7474] device pim6reg1 entered promiscuous mode [ 205.889576][ T7488] device syzkaller0 entered promiscuous mode [ 205.912082][ T7490] device syzkaller0 entered promiscuous mode [ 205.919380][ T7492] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.635189][ T7514] device syzkaller0 entered promiscuous mode [ 207.049943][ T7552] device pim6reg1 entered promiscuous mode [ 207.137760][ T7555] @ÿ: renamed from bond_slave_0 [ 207.583678][ T7579] device veth1_macvtap entered promiscuous mode [ 207.618402][ T7579] device macsec0 entered promiscuous mode [ 208.012628][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 208.124120][ T7598] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 208.303933][ T7598] device syzkaller0 entered promiscuous mode [ 209.081524][ T7656] device sit0 entered promiscuous mode [ 209.149502][ T7656] syz.0.2010[7656] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.114508][ T7697] device syzkaller0 entered promiscuous mode [ 210.470602][ T7772] bridge0: port 3(veth0_vlan) entered blocking state [ 210.477199][ T7772] bridge0: port 3(veth0_vlan) entered disabled state [ 211.063854][ T7800] device veth0_to_team entered promiscuous mode [ 212.511595][ T7866] ªªªªªª: renamed from vlan0 [ 212.847796][ T7896] syz.3.2063[7896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.847850][ T7896] syz.3.2063[7896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.233603][ T7916] device wg2 entered promiscuous mode [ 213.882617][ T7958] device sit0 left promiscuous mode [ 213.979637][ T7958] device sit0 entered promiscuous mode [ 214.483031][ T24] audit: type=1400 audit(1736620676.469:168): avc: denied { create } for pid=7973 comm="syz.2.2084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 215.032553][ T8033] device pim6reg1 entered promiscuous mode [ 215.225742][ T8048] device pim6reg1 entered promiscuous mode [ 215.736576][ T8058] device veth1_macvtap left promiscuous mode [ 215.744150][ T8058] device macsec0 left promiscuous mode [ 215.908985][ T8058] device veth1_macvtap entered promiscuous mode [ 215.918987][ T8058] device macsec0 entered promiscuous mode [ 215.981419][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.029842][ T8075] device sit0 left promiscuous mode [ 216.268594][ T8095] device pim6reg1 entered promiscuous mode [ 216.411462][ T8105] device pim6reg1 entered promiscuous mode [ 216.538974][ T8108] device veth0_vlan left promiscuous mode [ 216.556147][ T8108] device veth0_vlan entered promiscuous mode [ 216.953486][ T8114] device veth1_macvtap entered promiscuous mode [ 216.971123][ T8114] device macsec0 entered promiscuous mode [ 217.016548][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 218.316092][ T8167] device macsec0 left promiscuous mode [ 218.498716][ T8170] device macsec0 entered promiscuous mode [ 220.639729][ T8271] device syzkaller0 entered promiscuous mode [ 222.386154][ T8306] device veth0_vlan left promiscuous mode [ 222.427036][ T8306] device veth0_vlan entered promiscuous mode [ 223.401468][ T8360] device pim6reg1 entered promiscuous mode [ 223.642913][ T8370] device syzkaller0 entered promiscuous mode [ 224.109498][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.123256][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 224.131174][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 224.322750][ T8393] device pim6reg1 entered promiscuous mode [ 224.598605][ T8406] device veth0_vlan left promiscuous mode [ 224.604483][ T8406] device veth0_vlan entered promiscuous mode [ 224.623267][ T8410] syz.3.2209[8410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.624100][ T8410] syz.3.2209[8410] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.664238][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.728562][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 224.763379][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.384796][ T8455] device syzkaller0 entered promiscuous mode [ 226.231124][ T8486] device veth1_macvtap left promiscuous mode [ 226.242206][ T8486] device macsec0 left promiscuous mode [ 227.357201][ T8520] device macsec0 left promiscuous mode [ 227.471931][ T8519] device veth1_macvtap entered promiscuous mode [ 227.488503][ T8519] device macsec0 entered promiscuous mode [ 227.515892][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 227.778984][ T8551] device sit0 left promiscuous mode [ 227.993160][ T8551] device sit0 entered promiscuous mode [ 229.468735][ T8609] device wg2 entered promiscuous mode [ 229.973513][ T8626] device sit0 left promiscuous mode [ 230.172865][ T8622] device sit0 entered promiscuous mode [ 230.227938][ T8638] device pim6reg1 entered promiscuous mode [ 230.556931][ T8648] device pim6reg1 entered promiscuous mode [ 232.282776][ T8698] device syzkaller0 entered promiscuous mode [ 235.428178][ T8759] Â: renamed from pim6reg1 [ 235.486484][ T8775] syz.0.2308[8775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.486538][ T8775] syz.0.2308[8775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.024940][ T8811] device macsec0 left promiscuous mode [ 237.622169][ T8861] device sit0 left promiscuous mode [ 237.633881][ T8861] device sit0 entered promiscuous mode [ 237.724546][ T8863] device veth1_macvtap left promiscuous mode [ 238.099958][ T8900] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 238.105444][ T8900] pim6reg0: linktype set to 805 [ 239.261634][ T8939] device syzkaller0 entered promiscuous mode [ 239.754805][ T24] audit: type=1400 audit(1736620701.739:169): avc: denied { write } for pid=8952 comm="syz.0.2351" name="net" dev="proc" ino=41621 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 239.926362][ T24] audit: type=1400 audit(1736620701.739:170): avc: denied { add_name } for pid=8952 comm="syz.0.2351" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 240.391025][ T24] audit: type=1400 audit(1736620701.739:171): avc: denied { create } for pid=8952 comm="syz.0.2351" name="cgroup.freeze" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 240.566082][ T24] audit: type=1400 audit(1736620701.739:172): avc: denied { associate } for pid=8952 comm="syz.0.2351" name="cgroup.freeze" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 240.635938][ T8957] device syzkaller0 entered promiscuous mode [ 240.671346][ T8963] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.678370][ T8963] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.857591][ T8981] device syzkaller0 entered promiscuous mode [ 240.899912][ T8985] Â: renamed from pim6reg1 [ 242.516987][ T9060] syz.0.2382[9060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.517044][ T9060] syz.0.2382[9060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.647164][ T24] audit: type=1400 audit(1736620706.639:173): avc: denied { setattr } for pid=9186 comm="syz.1.2414" path="pipe:[2048]" dev="pipefs" ino=2048 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 245.712654][ T9220] device syzkaller0 entered promiscuous mode [ 246.102823][ T9240] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 246.125282][ T9240] pim6reg0: linktype set to 780 [ 246.190038][ T9244] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.212814][ T9244] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.236479][ T9244] device bridge_slave_0 left promiscuous mode [ 246.257259][ T9244] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.763231][ T9285] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.770348][ T9285] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.781197][ T9285] device bridge_slave_1 left promiscuous mode [ 246.787898][ T9285] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.800871][ T9285] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.439874][ T9345] bridge0: port 3(veth0_vlan) entered disabled state [ 247.496556][ T9345] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.546044][ T9345] device bridge_slave_0 left promiscuous mode [ 247.552148][ T9345] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.041311][ T9398] device sit0 entered promiscuous mode [ 248.433356][ T9402] device syzkaller0 entered promiscuous mode [ 248.882438][ T9437] tap0: tun_chr_ioctl cmd 1074812118 [ 249.049839][ T9441] device veth1_macvtap left promiscuous mode [ 249.055999][ T9441] device macsec0 left promiscuous mode [ 250.273252][ T9497] syz.4.2503[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.273345][ T9497] syz.4.2503[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.336968][ T9497] syz.4.2503[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.360493][ T9497] syz.4.2503[9497] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 250.879606][ T9525] device syzkaller0 entered promiscuous mode [ 251.082236][ T9550] device syzkaller0 entered promiscuous mode [ 252.248225][ T9612] device pim6reg1 entered promiscuous mode [ 252.279865][ T9617] device pim6reg1 entered promiscuous mode [ 254.324216][ T9697] device pim6reg1 entered promiscuous mode [ 254.469527][ T9710] device syzkaller0 entered promiscuous mode [ 255.959126][ T9747] device pim6reg1 entered promiscuous mode [ 256.627129][ T9783] device pim6reg1 entered promiscuous mode [ 256.946368][ T95] udevd[95]: worker [1595] terminated by signal 33 (Unknown signal 33) [ 256.959082][ T95] udevd[95]: worker [1595] failed while handling '/devices/virtual/block/loop3' [ 257.243872][ T9824] syz.0.2596[9824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.243929][ T9824] syz.0.2596[9824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.950447][ T9856] netpci0: tun_chr_ioctl cmd 2148553947 [ 258.040858][ T9861] device sit0 entered promiscuous mode [ 258.296480][ T9897] device veth0_vlan left promiscuous mode [ 258.309078][ T9897] device veth0_vlan entered promiscuous mode [ 258.321261][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.329753][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.337371][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 262.673210][T10064] syz.2.2666[10064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.673266][T10064] syz.2.2666[10064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.273006][T10234] device pim6reg1 entered promiscuous mode [ 268.193323][T10256] device wg2 entered promiscuous mode [ 268.380846][T10263] device macsec0 entered promiscuous mode [ 269.080430][T10285] device syzkaller0 entered promiscuous mode [ 269.192328][T10306] device syzkaller0 entered promiscuous mode [ 269.402974][T10337] device veth1_macvtap entered promiscuous mode [ 269.409188][T10337] device macsec0 entered promiscuous mode [ 269.422204][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.433590][T10337] device veth1_macvtap left promiscuous mode [ 269.454536][T10337] device macsec0 left promiscuous mode [ 269.579337][T10358] ªªªªªª: renamed from vlan0 [ 270.860421][T10402] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.926503][T10407] ªªªªªª: renamed from vlan0 [ 272.042657][T10435] bridge0: port 3(veth0_vlan) entered blocking state [ 272.069394][T10435] bridge0: port 3(veth0_vlan) entered disabled state [ 272.970807][T10465] device syzkaller0 entered promiscuous mode [ 273.349855][T10495] syz.2.2791[10495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.349925][T10495] syz.2.2791[10495] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.767902][T10512] device pim6reg1 entered promiscuous mode [ 273.817444][T10520] device pim6reg1 entered promiscuous mode [ 274.064286][T10521] device syzkaller0 entered promiscuous mode [ 274.167040][ T9352] syzkaller0: tun_net_xmit 48 [ 274.599166][T10567] device pim6reg1 entered promiscuous mode [ 274.898470][T10608] device sit0 left promiscuous mode [ 275.019265][T10608] device sit0 entered promiscuous mode [ 276.408527][T10646] device pim6reg1 entered promiscuous mode [ 277.672468][T10677] device pim6reg1 entered promiscuous mode [ 278.085224][T10686] device sit0 left promiscuous mode [ 278.151216][T10687] device sit0 entered promiscuous mode [ 279.314091][T10728] device syzkaller0 entered promiscuous mode [ 279.333821][T10713] device pim6reg1 entered promiscuous mode [ 279.442470][T10730] device bridge_slave_1 entered promiscuous mode [ 279.761046][ T24] audit: type=1400 audit(1736620741.749:174): avc: denied { create } for pid=10734 comm="syz.3.2855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 281.205900][T10801] device sit0 left promiscuous mode [ 281.270131][T10801] device sit0 entered promiscuous mode [ 281.872951][T10808] device pim6reg1 entered promiscuous mode [ 281.936482][T10816] device syzkaller0 entered promiscuous mode [ 281.968219][T10822] bridge0: port 3(veth0_vlan) entered disabled state [ 281.975637][T10822] device bridge_slave_1 left promiscuous mode [ 281.995241][T10822] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.005958][T10822] device bridge_slave_0 left promiscuous mode [ 282.018878][T10822] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.478555][T10842] device pim6reg1 entered promiscuous mode [ 283.684646][T10927] syz.0.2906[10927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.701791][T10927] syz.0.2906[10927] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.354976][T10929] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.373493][T10929] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.381058][T10929] device bridge_slave_0 entered promiscuous mode [ 284.388151][T10929] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.394986][T10929] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.402396][T10929] device bridge_slave_1 entered promiscuous mode [ 284.642205][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.653644][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.776967][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.785158][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.837073][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.843954][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.860260][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.953852][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.047028][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.053904][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.098717][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.130929][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.142335][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.197945][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.265474][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.285162][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.317054][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.325687][T10929] device veth0_vlan entered promiscuous mode [ 285.371303][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.393985][T10929] device veth1_macvtap entered promiscuous mode [ 285.441456][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.457614][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.505417][ T24] audit: type=1400 audit(1736620747.489:175): avc: denied { mounton } for pid=10929 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 286.503510][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.529347][ T7] device bridge_slave_0 left promiscuous mode [ 286.562099][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.574160][T11076] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.736733][T11076] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.809738][T11076] device bridge_slave_0 entered promiscuous mode [ 287.867011][T11120] device veth0_vlan left promiscuous mode [ 287.947256][T11120] device veth0_vlan entered promiscuous mode [ 287.978124][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.027903][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 288.124670][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.187433][T11076] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.194270][T11076] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.227162][T11076] device bridge_slave_1 entered promiscuous mode [ 288.432943][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 288.447044][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.490692][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 288.510827][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.531147][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.538043][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.566975][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 288.596924][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.629876][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.636758][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.666450][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 288.699313][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.755833][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.819432][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 288.851931][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 288.877180][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 288.905410][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 288.935572][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 288.969318][T11076] device veth0_vlan entered promiscuous mode [ 289.015834][T11076] device veth1_macvtap entered promiscuous mode [ 289.055198][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 289.065184][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 289.095442][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 289.139759][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 289.178323][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.218582][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.267046][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 289.789998][ T7] device veth0_vlan left promiscuous mode [ 290.697881][T11168] syz.0.2973[11168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.697935][T11168] syz.0.2973[11168] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.722587][T11163] device wg2 entered promiscuous mode [ 291.020647][T11165] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.034986][T11165] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.043829][T11165] device bridge_slave_0 entered promiscuous mode [ 291.132434][T11165] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.271910][T11165] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.410734][T11165] device bridge_slave_1 entered promiscuous mode [ 291.546304][T11187] device wg2 left promiscuous mode [ 291.552898][T11188] device wg2 entered promiscuous mode [ 293.315816][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.381235][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.507636][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.680711][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.850142][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.857041][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.904925][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.912613][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.921259][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.930530][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.937389][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.963458][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.971441][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.980087][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.988156][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.057529][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.172170][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.191334][T11165] device veth0_vlan entered promiscuous mode [ 294.216348][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.248533][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.273044][T11165] device veth1_macvtap entered promiscuous mode [ 294.320314][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.329835][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.348087][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.369344][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.390291][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 294.515092][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 294.524548][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 294.532852][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 294.541393][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 294.558439][T11261] device pim6reg1 entered promiscuous mode [ 295.088326][ T7] device veth1_macvtap left promiscuous mode [ 295.309040][T11323] device pim6reg1 entered promiscuous mode [ 297.403972][T11424] device macsec0 entered promiscuous mode [ 297.537848][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 299.721704][T11510] device pim6reg1 entered promiscuous mode [ 300.831058][T11542] device wg2 entered promiscuous mode [ 301.040210][T11535] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.061987][T11535] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.069837][T11535] device bridge_slave_0 entered promiscuous mode [ 301.107796][T11535] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.114805][T11535] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.123506][T11535] device bridge_slave_1 entered promiscuous mode [ 301.200326][T11535] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.207217][T11535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.214300][T11535] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.221408][T11535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.252545][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.277463][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.314381][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.322163][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.337728][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.346159][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.355582][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.362453][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.371365][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.379613][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.388095][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.395064][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.427627][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.443276][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.475519][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.490123][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.501066][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 301.509505][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 301.566433][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 301.574351][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 301.582892][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 301.607288][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 301.635849][T11577] device syzkaller0 entered promiscuous mode [ 301.648644][T11535] device veth0_vlan entered promiscuous mode [ 301.713669][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 301.721806][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 301.749428][T11535] device veth1_macvtap entered promiscuous mode [ 301.804873][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 301.861595][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 302.010286][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 302.217079][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 302.262068][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 302.339938][T11603] device syzkaller0 entered promiscuous mode [ 302.876569][ T7] device veth0_vlan left promiscuous mode [ 303.131250][T11636] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.138498][T11636] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.145769][T11636] device bridge_slave_0 entered promiscuous mode [ 303.153436][T11636] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.239398][T11636] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.337924][T11636] device bridge_slave_1 entered promiscuous mode [ 303.398768][T11670] device veth1_macvtap left promiscuous mode [ 304.003926][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.012016][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.052627][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.075459][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.088193][ T1024] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.095076][ T1024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.150472][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.172459][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.208074][ T1024] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.214970][ T1024] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.255771][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.328625][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.559973][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.591016][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 304.605854][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 304.719437][T11636] device veth0_vlan entered promiscuous mode [ 304.809338][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 304.863195][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 304.982031][T11636] device veth1_macvtap entered promiscuous mode [ 305.084238][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.119286][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 305.165268][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 305.185148][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 305.208998][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 305.223655][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 305.232818][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 305.268437][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 305.287711][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 305.543382][T11738] device syzkaller0 entered promiscuous mode [ 305.822302][T11757] device syzkaller0 entered promiscuous mode [ 306.623381][ T7] device veth0_vlan left promiscuous mode [ 306.875292][T11818] device veth1_macvtap left promiscuous mode [ 306.891626][T11823] device veth1_macvtap entered promiscuous mode [ 306.898033][T11823] device macsec0 entered promiscuous mode [ 306.955085][T11824] device veth0_vlan left promiscuous mode [ 306.973094][T11824] device veth0_vlan entered promiscuous mode [ 307.112214][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 307.134669][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 307.250286][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 307.353393][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.206672][T11937] device pim6reg1 entered promiscuous mode [ 310.780182][T11957] device veth0_vlan left promiscuous mode [ 311.131703][T11957] device veth0_vlan entered promiscuous mode [ 311.345894][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 311.357284][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 311.364651][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.689139][T12034] device syzkaller0 entered promiscuous mode [ 315.693454][T12109] syz.1.3232[12109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.693540][T12109] syz.1.3232[12109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 316.859395][T12163] device pim6reg1 entered promiscuous mode [ 316.913032][T12166] device sit0 entered promiscuous mode [ 317.468311][T12185] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.813262][T12195] device pim6reg1 entered promiscuous mode [ 318.883279][T12224] device pim6reg1 entered promiscuous mode [ 319.692676][T12258] device syzkaller0 entered promiscuous mode [ 320.730658][T12314] device pim6reg1 entered promiscuous mode [ 320.977101][T12321] device syzkaller0 entered promiscuous mode [ 321.666480][T12345] device syzkaller0 entered promiscuous mode [ 322.307073][T12383] syz.1.3311[12383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.307126][T12383] syz.1.3311[12383] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.089214][T12418] device syzkaller0 entered promiscuous mode [ 326.169212][T12467] device pim6reg1 entered promiscuous mode [ 326.287836][T12482] device pim6reg1 entered promiscuous mode [ 326.337424][T12487] device sit0 entered promiscuous mode [ 326.419189][T12496] tap0: tun_chr_ioctl cmd 1074025692 [ 327.908042][T12553] device syzkaller0 entered promiscuous mode [ 328.591493][T12592] device syzkaller0 entered promiscuous mode [ 329.850790][T12651] device syzkaller0 entered promiscuous mode [ 332.347204][T12712] device pim6reg1 entered promiscuous mode [ 332.460894][T12719] device syzkaller0 entered promiscuous mode [ 332.476531][T12724] syz.0.3394[12724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.476590][T12724] syz.0.3394[12724] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.827217][T12751] syz.1.3404[12751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.867365][T12751] syz.1.3404[12751] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.868597][T12753] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.759397][T12782] syz.0.3413[12782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.759472][T12782] syz.0.3413[12782] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.992513][T12812] device pim6reg1 entered promiscuous mode [ 334.257018][T12840] device pim6reg1 entered promiscuous mode [ 334.694652][T12883] device veth1_macvtap left promiscuous mode [ 334.716936][T12883] device macsec0 left promiscuous mode [ 334.883255][T12883] device veth1_macvtap entered promiscuous mode [ 334.890160][T12883] device macsec0 entered promiscuous mode [ 335.047929][T12916] Â: renamed from pim6reg1 [ 335.780375][T12959] device syzkaller0 entered promiscuous mode [ 335.972992][T12969] device veth1_macvtap entered promiscuous mode [ 335.999809][T12969] device macsec0 entered promiscuous mode [ 336.150539][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 336.772197][T13027] tap0: tun_chr_ioctl cmd 1074025673 [ 336.796215][T13026] tap0: tun_chr_ioctl cmd 1074025677 [ 336.804977][T13026] tap0: linktype set to 512 [ 336.811069][T13027] tap0: tun_chr_ioctl cmd 1074025677 [ 336.818667][T13027] tap0: linktype set to 512 [ 338.344112][T13099] device sit0 entered promiscuous mode [ 338.565711][T13129] device veth1_macvtap left promiscuous mode [ 338.927671][T13137] -óÿÿI³: renamed from syzkaller0 [ 340.703638][T13211] device bond_slave_1 entered promiscuous mode [ 340.732303][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bond_slave_1: link becomes ready [ 340.772054][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 341.226665][T13219] device syzkaller0 entered promiscuous mode [ 341.868585][T13235] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.875579][T13235] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.960421][T13235] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.967328][T13235] bridge0: port 2(bridge_slave_1) entered listening state [ 341.974258][T13235] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.981127][T13235] bridge0: port 1(bridge_slave_0) entered listening state [ 341.990580][T13235] device bridge0 entered promiscuous mode [ 341.997388][T13233] device pim6reg1 entered promiscuous mode [ 342.563790][T13264] device veth1_macvtap left promiscuous mode [ 342.569720][T13264] device macsec0 entered promiscuous mode [ 344.296076][T13338] syz.4.3576[13338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 344.296135][T13338] syz.4.3576[13338] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.146174][T13345] device syzkaller0 entered promiscuous mode [ 347.384740][T13421] device syzkaller0 entered promiscuous mode [ 349.581911][T13537] device syzkaller0 entered promiscuous mode [ 351.870615][T13637] device syzkaller0 entered promiscuous mode [ 355.707175][T13699] device syzkaller0 entered promiscuous mode [ 357.096699][ C0] bridge0: port 1(bridge_slave_0) entered learning state [ 357.103629][ C0] bridge0: port 2(bridge_slave_1) entered learning state [ 357.385266][T13778] device syzkaller0 entered promiscuous mode [ 357.439443][T13775] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.446322][T13775] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.455383][T13775] device bridge_slave_0 entered promiscuous mode [ 357.462638][T13775] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.469738][T13775] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.477148][T13775] device bridge_slave_1 entered promiscuous mode [ 357.501482][T13776] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.508830][T13776] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.516092][T13776] device bridge_slave_0 entered promiscuous mode [ 357.533677][T13776] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.541037][T13776] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.548650][T13776] device bridge_slave_1 entered promiscuous mode [ 357.628026][T13775] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.634905][T13775] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.642045][T13775] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.648899][T13775] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.678181][T13776] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.685052][T13776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.692212][T13776] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.699059][T13776] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.718206][T13799] device veth0_to_bridge entered promiscuous mode [ 357.727959][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.736178][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.752172][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.759404][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.766382][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.784881][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.792879][ T389] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.799722][ T389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.818631][ T1024] device bridge_slave_1 left promiscuous mode [ 357.824615][ T1024] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.831973][ T1024] device bridge_slave_0 left promiscuous mode [ 357.838528][ T1024] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.846099][ T1024] device bridge_slave_1 left promiscuous mode [ 357.852249][ T1024] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.859549][ T1024] device bridge_slave_0 left promiscuous mode [ 357.865446][ T1024] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.873157][ T1024] device veth1_macvtap left promiscuous mode [ 358.059643][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.068028][ T389] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.074847][ T389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.096367][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.106471][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.114586][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.123707][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.139170][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.147093][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.154423][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.162882][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.171097][ T389] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.177968][ T389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.186554][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.194988][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.203394][ T389] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.210260][ T389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.217980][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.225926][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.249289][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 358.272653][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 358.428585][T13775] device veth0_vlan entered promiscuous mode [ 358.439980][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.621451][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.722789][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 358.828969][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 358.964708][T13776] device veth0_vlan entered promiscuous mode [ 359.066260][T13824] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.073172][T13824] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.110393][T13824] device bridge0 left promiscuous mode [ 359.117609][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.139822][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.167106][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 359.192397][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.205711][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 359.215265][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.282454][T13775] device veth1_macvtap entered promiscuous mode [ 359.444810][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.473081][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.558698][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 359.567132][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.575226][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 359.591099][T13840] device syzkaller0 entered promiscuous mode [ 359.600451][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 359.628951][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.670245][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.678406][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.704846][T13776] device veth1_macvtap entered promiscuous mode [ 359.748721][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 359.756396][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.764828][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.774798][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 359.783523][ T389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 359.837745][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 359.854963][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 360.964231][ T24] audit: type=1400 audit(1736620822.949:176): avc: denied { create } for pid=13913 comm="syz.6.3735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 361.356388][T13931] device syzkaller0 entered promiscuous mode [ 361.528219][T13943] device syzkaller0 entered promiscuous mode [ 361.594405][T13946] device veth0_vlan left promiscuous mode [ 361.715173][T13946] device veth0_vlan entered promiscuous mode [ 362.709333][T13981] device wg2 left promiscuous mode [ 362.834588][T14001] device wg2 entered promiscuous mode [ 364.372806][T14050] Â: renamed from pim6reg1 [ 364.530686][T14071] device pim6reg1 entered promiscuous mode [ 364.737594][T14078] syz.3.3779[14078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.737653][T14078] syz.3.3779[14078] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.083693][T14088] device syzkaller0 entered promiscuous mode [ 369.131124][T14212] device veth0_vlan left promiscuous mode [ 369.204335][T14212] device veth0_vlan entered promiscuous mode [ 369.764222][ T24] audit: type=1400 audit(1736620831.749:177): avc: denied { create } for pid=14248 comm="syz.5.3827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 370.161948][T14269] device pim6reg1 entered promiscuous mode [ 370.257574][T14287] device pim6reg1 entered promiscuous mode [ 370.929482][T14324] device sit0 left promiscuous mode [ 370.952173][T14325] device sit0 entered promiscuous mode [ 371.172402][T14333] device pim6reg1 entered promiscuous mode [ 371.365021][T14340] device syzkaller0 entered promiscuous mode [ 371.371491][T14346] device pim6reg1 entered promiscuous mode [ 371.381869][T14340] syz.1.3855[14340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 371.381921][T14340] syz.1.3855[14340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.172888][T14359] device syzkaller0 entered promiscuous mode [ 372.602660][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 372.610954][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.617830][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.861128][T14457] device sit0 left promiscuous mode [ 372.884235][T14457] device sit0 entered promiscuous mode [ 373.727292][T14471] syz.6.3891[14471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.727351][T14471] syz.6.3891[14471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.987204][T14466] device syzkaller0 entered promiscuous mode [ 375.823765][T14568] device pim6reg1 entered promiscuous mode [ 375.949321][T14568] device veth1_macvtap entered promiscuous mode [ 375.994073][T14568] device macsec0 entered promiscuous mode [ 376.011468][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 376.289431][T14599] device syzkaller0 entered promiscuous mode [ 376.883595][T14634] device pim6reg1 entered promiscuous mode [ 377.177657][T14655] device wg2 entered promiscuous mode [ 378.124998][T14705] device syzkaller0 entered promiscuous mode [ 379.865829][T14795] device veth0_vlan left promiscuous mode [ 379.979983][T14795] device veth0_vlan entered promiscuous mode [ 380.031755][T14807] syz.3.3984[14807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.031891][T14807] syz.3.3984[14807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.441528][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 380.857575][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 381.125703][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 381.741002][T14807] syz.3.3984[14807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.741149][T14807] syz.3.3984[14807] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.757691][T14819] device sit0 entered promiscuous mode [ 384.052669][T14910] device veth1_macvtap left promiscuous mode [ 384.420854][T14942] device syzkaller0 entered promiscuous mode [ 384.600445][T14953] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.607484][T14953] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.656124][T14953] device bridge_slave_1 left promiscuous mode [ 384.674124][T14953] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.697233][T14953] device bridge_slave_0 left promiscuous mode [ 384.726970][T14953] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.922316][T14964] device veth1_macvtap left promiscuous mode [ 385.115352][T14964] device veth1_macvtap entered promiscuous mode [ 385.125572][T14964] device macsec0 entered promiscuous mode [ 385.329139][T14998] device syzkaller0 entered promiscuous mode [ 385.784143][T15037] device veth1_macvtap left promiscuous mode [ 385.843331][T15037] device veth1_macvtap entered promiscuous mode [ 385.921937][T15037] device macsec0 entered promiscuous mode [ 387.564820][T15083] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:6596:9ff5:7b00 with DS=0x32 [ 388.314309][T15110] ªªªªªª: renamed from vlan0 [ 388.425728][T15113] device veth0_vlan left promiscuous mode [ 388.560142][T15113] device veth0_vlan entered promiscuous mode [ 389.063907][T15184] device veth0_vlan left promiscuous mode [ 389.092814][T15184] device veth0_vlan entered promiscuous mode [ 389.120048][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.128186][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.135700][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 390.822327][T15246] device syzkaller0 entered promiscuous mode [ 390.978098][T15256] ªªªªªª: renamed from vlan0 [ 392.067646][T15305] device veth1_macvtap left promiscuous mode [ 392.073553][T15305] device macsec0 entered promiscuous mode [ 392.564911][T15324] device pim6reg1 entered promiscuous mode [ 393.439696][T15360] device syzkaller0 entered promiscuous mode [ 394.397948][T15419] device pim6reg1 entered promiscuous mode [ 397.104685][T15550] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.019580][T15577] device syzkaller0 entered promiscuous mode [ 399.462988][T15597] device syzkaller0 entered promiscuous mode [ 403.164531][T15663] device veth1_macvtap left promiscuous mode [ 403.176515][T15663] device macsec0 left promiscuous mode [ 403.830544][T15688] syz.1.4224[15688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 403.830599][T15688] syz.1.4224[15688] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 405.574685][T15749] device syzkaller0 entered promiscuous mode [ 406.641803][T15816] device pim6reg1 entered promiscuous mode [ 407.397199][T15840] device sit0 entered promiscuous mode [ 407.983601][T15871] device sit0 left promiscuous mode [ 408.427766][T15886] device syzkaller0 entered promiscuous mode [ 412.769038][T15970] device syzkaller0 entered promiscuous mode [ 413.292991][T16005] syz.6.4318[16005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.293075][T16005] syz.6.4318[16005] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.600654][T16003] device macsec0 entered promiscuous mode [ 415.025719][T16056] device pim6reg1 entered promiscuous mode [ 415.110361][T16068] device syzkaller0 entered promiscuous mode [ 415.637262][T16076] device pim6reg1 entered promiscuous mode [ 415.717244][T16079] device sit0 left promiscuous mode [ 415.791447][T16083] device wg2 left promiscuous mode [ 415.814748][T16086] device wg2 entered promiscuous mode [ 415.869810][T16091] syz.1.4343[16091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.869863][T16091] syz.1.4343[16091] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.871701][T16092] syz.1.4343[16092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 415.908118][T16092] syz.1.4343[16092] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 416.789078][T16166] device syzkaller0 entered promiscuous mode [ 418.589160][T16250] tap0: tun_chr_ioctl cmd 1074025677 [ 418.639246][T16250] tap0: linktype set to 821 [ 419.115972][T16290] syz.4.4393[16290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.116017][T16290] syz.4.4393[16290] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 419.353692][T16298] device macsec0 left promiscuous mode [ 420.621918][T16343] device sit0 entered promiscuous mode [ 422.316564][T16385] device pim6reg1 entered promiscuous mode [ 423.115297][T16419] device vxcan1 entered promiscuous mode [ 424.573099][T16509] syz.1.4458[16509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.573181][T16509] syz.1.4458[16509] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 424.681808][T16507] device veth1_macvtap entered promiscuous mode [ 424.701824][T16507] device macsec0 entered promiscuous mode [ 424.788296][T16514] device pim6reg1 entered promiscuous mode [ 424.803262][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.322324][T16644] device pim6reg1 entered promiscuous mode [ 428.210687][T16678] syz.6.4503[16678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.210764][T16678] syz.6.4503[16678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.818358][T16714] device syzkaller0 entered promiscuous mode [ 428.910092][T16712] device syzkaller0 entered promiscuous mode [ 429.661086][T16734] device sit0 left promiscuous mode [ 429.859875][T16737] device sit0 entered promiscuous mode [ 429.883887][T16739] : renamed from ipvlan1 [ 430.149139][T16745] device pim6reg1 entered promiscuous mode [ 430.382105][T16755] device pim6reg1 entered promiscuous mode [ 430.497825][T16762] syz.1.4528[16762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.497878][T16762] syz.1.4528[16762] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 433.138867][T16835] device sit0 left promiscuous mode [ 434.119084][T16851] device pim6reg1 entered promiscuous mode [ 434.192404][T16853] device vxcan1 entered promiscuous mode [ 434.832113][T16867] : renamed from ipvlan1 [ 439.899675][T17046] device veth0_vlan left promiscuous mode [ 439.940552][T17046] device veth0_vlan entered promiscuous mode [ 440.416218][T17064] bridge0: port 3(macsec0) entered blocking state [ 440.424953][T17064] bridge0: port 3(macsec0) entered disabled state [ 440.447937][T17065] device pim6reg1 entered promiscuous mode [ 440.936736][T17121] device veth0_vlan left promiscuous mode [ 440.963301][T17121] device veth0_vlan entered promiscuous mode [ 441.013141][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.031384][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.051323][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.083690][T17133] device pim6reg1 entered promiscuous mode [ 441.416049][T17146] device veth0_vlan left promiscuous mode [ 441.525124][T17146] device veth0_vlan entered promiscuous mode [ 441.667088][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.675332][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 441.683228][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 441.775187][T17171] syz.6.4640[17171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.775243][T17171] syz.6.4640[17171] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.993359][ T24] audit: type=1400 audit(1736620903.979:178): avc: denied { read } for pid=17181 comm="syz.4.4643" name="cgroup.subtree_control" dev="cgroup2" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 445.840538][T17379] device syzkaller0 entered promiscuous mode [ 446.365382][T17403] device syzkaller0 entered promiscuous mode [ 449.974567][T17537] device  entered promiscuous mode [ 450.163401][ T7761] ip6_tunnel:  xmit: Local address not yet configured! [ 450.415562][T17555] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.430161][T17555] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.830017][T17562] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.836901][T17562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.844004][T17562] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.850813][T17562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.882234][T17562] device bridge0 entered promiscuous mode [ 451.095905][T17567] device syzkaller0 entered promiscuous mode [ 452.060496][T17617] syz.1.4756[17617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.060550][T17617] syz.1.4756[17617] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.107222][T17617] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 452.140813][T17617] syzkaller0: linktype set to 804 [ 453.489610][T17686] device syzkaller0 entered promiscuous mode [ 453.851438][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.851493][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.870242][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.882790][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.895241][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.907236][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.919347][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 453.934724][T17712] syz.6.4783[17712] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 454.537200][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 456.111326][T17801] device pim6reg1 entered promiscuous mode [ 456.754163][T17806] device pim6reg1 entered promiscuous mode [ 457.562510][T17845] device sit0 entered promiscuous mode [ 458.567667][T17873] device syzkaller0 entered promiscuous mode [ 458.954694][T17904] device veth0_vlan left promiscuous mode [ 459.087921][T17904] device veth0_vlan entered promiscuous mode [ 459.112232][T17914] ªªªªªª: renamed from vlan0 [ 459.446384][T17931] device veth1_macvtap entered promiscuous mode [ 459.547998][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 460.163277][T17964] device pim6reg1 entered promiscuous mode [ 461.842511][T18040] cgroup: fork rejected by pids controller in /syz6 [ 463.336789][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 465.726530][T18127] bridge0: port 1(bridge_slave_0) entered blocking state [ 465.897068][T18127] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.914030][T18127] device bridge_slave_0 entered promiscuous mode [ 466.670093][ T304] device bridge_slave_1 left promiscuous mode [ 466.676051][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.717277][ T304] device bridge_slave_0 left promiscuous mode [ 466.723233][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.807932][ T304] device veth1_macvtap left promiscuous mode [ 472.189958][T18127] bridge0: port 2(bridge_slave_1) entered blocking state [ 472.207236][T18127] bridge0: port 2(bridge_slave_1) entered disabled state [ 472.214350][T18127] device bridge_slave_1 entered promiscuous mode [ 473.091995][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 473.124427][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 473.230847][T18127] device veth0_vlan entered promiscuous mode [ 473.248105][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 473.286859][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.360937][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.368541][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 473.375921][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 473.384381][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 473.392829][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.399699][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.407661][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 473.416162][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.426968][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.433838][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.441972][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 473.450942][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 473.458776][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 473.493412][T18208] device pim6reg1 entered promiscuous mode [ 473.554103][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 473.562742][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 473.573059][T18127] device veth1_macvtap entered promiscuous mode [ 473.608069][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 473.639501][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 473.647992][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 473.656273][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 473.664652][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 477.528672][T18308] device sit0 entered promiscuous mode [ 477.834371][T18344] bpf_get_probe_write_proto: 18 callbacks suppressed [ 477.834377][T18344] syz.3.4953[18344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.841973][T18344] syz.3.4953[18344] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 477.852256][T18341] device pim6reg1 entered promiscuous mode [ 478.072943][T18363] device wg2 entered promiscuous mode [ 478.526781][T18379] bridge0: port 2(bridge_slave_1) entered blocking state [ 478.533686][T18379] bridge0: port 2(bridge_slave_1) entered listening state [ 478.680322][T18379] device bridge0 entered promiscuous mode [ 478.757817][T18387] device pim6reg1 entered promiscuous mode [ 479.077300][T18398] device syzkaller0 entered promiscuous mode [ 479.339312][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 482.269442][T18538] ÿÿÿÿÿÿ: renamed from vlan1 [ 484.486905][T18632] device wg2 left promiscuous mode [ 484.536234][T18633] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 484.648971][T18633] pim6reg0: linktype set to 0 [ 487.041170][T18708] device syzkaller0 entered promiscuous mode [ 488.702676][T18736] device sit0 left promiscuous mode [ 488.946225][T18740] syz.6.5063[18740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.946280][T18740] syz.6.5063[18740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 488.958167][T18741] syz.6.5063[18741] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 490.542414][T18757] device veth0_vlan left promiscuous mode [ 490.604807][T18757] device veth0_vlan entered promiscuous mode [ 490.652822][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.681242][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 490.805627][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 492.496504][T18805] device wg2 left promiscuous mode [ 492.632215][T18818] device wg2 entered promiscuous mode [ 492.731423][T18837] device sit0 left promiscuous mode [ 492.793219][T18837] device sit0 entered promiscuous mode [ 494.056651][ C1] bridge0: port 2(bridge_slave_1) entered learning state [ 494.346765][T18913] syz.5.5108[18913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.356543][T18913] syz.5.5108[18913] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.543317][T18951] syz.4.5118[18951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.777970][T18951] syz.4.5118[18951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.821904][T19042] syz.5.5138[19042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 497.844044][T19042] syz.5.5138[19042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.140656][T19071] device syzkaller0 entered promiscuous mode [ 498.809220][T19102] tap0: tun_chr_ioctl cmd 1074025694 [ 501.348766][T19175] device syzkaller0 entered promiscuous mode [ 501.761168][T19196] device sit0 entered promiscuous mode [ 503.226448][T19275] syz.5.5197[19275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.226496][T19275] syz.5.5197[19275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.527137][T19299] device wg2 left promiscuous mode [ 503.576095][T19299] device wg2 entered promiscuous mode [ 503.702506][T19312] device veth1_macvtap left promiscuous mode [ 503.731735][T19312] device macsec0 left promiscuous mode [ 503.763029][T19312] device veth1_macvtap entered promiscuous mode [ 503.859486][T19312] device macsec0 entered promiscuous mode [ 503.869737][T19322] syz.6.5212[19322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.869786][T19322] syz.6.5212[19322] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 505.307206][T19365] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 505.394948][T19365] device syzkaller0 entered promiscuous mode [ 506.494685][T19437] syz.4.5246[19437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.494734][T19437] syz.4.5246[19437] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 506.941287][T19450] device pim6reg1 entered promiscuous mode [ 507.190201][T19451] device veth1_macvtap left promiscuous mode [ 507.307511][T19453] device veth1_macvtap entered promiscuous mode [ 507.323913][T19453] device macsec0 entered promiscuous mode [ 507.360607][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 507.368492][T19457] device sit0 left promiscuous mode [ 507.477567][T19457] device sit0 entered promiscuous mode [ 509.416680][ C1] bridge0: port 2(bridge_slave_1) entered forwarding state [ 509.423879][ C1] bridge0: topology change detected, propagating [ 509.430408][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 509.437986][ T24] audit: type=1400 audit(1736620971.439:179): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 509.569857][T19510] device veth0_vlan left promiscuous mode [ 509.611664][T19510] device veth0_vlan entered promiscuous mode [ 509.798425][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 509.811896][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 509.900025][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.910086][T19515] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.917081][T19515] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.142279][T19596] device veth0_vlan left promiscuous mode [ 511.152786][T19596] device veth0_vlan entered promiscuous mode [ 511.240928][T19615] Â: renamed from pim6reg1 [ 511.337394][ C0] ip6_tunnel:  xmit: Local address not yet configured! [ 511.420240][ T24] audit: type=1400 audit(1736620973.409:180): avc: denied { setattr } for pid=19624 comm="syz.6.5300" path="/dev/ppp" dev="devtmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 512.072557][T19637] device syzkaller0 entered promiscuous mode [ 513.212104][T19721] device pim6reg1 entered promiscuous mode [ 514.423060][T19744] device wg2 left promiscuous mode [ 514.480459][T19744] device wg2 entered promiscuous mode [ 515.219052][T19787] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.225897][T19787] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.240475][T19787] device bridge_slave_0 entered promiscuous mode [ 515.248621][T19787] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.255517][T19787] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.263073][T19787] device bridge_slave_1 entered promiscuous mode [ 515.381811][T19787] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.388688][T19787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.395777][T19787] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.402679][T19787] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.568427][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 515.576191][ T304] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.584357][ T304] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.601386][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 515.610620][ T304] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.617487][ T304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.625515][T19813] syz.4.5355[19813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.625573][T19813] syz.4.5355[19813] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.667877][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 515.687299][ T304] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.694131][ T304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.726065][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 515.777473][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 515.785502][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 515.799470][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 515.808449][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 515.816933][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 515.825494][T19787] device veth0_vlan entered promiscuous mode [ 515.855556][T19787] device veth1_macvtap entered promiscuous mode [ 515.878303][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 515.904705][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 515.916150][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 515.928216][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 515.936352][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 515.947221][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 515.958248][T13851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 516.104951][T19849] device pimreg0 entered promiscuous mode [ 518.867372][T19935] device pimreg0 entered promiscuous mode [ 519.237675][T19968] syz.4.5394[19968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.237759][T19968] syz.4.5394[19968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.597288][T19992] syz.3.5402[19992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.614041][T19992] syz.3.5402[19992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.713025][T19994] device veth0_vlan left promiscuous mode [ 519.766194][T19994] device veth0_vlan entered promiscuous mode [ 519.877944][T20001] syz.6.5405[20001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.880190][T20001] syz.6.5405[20001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 521.861063][T20090] device veth0_vlan left promiscuous mode [ 522.171627][T20090] device veth0_vlan entered promiscuous mode [ 522.323887][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 522.341196][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 522.374223][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 522.634988][T20110] device veth0_vlan left promiscuous mode [ 522.672520][T20110] device veth0_vlan entered promiscuous mode [ 522.846211][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 522.875846][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 522.914832][ T1024] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 523.096690][T20114] device sit0 left promiscuous mode [ 523.146814][T20110] device sit0 entered promiscuous mode [ 523.823188][T20134] device veth1_macvtap left promiscuous mode [ 523.878766][T20134] device veth1_macvtap entered promiscuous mode [ 523.886496][T20134] device veth1_macvtap left promiscuous mode [ 523.997747][T20159] device pim6reg1 entered promiscuous mode [ 524.018667][T20159] device syzkaller0 entered promiscuous mode [ 524.713751][T20192] tap0: tun_chr_ioctl cmd 1074025677 [ 524.747914][T20192] tap0: linktype set to 1 [ 525.217941][T20222] device sit0 left promiscuous mode [ 525.448296][T20245] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.455361][T20245] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.733560][T20245] device bridge_slave_1 left promiscuous mode [ 525.739747][T20245] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.749108][T20245] device bridge_slave_0 left promiscuous mode [ 525.755161][T20245] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.766943][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 [ 525.775292][ T1] CPU: 0 PID: 1 Comm: init Tainted: G W 5.10.232-syzkaller-00746-g49e8ba0a684f #0 [ 525.785588][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 525.795477][ T1] Call Trace: [ 525.798614][ T1] dump_stack_lvl+0x1e2/0x24b [ 525.803121][ T1] ? panic+0x22b/0x812 [ 525.807025][ T1] ? bfq_pos_tree_add_move+0x43b/0x43b [ 525.812341][ T1] dump_stack+0x15/0x17 [ 525.816312][ T1] panic+0x2cf/0x812 [ 525.820055][ T1] ? do_exit+0x239a/0x2a50 [ 525.824306][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 525.829335][ T1] ? __kasan_check_write+0x14/0x20 [ 525.834279][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 525.838708][ T1] do_exit+0x23b4/0x2a50 [ 525.842788][ T1] ? sched_group_set_shares+0x490/0x490 [ 525.848257][ T1] ? put_task_struct+0x80/0x80 [ 525.852856][ T1] ? schedule+0x154/0x1d0 [ 525.857022][ T1] ? schedule_timeout+0xa9/0x360 [ 525.861798][ T1] ? __kasan_check_write+0x14/0x20 [ 525.866741][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 525.871690][ T1] do_group_exit+0x141/0x310 [ 525.876118][ T1] get_signal+0x10a0/0x1410 [ 525.880481][ T1] arch_do_signal_or_restart+0xbd/0x17c0 [ 525.886051][ T1] ? put_pid+0xd7/0x110 [ 525.890031][ T1] ? kernel_clone+0x6ca/0x9e0 [ 525.894539][ T1] ? ktime_get+0x10e/0x140 [ 525.898796][ T1] ? create_io_thread+0x1e0/0x1e0 [ 525.903657][ T1] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 525.908967][ T1] ? __do_sys_vfork+0xcd/0x130 [ 525.913561][ T1] ? debug_smp_processor_id+0x17/0x20 [ 525.918763][ T1] exit_to_user_mode_loop+0x9b/0xd0 [ 525.923794][ T1] syscall_exit_to_user_mode+0xa2/0x1a0 [ 525.929172][ T1] do_syscall_64+0x40/0x70 [ 525.933423][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 525.939151][ T1] RIP: 0033:0x7fba88946a68 [ 525.943667][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 525.963110][ T1] RSP: 002b:00007ffca7166ba0 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 525.971361][ T1] RAX: 0000000000004f1a RBX: 000055adbeb80ab0 RCX: 00007fba88946a68 [ 525.979162][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007fba88ad1bed [ 525.986973][ T1] RBP: 00007fba88b0c528 R08: 0000000000000007 R09: a4f28c6ed7a3f26a [ 525.994797][ T1] R10: 00007ffca7166be0 R11: 0000000000000246 R12: 0000000000000000 [ 526.002605][ T1] R13: 0000000000000018 R14: 000055ad99cea169 R15: 00007fba88b3da80 [ 526.010719][ T1] Kernel Offset: disabled [ 526.014867][ T1] Rebooting in 86400 seconds..