last executing test programs: 45.244392673s ago: executing program 1 (id=34): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYRES8=r1], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) close(r3) write$cgroup_type(r4, &(0x7f0000000280), 0x9) close(r1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7ff00000000bfa200100000000007020000f8ffffffb703000008000000b70400000000fdff84000000030000009500"/72], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000800)=""/4096, 0x1000, 0x0, &(0x7f0000001800)=""/206, 0xce}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7, 0x0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0}, 0x94) 43.452868758s ago: executing program 1 (id=34): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYRES8=r1], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) close(r3) write$cgroup_type(r4, &(0x7f0000000280), 0x9) close(r1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7ff00000000bfa200100000000007020000f8ffffffb703000008000000b70400000000fdff84000000030000009500"/72], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000800)=""/4096, 0x1000, 0x0, &(0x7f0000001800)=""/206, 0xce}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7, 0x0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0}, 0x94) 41.348407071s ago: executing program 1 (id=34): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYRES8=r1], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) close(r3) write$cgroup_type(r4, &(0x7f0000000280), 0x9) close(r1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7ff00000000bfa200100000000007020000f8ffffffb703000008000000b70400000000fdff84000000030000009500"/72], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000800)=""/4096, 0x1000, 0x0, &(0x7f0000001800)=""/206, 0xce}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7, 0x0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0}, 0x94) 36.176678946s ago: executing program 1 (id=34): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYRES8=r1], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) close(r3) write$cgroup_type(r4, &(0x7f0000000280), 0x9) close(r1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7ff00000000bfa200100000000007020000f8ffffffb703000008000000b70400000000fdff84000000030000009500"/72], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000800)=""/4096, 0x1000, 0x0, &(0x7f0000001800)=""/206, 0xce}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7, 0x0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0}, 0x94) 32.778364779s ago: executing program 1 (id=34): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYRES8=r1], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) close(r3) write$cgroup_type(r4, &(0x7f0000000280), 0x9) close(r1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7ff00000000bfa200100000000007020000f8ffffffb703000008000000b70400000000fdff84000000030000009500"/72], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000800)=""/4096, 0x1000, 0x0, &(0x7f0000001800)=""/206, 0xce}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7, 0x0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0}, 0x94) 30.927563598s ago: executing program 4 (id=203): bpf$PROG_LOAD(0x5, 0xfffffffffffffffd, 0xa1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000180)=r1, 0x4) sendmsg$inet(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x6, 0x10, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r4, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0xdc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/12], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYRES32], 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0xfff, 0x7}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r8}, &(0x7f00000002c0), &(0x7f0000000300)=r9}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1c, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 30.872525124s ago: executing program 4 (id=204): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000c40)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4000000}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x18) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000640)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYRESDEC=r1, @ANYRES32=r4], 0x0, 0xfffffffc, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @netfilter, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x2, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r6}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/mnt\x00') ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000006c0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0\xd8S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v@\xe4\xfb;`\x8e\xdf\x8d\xf5\xf1\xe4\x10\x1f\x18\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0}) close(r11) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x50) 30.819458548s ago: executing program 2 (id=205): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%-010d \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0, 0x0], 0x0, 0xae, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000200), &(0x7f0000000340), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r0, @ANYBLOB="c6000000000300000000ffff00", @ANYRES32=r1, @ANYRES32, @ANYBLOB="03000000010000000300"/28], 0x50) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0e00000004000000040000000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00400000004000000000000000000000000000000000000000000000d989485086c24c1168ea20882192aa8fa195c1f27bfb5671b1863d4a4d497cc352949e7bf25fdfd1f8a0544ac7e49361394869d47a06c6c69acb91d08d1a031b0641c93cd04e8aef5ad5fea1cc66758bf5a21cb0c5380bac61cbd96d889922c7d20aa15c4f1eff51a50b4f0a79a2"], 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x1c, &(0x7f0000001180)=ANY=[@ANYBLOB="1808000000000000000000000600000018110000ce1ad673b1fce298956688bbd57a9cfed1cd75904341bc6cbdc6bd50e9b28d653900b8d5d031e04f9908dec712ba019309d8ace6a6f9e5c26d53b06e61f522d7b6acb6844e77f3124d597850fbcaa1ae72e824afde626e9875d333e0dd34168db564b5f971e57744fad8bbc9214db8edd58a54c02102db1bf8a80133b4", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000035090100000000009500000000070000b7020000000000007b9a00fe00000000660900000f000000dbaaf0fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffff670000000800000018290000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000005e9200000000000056080000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0xd, 0x0, 0xf00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5}, 0x94) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000, 0x9, 0x0, 0xffffffff, 0x0, 0xfffffffffffffff1}, 0x0, 0x20000000000, 0xffffffffffffffff, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b80)=ANY=[@ANYRES32=r4, @ANYBLOB, @ANYRES32], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYRESHEX=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x2c}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r9, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 30.660669573s ago: executing program 0 (id=208): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0500000000f01f00810000007f000000010000"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r4, 0x0, 0x0}, 0x20) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000000)=ANY=[@ANYRES8=r5, @ANYRES16=r5, @ANYRES32], 0xffdd) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000014000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r6}, &(0x7f0000000000), &(0x7f0000000140)='%-5lx \x00'}, 0x20) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x10) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37ce}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) (async) close(r5) 27.652779509s ago: executing program 2 (id=209): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x7, 0x19, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xc8, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) (async) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r9}, 0x10) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r7, 0x5}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x4040086) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd"], 0xfdef) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r11}, 0x10) (async) write$cgroup_subtree(r10, &(0x7f0000000000), 0xfdef) (async) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r14}, 0x10) (async) write$cgroup_subtree(r12, &(0x7f0000000580)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce81ea038800fe08000e40000200875a65969ff57b00ff020000000000000000000000000001e2607e15e697ab"], 0xfdef) 27.31715021s ago: executing program 3 (id=210): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="61154c00000000006113540000000000bfa00000000000001503000008004e002d35010000000000950041000000000069163a0000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf670000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ff3d4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2739670b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc401000000cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be19637302f3b41eae50509fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524a3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18402cde8b0100010000000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d545ffffffff00000000a1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf857689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684ee54c0a263c806aabac2f66cb052f847c62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961ef4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fc0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bb000000000000000000000000000000884efcecca45ea4ab2ec097668456a6ff12854997f5aed737d5205ace5c0b64f87ef10784d0479cb44ca077e0c4ce6ff880e2ce3de63853a9740e9233683bfc8636bee293aeeb680b399a296e6f44c07b5fc5d9d359af007f23004a7acb6df23664ea209620b4fe0f4df81c33bd8ca2335cb4b50881937379b45a301175c3e8eb32970564ec8e25c46ee3bae079faedaad94276cfa251be8256c4c37fc84a25c3a2feb39e94a5266a10716d4a3cef499fa176018054e9149a1c9d20a809ce3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffff0000}, 0xffffffffffffffd2}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000002bc0)=ANY=[@ANYRESDEC=r0, @ANYRES8=r0, @ANYBLOB="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", @ANYRES8=r0, @ANYRESOCT=r0, @ANYRES16=r1], 0x0, 0x2000}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x2, 0x0}, 0x10) socketpair(0x1d, 0x3, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)=@o_path={0x0, 0x0, 0x4010, r9}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x0, 0x2c}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) 27.305608281s ago: executing program 2 (id=211): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0x7, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0x7, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x1, {0x4e20, 0xf5}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r5}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000300), 0x75, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000070000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r6, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0], 0x0, 0xd0, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000600), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000ac0)={0x80000000, 0x0}, 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r5, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000b40)=r4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r12, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r12, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f00000004c0)=ANY=[], 0xfdef) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ec0)=@bpf_lsm={0x1d, 0x39, &(0x7f0000000c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x48000000}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa0000}}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3d7d3399}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x4d, '\x00', r9, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x8, 0x9, 0x5}, 0x10, r10, 0x0, 0x5, &(0x7f0000000e00)=[r5, r5, r11, r13], &(0x7f0000000e40)=[{0x1, 0x1, 0x1, 0x3}, {0x4, 0x5, 0x3, 0xb}, {0x5, 0x3, 0xa, 0xa}, {0x2, 0x2, 0xd, 0x7}, {0x0, 0x5, 0x6, 0x7}], 0x10, 0x1}, 0x94) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000ec0)=@bpf_lsm={0x1d, 0x39, &(0x7f0000000c00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x48000000}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffff}}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xa0000}}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3d7d3399}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000340)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x4d, '\x00', r9, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x8, 0x9, 0x5}, 0x10, r10, 0x0, 0x5, &(0x7f0000000e00)=[r5, r5, r11, r13], &(0x7f0000000e40)=[{0x1, 0x1, 0x1, 0x3}, {0x4, 0x5, 0x3, 0xb}, {0x5, 0x3, 0xa, 0xa}, {0x2, 0x2, 0xd, 0x7}, {0x0, 0x5, 0x6, 0x7}], 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x100, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x100, 0x0) 27.187022772s ago: executing program 2 (id=212): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000600)=@bpf_ext={0x1c, 0x7, &(0x7f0000000780)=ANY=[@ANYBLOB="1800181100009f1ad4e13b60594d10014e19cf2169eed06560f2d79401bba1a76cc4fde1a5bde2201bb71c3665ad13f761d548b32d3aa672d8bec57c0b5b5566749fe47c5d6608a2bfc831e7428e382b027320811fe38e7a1b78d900609fda195be0a055bdab944751ad111cd44bf2e99a7d0978e8124bdb0bcd9405e3e7a8a25bf645aba7c2a3931356b0eadb3b", @ANYRES32, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x3, 0xa4, &(0x7f0000000380)=""/164, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xb, 0xa, 0xab64}, 0x10, 0x16fb7, 0xffffffffffffffff, 0x1, &(0x7f0000000580)=[r0, r0, r0], &(0x7f00000005c0)=[{0x3, 0x5, 0xa, 0xb}], 0x10, 0x4}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000900)={@ifindex=r7, r6, 0x2a, 0x8, 0x0, @void, @value=r8}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x10802, 0x0) ioctl$TUNGETVNETBE(r10, 0x800454df, &(0x7f0000000840)) 27.061313304s ago: executing program 0 (id=213): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x101400, 0xc8, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x30202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fffffffffffffff, 0xff}, 0x102210, 0xc8, 0xffff, 0x2, 0xf9, 0x0, 0x7, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x1fffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x7, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x1a}, 0x11014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, r2, 0xc) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000580)='qgroup_update_reserve\x00', r4}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r9 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0xae}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 27.050145565s ago: executing program 0 (id=214): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00@\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x180a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) sendmsg$inet(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000340)="e05338879bcb3e183e09c2e1c7a1cbbaddf513dc4a7fa64422d38d24f77f5853481241d3969a392d3bb8f5356223b5312ffe6eae55732ed85868e2402c0765f68ea1beb881a42f7bb6f63f285f6ab6d194481bf78ab7b8f7cd095a2eadc9198fbc8e1c1177ac958602d9d377bca3e854a52f8d4fdc0c508ae4aab6d588973da03d5d0715a84b18c6231caee6e08a17de3386010b4dcac3f3b45fff9968c0bc9eb58d6fe37ab641a8c0699f3133707705f6cac2518b62a4628b27", 0xba}], 0x1}, 0x810) (async) sendmsg$inet(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000340)="e05338879bcb3e183e09c2e1c7a1cbbaddf513dc4a7fa64422d38d24f77f5853481241d3969a392d3bb8f5356223b5312ffe6eae55732ed85868e2402c0765f68ea1beb881a42f7bb6f63f285f6ab6d194481bf78ab7b8f7cd095a2eadc9198fbc8e1c1177ac958602d9d377bca3e854a52f8d4fdc0c508ae4aab6d588973da03d5d0715a84b18c6231caee6e08a17de3386010b4dcac3f3b45fff9968c0bc9eb58d6fe37ab641a8c0699f3133707705f6cac2518b62a4628b27", 0xba}], 0x1}, 0x810) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x80200, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000580)={'veth0_vlan\x00', @random="0106002010ff"}) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) (async) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) 26.986244191s ago: executing program 2 (id=215): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x11, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7}, [@call={0x85, 0x0, 0x0, 0x7b}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) close(r1) bpf$TOKEN_CREATE(0x24, &(0x7f0000000140), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x41000}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0f000000040000000400000012", @ANYRES32=0x0, @ANYBLOB], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r7, 0x5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000002c0)=ANY=[@ANYRES32=r9, @ANYRES32=r8, @ANYBLOB='&'], 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x63, 0x2, 0x0, 0x0, 0x0, 0x0, 0x35a05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x500, 0x2}, 0x1075, 0x6, 0x0, 0x0, 0xffffffffffffbbfe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1c0000000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) 26.985816751s ago: executing program 4 (id=216): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f0000000040)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1a, 0xb, &(0x7f00000001c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x5c6fa8aec5e2d98b, 0x80, 0x0, 0x4, 0x6, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x15368, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=r3, @ANYRES32, @ANYBLOB], 0x50) socketpair(0x1, 0x1, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) close(r4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x7a05, 0x1700) (async) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) write$cgroup_subtree(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x90) (async) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a2, &(0x7f0000000080)) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000007100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000bc0)={r6, 0x0, 0x12, 0x0, &(0x7f0000000080)="0a188e9928e301df42ef860188a889e271f0", 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000700), &(0x7f0000000280), 0x8, 0x496, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) 26.854831273s ago: executing program 3 (id=217): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x4ac202, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f00000006c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x113000, 0xc8, 0xfffffffb, 0x0, 0x57a, 0x0, 0x200}, 0x0, 0x2, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41040, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x40}, 0x0, 0xc8, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffcfe6}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xdba24f1ae7f3ded2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x2}, 0x0, 0x0, 0x400000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='qgroup_num_dirty_extents\x00', r5, 0x0, 0xe72}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1300000010000000020000000000004000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1e000000010005e3966def15d4a0afdc7dc03300", @ANYRES32, @ANYRES8, @ANYRESOCT=0x0, @ANYRES16=r4, @ANYRESDEC=r6], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0xc, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x3, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) 26.850865723s ago: executing program 0 (id=218): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_serviced\x00', 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000040), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)=""/150, 0x96}, {&(0x7f0000000340)=""/207, 0xcf}, {&(0x7f0000000480)=""/126, 0x7e}], 0x3, &(0x7f0000000680)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x158}, 0x100) 26.742731333s ago: executing program 4 (id=219): r0 = syz_clone(0x8002000, &(0x7f0000000080)="a57ea446691edd5382620990a1be62d92bc2093eaad8b52a14aedf775137bdc8fdef453f63de719c12641a077cf0f7", 0x2f, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="ed9247d8c022dd214b6c12c4eb09d7447d953288711d556222e72525240c5d1eb3f0b8c3b9bd2e8c0ba0af782b1cdfe066788d62ce9390bae775d563a4bb98232fd721cfd3ad94796c5d5704eb6597") perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x7, 0x4, 0xf0, 0x40, 0x0, 0x3, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x0, @perf_config_ext={0x7fffffff, 0x3ff}, 0x80, 0xfffffffffffff8fc, 0x6, 0x8, 0x2, 0x4, 0x6, 0x0, 0x1, 0x0, 0x2}, r0, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@cgroup=0xffffffffffffffff, 0x7, 0x1, 0x0, &(0x7f00000001c0)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0xa58, 0x2}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x9c, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={@map=r3, 0xffffffffffffffff, 0x31, 0x20, 0x0, @void, @void, @void, @value=r4, r2}, 0x20) r7 = openat$cgroup_ro(r1, &(0x7f0000000700)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) openat$cgroup_subtree(r7, &(0x7f0000000740), 0x2, 0x0) recvmsg$unix(r7, &(0x7f0000002d00)={&(0x7f0000000780), 0x6e, &(0x7f0000002c00)=[{&(0x7f0000000800)=""/245, 0xf5}, {&(0x7f0000000900)=""/166, 0xa6}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/221, 0xdd}, {&(0x7f0000001ac0)=""/157, 0x9d}, {&(0x7f0000001b80)=""/22, 0x16}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000002bc0)=""/26, 0x1a}], 0x8, &(0x7f0000002c80)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x58}, 0x40012002) r20 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002f00)={0x6, 0x10, &(0x7f0000002d40)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000002dc0)='syzkaller\x00', 0x35ef1736, 0x11, &(0x7f0000002e00)=""/17, 0x41100, 0x60, '\x00', r5, 0x25, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002e40)={0x4, 0x9, 0x3fc0, 0x5}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000002e80)=[r16, r9, 0xffffffffffffffff, r8, r10, r12, r11, r16], &(0x7f0000002ec0)=[{0x1, 0x1, 0x4, 0x7}, {0x1, 0x3, 0xf, 0xd}, {0x3, 0x3, 0x10, 0x3}, {0x5, 0x3, 0xb, 0x6}], 0x10, 0x374c}, 0x94) r21 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000003040)=@o_path={&(0x7f0000003000)='./file0\x00', 0x0, 0x8, r10}, 0x18) r22 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003440)=@bpf_tracing={0x1a, 0x28, &(0x7f0000003080)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r13}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x7f}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa}}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @generic={0xe7, 0x5, 0x5, 0x8, 0x4}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb20}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000031c0)='GPL\x00', 0x7, 0xca, &(0x7f0000003200)=""/202, 0x41100, 0x2, '\x00', r5, 0x19, r10, 0x8, &(0x7f0000003300)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000003340)={0x1, 0x2, 0x800, 0x708c}, 0x10, 0x56b2, 0xffffffffffffffff, 0x6, &(0x7f0000003380)=[r11, r7, r11, r15, 0x1, r15, r16, r15, r12, r12], &(0x7f00000033c0)=[{0x4, 0x1, 0xd, 0xebcb83c68c6d5d0f}, {0x3, 0x5, 0xb, 0x5}, {0x3, 0x2, 0x1, 0x1}, {0x2, 0x2, 0x5, 0x2}, {0x1, 0x3, 0xf, 0x7}, {0x1, 0x5, 0x9, 0x2}], 0x10, 0x2e5}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002fc0)={@map=r21, r11, 0x38, 0x1d, r20, @void, @value=r22, @void, @void, r2}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003500)) r23 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000003580)=@generic={&(0x7f0000003540)='./file0\x00', 0x0, 0x8}, 0x18) r24 = bpf$ITER_CREATE(0x21, &(0x7f00000035c0), 0x8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000003680)={{r24}, &(0x7f0000003600), &(0x7f0000003640)='%pS \x00'}, 0x20) r25 = openat$cgroup_int(r24, &(0x7f00000036c0)='cgroup.clone_children\x00', 0x2, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000003700)=r13, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000003740)={0x1, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000003780)={r26, 0x2}, 0xc) write$cgroup_pid(r11, &(0x7f00000037c0)=r0, 0x12) r27 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003b80)={&(0x7f0000003a00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x4, [@int={0xf, 0x0, 0x0, 0x1, 0x0, 0xf, 0x0, 0x37, 0x3}, @type_tag={0xa, 0x0, 0x0, 0x12, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x1}}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x25, 0x2}, @decl_tag={0xa, 0x0, 0x0, 0x11, 0x1, 0x5}, @func={0x10, 0x0, 0x0, 0xc, 0x4}, @ptr={0x2, 0x0, 0x0, 0x2, 0x4}, @const={0x7, 0x0, 0x0, 0xa, 0x3}, @const={0xd, 0x0, 0x0, 0xa, 0x4}, @decl_tag={0x7, 0x0, 0x0, 0x11, 0x1, 0x6}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000003ac0)=""/130, 0xb0, 0x82, 0x0, 0x7}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000003cc0)={0x7, 0x20, &(0x7f0000003800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r24}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x4, 0x5, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x1b}, @tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000003900)='GPL\x00', 0xad1c, 0xba, &(0x7f0000003940)=""/186, 0x40f00, 0x24, '\x00', r5, @fallback=0xf, r27, 0x8, &(0x7f0000003bc0)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000003c00)={0x5, 0x2, 0x9c6, 0x4}, 0x10, r6, 0xffffffffffffffff, 0x1, &(0x7f0000003c40)=[r23], &(0x7f0000003c80)=[{0x5, 0x4, 0x4, 0x4}], 0x10, 0x4}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003d80)={0xffffffffffffffff, 0xffffffffffffffff}) r29 = gettid() sendmsg$unix(r28, &(0x7f0000004140)={&(0x7f0000003dc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004080)=[{&(0x7f0000003e40)="528b652261cd1a11046c448342408b26a6d1fd3eccf5b1b6576006d6736774e89659902c8e0cf4a5af68ae985fbb03cdceea94787be4b576a31c2d983c057845351b0a0f5d0f1935885cd7a60e25e716af8c8a63794ca44e158a86a39b047f103ba01c4160519d47d510ff73e423336db07a01dd4f44ee0c85e236a87b4425ccee8142a9ba75ab1140d97a892a", 0x8d}, {&(0x7f0000003f00)="be4e0e3e59e82c6fbc5c429772f2d29309d64b783d121961488122b6c2dfafc75b13db5b1d60155ae5936c3ec0f9b896f0d39f9efe77d7ac3ff9bb8a39d16e6527ad48937e4c3b64d96b217c67c24ccea693f9ae93b534279e4f18889860843d4ebed044084c73138541c6393945765fd9", 0x71}, {&(0x7f0000003f80)="6d924b2cb2d6d725ca23fd8795668cd9a92e48a167763e6fa7d25a14d884f2b9ebd552cef0bb28351b249fff19bb396cfb8bcc06cd2d6c96c408e61ac740eab2ef2937993f31932ca009cad17a4e31e10c941a72410047c5b28b8ca35627008988e9d3abd60ede1ea455afb1874fa364f86a01f2025ab33a865f51dda8fb72bdd2b0439944bf7a46804cad5be3ef2bae54f4f6daf985d2bf7f644bfb3c697970b802267a4d0b2f4950f51d44e57fc27a1e359448fa88eca89d8fa437ee0dddcbee229c9add4126ee20921348b42b7c67a61dd6442f330c87b2", 0xd9}], 0x3, &(0x7f00000040c0)=[@cred={{0x1c, 0x1, 0x2, {r29, 0x0, r19}}}, @rights={{0x14, 0x1, 0x1, [r25]}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, 0xee00}}}], 0x78, 0x24000800}, 0x20000000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000004180)={0xffffffffffffffff}) sendmsg$tipc(r30, &(0x7f0000004580)={&(0x7f00000041c0)=@id={0x1e, 0x3, 0x2, {0x4e23, 0x3}}, 0x10, &(0x7f0000004500)=[{&(0x7f0000004200)="efeb2d10dd2e227c13e9a132465e02caf6d536dc522e171da9bc37a11b8e5c94cb13a250bfc3ba5056d487eb66e7aafde9f394443ba512d963529c10e83140e02b2ead36c2de53f88f3fcb74f6e2ceec3c5be98e31e7c71e83226f4500df892daab9380e4a049eea1c895f6aebd59c5b95a91abafa2de297fdfb8855cd0a838ece36ed82b0542f95fd5393aef0b8ed78ed9727bf19fc15c65b234661c0b02c82eaba1ac1f8c90d951df62b5c60528ab7660d", 0xb2}, {&(0x7f00000042c0)="0891e63312007625185701438377bd3ef4dedec847b61bdda3f461b2ef6317d92266184a9ef8c015ca0d31a8cf0c1dd8e06b7f7e95df6c7109d222885056dc9108284ae3f2531ffc818ca88866b98dcdae7fc40c3582301daea65024acbede537773e1f7596aede0a242f1f6a4292bd32d289cef683b9ced17cac60e3ccca5773a10c5809f247c08abcc2abf6411c9d983a09ac50cef2cb420204ebef71ccfd35cbb941e7d605d883f96fa68a40107657616fb2a0ad58ce3469c5e76124d8c0b3e17dafe151db40b117418b2c7cc5e8351", 0xd1}, {&(0x7f00000043c0)="2e34f33b995a561fa4e371f0167730a07791df8d0955a96304f262473ec4adfcd0b5c0c34012523dabc9ba8577c41a8dc695335229ef853e6bd357e619ed04d6285bcdabf51649e67ac1b867922bf83931c10f2f94a6b31bdfbe327acaa66393886221573128eda23b7f33c2f7bff204", 0x70}, {&(0x7f0000004440)}, {&(0x7f0000004480)="258855cf8f7dbc13052f35786c5d428ba323bbd8a69e7e0a30b71f2b0b5c3e76e3c4124f46053a2de539aea46380c31930f1806297555264f8c9d04ea218e89f919401f929f7b33fe5744aecf4826190ceebe230cd4643dc9b9696d8c02909d20f3aeb07f9fef5d8ce7ec0b0a6bc8a098ccf9f8054367c93bfb762acf11a", 0x7e}], 0x5, 0x0, 0x0, 0x20008884}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f00000045c0)=@bloom_filter={0x1e, 0xd, 0x6, 0xb4d, 0x78302, r14, 0xfffffff8, '\x00', r5, r14, 0x5, 0x1, 0x1, 0x3, @value=r16, @void, @value=r12}, 0x50) 26.741020713s ago: executing program 4 (id=220): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x18, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000200000000000000000850000009e000000c300000d0000000095"], &(0x7f0000000100)='GPL\x00'}, 0x2d) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) r2 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x2, 0x0) write$cgroup_type(r2, &(0x7f0000000340), 0x9) bpf$ITER_CREATE(0x21, &(0x7f0000000380), 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8, 0x40}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x1de, 0x0, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda43", 0x0, 0x2f, 0xe8034000, 0x0, 0x90, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0x2000000000000329, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa10000000000000701"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9, 0x0, 0x0, 0xfffffffffff7bbfe, 0x0, 0x0, 0x0, 0x5ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 26.67369048s ago: executing program 3 (id=221): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000033c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x50) close(0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYRES64=r1, @ANYRES32=r0, @ANYRES32=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000680)='sys_exit\x00', r2}, 0x10) 26.632012903s ago: executing program 0 (id=222): perf_event_open(0x0, 0xffffffffffffffff, 0xffffffff7ffbffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) socketpair(0x6, 0x1, 0x1, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x2, 0x2, 0x1, &(0x7f0000002c40)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x8}, 0x8100, 0xc8, 0xffffffff, 0x0, 0x0, 0x341, 0x0, 0x0, 0x0, 0x0, 0xb6e}, 0x0, 0x0, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13, @ANYRES32, @ANYBLOB="00001800001031000000000000000000010000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x94) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x8, 0x80, 0x0, 0x10000000008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) (async) recvmsg$unix(r5, 0x0, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (rerun: 64) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) 26.630011273s ago: executing program 3 (id=223): bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000000)={0x9, 0x0}, 0x8) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=r0, 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f00000000c0)=0x8) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000100)={0x2, 0x0}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000140)=r3, 0x4) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000180)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200)=r0, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000240)={r5, r2, 0x0, r2}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)=@generic={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x18) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000300)={0x1, 0x6, [@random="54cfcb60013f", @broadcast, @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @local, @broadcast]}) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000340)=0x7fff) r6 = perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x2, 0x1, 0xd, 0x2, 0x0, 0x7, 0x100, 0xd, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb8, 0x0, @perf_config_ext={0x7fffffff, 0x1}, 0x200, 0x65ea, 0x4, 0x2, 0x1ff, 0xc, 0xef35, 0x0, 0x6, 0x0, 0x9}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x7) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000400)={'veth0_macvtap\x00', @remote}) recvmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000440), 0x6e, &(0x7f0000000580)=[{&(0x7f00000004c0)=""/25, 0x19}, {&(0x7f0000000500)=""/73, 0x49}], 0x2, &(0x7f00000005c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xc8}, 0x1001) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x2d, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x100}, {{0x18, 0x1, 0x1, 0x0, r11}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8b3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xd}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7fffffff}, @ldst={0x0, 0x1, 0x3, 0x2, 0x4, 0xffffffffffffffc0, 0xffffffffffffffff}, @tail_call={{0x18, 0x2, 0x1, 0x0, r9}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000008c0)='GPL\x00', 0x8, 0x15, &(0x7f0000000900)=""/21, 0x41000, 0x8, '\x00', 0x0, @sk_lookup, r8, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r11, 0x7, 0x0, &(0x7f0000000940)=[{0x2, 0x5, 0xb, 0x4}, {0x3, 0x2, 0x5, 0x4}, {0x4, 0x5, 0x6, 0x6}, {0x5, 0x2, 0x0, 0x4}, {0x5, 0x5, 0xa, 0x6}, {0x3, 0x4, 0x6, 0x5}, {0x1, 0x5, 0xa, 0xa}], 0x10, 0x6}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a80)=@o_path={&(0x7f0000000700)='./file0\x00', r15}, 0x18) ioctl$TUNGETVNETBE(r10, 0x800454df, &(0x7f0000000ac0)) recvmsg$unix(r2, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/205, 0xcd}], 0x2, &(0x7f0000001c40)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}, 0x40) ioctl$TUNSETTXFILTER(r13, 0x400454d1, &(0x7f0000001cc0)={0x0, 0x9, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @broadcast, @local, @broadcast, @local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, @random="9358fa5b3f3e"]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001e00)={@map=r8, 0x1e, 0x0, 0x1, &(0x7f0000001d00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000001d40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001d80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001dc0)=[0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001e80)={r12, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001e40)={@fallback=r17, r8, 0x35, 0x4, 0x0, @void, @value=r15, @void, @void, r16}, 0x20) r18 = openat$cgroup_ro(r8, &(0x7f0000001ec0)='pids.current\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000020c0)={r18, 0x0, 0xe9, 0x0, &(0x7f0000001f00)="6851a69be8269bae4e283a7890649bcc857cda0bf21a09f10e6c26a95133e60c84967bde4843d2d958e04967acfa683dee1a891bbfec4260a952bac013e7821249fc9d73a7dcb45639e19103ea6f0f5e2bc6c624440ef042a6e800c3b7cc547992cfb249b5e4bc18039e449a696ab4a7711f750a808b3bc1ef28f2213a436df55204f0953d1ec264e0ffa7653ca9a770abaaa3579b908004f254f520a32048e6decec48d4d126d5549de28d714912ea3ad80c69bb36cdc9b7d1dc0de9df55cb53f7e50b43c2a9068cd9141ce6f673d066b89f1fe2ad12e26d615c7d062add1d404ae2440ffe0dd9e1a", 0x0, 0xf, 0x0, 0x9b, 0x0, &(0x7f0000002000)="603a3d5ab6c7d4b74d401b8214d632634a9aede8b1d83e5f6b0dcf850e31f25a5972b88f4d8be9b181db685d26e025b90cf755783f8a4e6d484711d2691f58a842d176607f1e4dd9acdaa08bf1e7d5aa59033e8d251b5583895bbb6061e3d07a53756d06c136f7e0187a07dcdaf52048735b4d182ddaa7c949ffdbd32075a6bfbe290e1b4de3b8fd1852044ba94b855ed5fc3a024d16052df60033", 0x0, 0x2, 0x0, 0x3}, 0x50) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000002140)={'vlan0\x00', 0x2000}) r19 = perf_event_open(&(0x7f00000021c0)={0x2, 0x80, 0x6, 0x40, 0xf8, 0xa, 0x0, 0x6, 0x6, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x6, 0xfff}, 0x10000, 0xce91, 0x3, 0x8, 0xbb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r14, 0xa, r13, 0xb) bpf$OBJ_GET_PROG(0x7, &(0x7f0000002240)=@o_path={&(0x7f0000002180)='./file0\x00', 0x0, 0x8, r19}, 0x18) 26.491842326s ago: executing program 3 (id=224): bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000060000000306000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000749fe385634c2e1200"/28], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0x51, &(0x7f0000000240)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000680), 0x8, 0x65, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd"], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x11, 0x2d, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x400}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x1, 0x7, 0x2, 0x4, 0xffffffffffffffff, 0xfffffffffffffff0}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x7fffffff, 0xf0, &(0x7f0000000580)=""/240, 0x40f00, 0x10, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000000840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x2, 0xfffffffb, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000008c0)=[r0, r0], &(0x7f0000000900)=[{0x1, 0x5, 0x8, 0x2}, {0x1, 0x2, 0xd, 0xc}, {0x1, 0x5, 0xe, 0x6}], 0x10, 0x3}, 0x94) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000100), 0x200df000, r0, 0x0, 0x800000000}, 0x38) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) 26.491074836s ago: executing program 1 (id=34): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYRES8=r1], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) close(r3) write$cgroup_type(r4, &(0x7f0000000280), 0x9) close(r1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r5}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095", @ANYRESHEX], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7ff00000000bfa200100000000007020000f8ffffffb703000008000000b70400000000fdff84000000030000009500"/72], 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r9, &(0x7f00000001c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00'}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r7, 0x20, &(0x7f0000000500)={&(0x7f0000000800)=""/4096, 0x1000, 0x0, &(0x7f0000001800)=""/206, 0xce}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x7, 0x0}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffff75, 0x0, 0x0, 0x0}, 0x94) 25.512688476s ago: executing program 0 (id=225): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000001c0), 0x12) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) 25.510650346s ago: executing program 2 (id=226): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000040)=0x1) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/187) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x10, r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r0, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)='%-5lx \x00'}, 0x20) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0xfffffeb2, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x13, 0xe, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000300)='GPL\x00', 0x7fff, 0xe8, &(0x7f0000000340)=""/232, 0x41100, 0x3c, '\x00', 0x0, @fallback=0xc, r3, 0x8, &(0x7f0000000480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xe, 0x9, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000006c0)=[r4, r5, r6, 0x1], &(0x7f0000000700)=[{0x2, 0x5, 0x7, 0x3}, {0x5, 0x5, 0x9, 0x2}, {0x5, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x2, 0x3}, {0x4, 0x3, 0x0, 0x4}], 0x10, 0x5}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x6, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001ac0)={r2, 0x58, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0xa, 0x15, &(0x7f0000001b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf4}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001c40)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x43, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000001c80)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001cc0)={0x0, 0x10, 0x2c, 0x7}, 0x10, 0x0, r7, 0x7, &(0x7f0000001d00)=[r4, r1, r6, r2], &(0x7f0000001d40)=[{0x0, 0x4, 0xa, 0x6}, {0x2, 0x2, 0xc, 0xa}, {0x5, 0x5, 0x7, 0xc}, {0x0, 0x1, 0x7, 0xb}, {0x0, 0x3, 0x9, 0x9}, {0x2, 0x5, 0x9, 0x9}, {0x1, 0x4, 0x9, 0x2}], 0x10, 0x2}, 0x94) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001e80)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x5, '\x00', 0x0, r3, 0x5, 0x4, 0x4}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001f80)={{r5, 0xffffffffffffffff}, &(0x7f0000001f00), &(0x7f0000001f40)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x19, 0x23, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1b5, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@alu={0x4, 0x1, 0x6, 0x5, 0xb, 0x1, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @alu={0x7, 0x0, 0xd, 0x0, 0x1, 0x10, 0x4}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000a40)=""/4096, 0x41100, 0x14, '\x00', r9, @cgroup_sockopt=0x16, r3, 0x8, &(0x7f0000001b00)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001b40)={0x3, 0xf, 0xa096, 0x200}, 0x10, 0x0, r10, 0x0, &(0x7f0000001fc0)=[r11, r12], 0x0, 0x10, 0x7}, 0x94) r13 = gettid() syz_open_procfs$namespace(r13, &(0x7f00000020c0)='ns/pid\x00') ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000002100)) r14 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002140), 0x2, 0x0) write$cgroup_subtree(r14, &(0x7f0000002180)={[{0x2d, 'blkio'}, {0x2d, 'cpuset'}, {0x2d, 'cpuset'}, {0x2b, 'devices'}, {0x2d, 'devices'}]}, 0x29) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000022c0)={r6, 0x58, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x1, 0x8, &(0x7f00000021c0)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}], &(0x7f0000002200)='syzkaller\x00', 0x88, 0x0, 0x0, 0x41100, 0x8, '\x00', r15, @fallback=0x18, r0, 0x8, &(0x7f0000002300)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000002340)={0x4, 0x6, 0x101}, 0x10, 0xffffffffffffffff, r7, 0x4, 0x0, &(0x7f0000002380)=[{0x0, 0x5, 0x0, 0x9}, {0x0, 0x3, 0xe, 0x3}, {0x5, 0x1, 0x2, 0xb}, {0x1, 0x1, 0x9, 0x8}], 0x10, 0x7}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002740)={&(0x7f0000002480)=@abs, 0x6e, &(0x7f00000025c0)=[{&(0x7f0000002500)=""/117, 0x75}, {&(0x7f0000002580)=""/63, 0x3f}], 0x2, &(0x7f0000002600)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}, 0x40010021) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000002a80)={&(0x7f0000002780)="478d464eec3080eeef8efc7ca8ba8594c446b99bc73ec73c623b5259a9e5263fe21611f912404f14ef1b0f8771731fd480b11e02761ccf6f7e096a056f1d058c3cb46212bb980ce978751f420af172a39a1cd5195ff09f7d63b9f8f902a93f903275b262835d949e186a042771b76376b7a4b75e638b74f03e9c4d53e392a8e6e4b9fca899c37caf5a263fda4b938330ceab831e07ea4d8d7e5cc2967ebdb1f11c", &(0x7f0000002840)=""/220, &(0x7f0000002940)="ea9698364678ba8159e2e90a55d75ce18c00e956fa20dfea2aa147379d6778d5a8000fa19fb160cf5629e70b106e8fca4b993a255469a3032917c1751d8846137a78b100b9a3c0575e6e8e6544ccc100a138f3234d7b6d15a1c38e", &(0x7f00000029c0)="0a381f8f0f75c3edf52e48337e6514d96997c31bf807e8ff703973651da5ec3edd799efc3ada2f7414849aebea1709f9753fe4c6cd81be563c402eb2d36f282f05fd5e0778ce73fc276a08bd932387a69aa7066dc4491e1664ed4251538534b7c4708d682f3c161ad0040907825a21aa626c2e3717f3e907e942e31150460ec247085f97bfbfec7baee92bde62c8f1b4ec741989205b97ac15431aaf616d5cdcf04b6a1a538588e6ac760a90755a24a25e", 0xfffffffd, r16, 0x4}, 0x38) close(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000002b00)={0x0, 0x80, 0x81, 0x6, 0xa, 0x6e, 0x0, 0x80000000, 0x80000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000002ac0), 0x4}, 0x100, 0x4, 0xe0e20000, 0x4, 0x8001, 0x8, 0x8, 0x0, 0x466, 0x0, 0x1000}, r24, 0xe, r17, 0xe) perf_event_open$cgroup(&(0x7f0000002bc0)={0x0, 0x80, 0x5, 0x9, 0x3, 0x1, 0x0, 0x1, 0x40400, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000002b80), 0x9}, 0x900, 0x3, 0xcac, 0xe, 0x1, 0xffffff81, 0x30, 0x0, 0x9, 0x0, 0x6}, r19, 0x9, 0xffffffffffffffff, 0xe) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002f80)=@bpf_tracing={0x1a, 0x1a, &(0x7f0000002c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r19}}, {}, [@jmp={0x5, 0x1, 0xd, 0x1, 0x9, 0x40, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r21}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x6}, @map_val={0x18, 0x3, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0xfe09}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r23}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002d40)='syzkaller\x00', 0xda, 0xef, &(0x7f0000002d80)=""/239, 0x40f00, 0x0, '\x00', 0x0, 0x17, r20, 0x8, &(0x7f0000002e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000002ec0)={0x3, 0xb, 0x3, 0xe5c}, 0x10, 0x3b81, r22, 0x2, &(0x7f0000002f00)=[r12], &(0x7f0000002f40)=[{0x5, 0x4, 0x9, 0x6}, {0x2, 0x4, 0x9, 0xe}], 0x10, 0x3}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000030c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', r9, r18, 0x2, 0x0, 0x2}, 0x50) 25.509016586s ago: executing program 3 (id=227): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1, 0x8000000}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0900000006000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000400", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 25.506695066s ago: executing program 4 (id=228): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.272915141s ago: executing program 32 (id=225): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x100002, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r6}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_procs(r7, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000001c0), 0x12) write$cgroup_int(r5, &(0x7f0000000200), 0x43451) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) 2.265522192s ago: executing program 33 (id=226): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000040)=0x1) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000080)=""/187) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x10, r0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r0, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000200)}, 0x20) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)='%-5lx \x00'}, 0x20) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, 0xfffffeb2, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x13, 0xe, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000300)='GPL\x00', 0x7fff, 0xe8, &(0x7f0000000340)=""/232, 0x41100, 0x3c, '\x00', 0x0, @fallback=0xc, r3, 0x8, &(0x7f0000000480)={0x3, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xe, 0x9, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x5, &(0x7f00000006c0)=[r4, r5, r6, 0x1], &(0x7f0000000700)=[{0x2, 0x5, 0x7, 0x3}, {0x5, 0x5, 0x9, 0x2}, {0x5, 0x4, 0xe, 0xa}, {0x0, 0x3, 0x2, 0x3}, {0x4, 0x3, 0x0, 0x4}], 0x10, 0x5}, 0x94) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x6, 0x0, r6, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001ac0)={r2, 0x58, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0xa, 0x15, &(0x7f0000001b80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf4}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001c40)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x43, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x8, &(0x7f0000001c80)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001cc0)={0x0, 0x10, 0x2c, 0x7}, 0x10, 0x0, r7, 0x7, &(0x7f0000001d00)=[r4, r1, r6, r2], &(0x7f0000001d40)=[{0x0, 0x4, 0xa, 0x6}, {0x2, 0x2, 0xc, 0xa}, {0x5, 0x5, 0x7, 0xc}, {0x0, 0x1, 0x7, 0xb}, {0x0, 0x3, 0x9, 0x9}, {0x2, 0x5, 0x9, 0x9}, {0x1, 0x4, 0x9, 0x2}], 0x10, 0x2}, 0x94) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001e80)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0x5, '\x00', 0x0, r3, 0x5, 0x4, 0x4}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001f80)={{r5, 0xffffffffffffffff}, &(0x7f0000001f00), &(0x7f0000001f40)='%pi6 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x19, 0x23, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1b5, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@alu={0x4, 0x1, 0x6, 0x5, 0xb, 0x1, 0xfffffffffffffff0}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @alu={0x7, 0x0, 0xd, 0x0, 0x1, 0x10, 0x4}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000000a40)=""/4096, 0x41100, 0x14, '\x00', r9, @cgroup_sockopt=0x16, r3, 0x8, &(0x7f0000001b00)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000001b40)={0x3, 0xf, 0xa096, 0x200}, 0x10, 0x0, r10, 0x0, &(0x7f0000001fc0)=[r11, r12], 0x0, 0x10, 0x7}, 0x94) r13 = gettid() syz_open_procfs$namespace(r13, &(0x7f00000020c0)='ns/pid\x00') ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000002100)) r14 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002140), 0x2, 0x0) write$cgroup_subtree(r14, &(0x7f0000002180)={[{0x2d, 'blkio'}, {0x2d, 'cpuset'}, {0x2d, 'cpuset'}, {0x2b, 'devices'}, {0x2d, 'devices'}]}, 0x29) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000022c0)={r6, 0x58, &(0x7f0000002240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000023c0)={0x1, 0x8, &(0x7f00000021c0)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}], &(0x7f0000002200)='syzkaller\x00', 0x88, 0x0, 0x0, 0x41100, 0x8, '\x00', r15, @fallback=0x18, r0, 0x8, &(0x7f0000002300)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000002340)={0x4, 0x6, 0x101}, 0x10, 0xffffffffffffffff, r7, 0x4, 0x0, &(0x7f0000002380)=[{0x0, 0x5, 0x0, 0x9}, {0x0, 0x3, 0xe, 0x3}, {0x5, 0x1, 0x2, 0xb}, {0x1, 0x1, 0x9, 0x8}], 0x10, 0x7}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002740)={&(0x7f0000002480)=@abs, 0x6e, &(0x7f00000025c0)=[{&(0x7f0000002500)=""/117, 0x75}, {&(0x7f0000002580)=""/63, 0x3f}], 0x2, &(0x7f0000002600)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}, 0x40010021) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000002a80)={&(0x7f0000002780)="478d464eec3080eeef8efc7ca8ba8594c446b99bc73ec73c623b5259a9e5263fe21611f912404f14ef1b0f8771731fd480b11e02761ccf6f7e096a056f1d058c3cb46212bb980ce978751f420af172a39a1cd5195ff09f7d63b9f8f902a93f903275b262835d949e186a042771b76376b7a4b75e638b74f03e9c4d53e392a8e6e4b9fca899c37caf5a263fda4b938330ceab831e07ea4d8d7e5cc2967ebdb1f11c", &(0x7f0000002840)=""/220, &(0x7f0000002940)="ea9698364678ba8159e2e90a55d75ce18c00e956fa20dfea2aa147379d6778d5a8000fa19fb160cf5629e70b106e8fca4b993a255469a3032917c1751d8846137a78b100b9a3c0575e6e8e6544ccc100a138f3234d7b6d15a1c38e", &(0x7f00000029c0)="0a381f8f0f75c3edf52e48337e6514d96997c31bf807e8ff703973651da5ec3edd799efc3ada2f7414849aebea1709f9753fe4c6cd81be563c402eb2d36f282f05fd5e0778ce73fc276a08bd932387a69aa7066dc4491e1664ed4251538534b7c4708d682f3c161ad0040907825a21aa626c2e3717f3e907e942e31150460ec247085f97bfbfec7baee92bde62c8f1b4ec741989205b97ac15431aaf616d5cdcf04b6a1a538588e6ac760a90755a24a25e", 0xfffffffd, r16, 0x4}, 0x38) close(0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000002b00)={0x0, 0x80, 0x81, 0x6, 0xa, 0x6e, 0x0, 0x80000000, 0x80000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000002ac0), 0x4}, 0x100, 0x4, 0xe0e20000, 0x4, 0x8001, 0x8, 0x8, 0x0, 0x466, 0x0, 0x1000}, r24, 0xe, r17, 0xe) perf_event_open$cgroup(&(0x7f0000002bc0)={0x0, 0x80, 0x5, 0x9, 0x3, 0x1, 0x0, 0x1, 0x40400, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000002b80), 0x9}, 0x900, 0x3, 0xcac, 0xe, 0x1, 0xffffff81, 0x30, 0x0, 0x9, 0x0, 0x6}, r19, 0x9, 0xffffffffffffffff, 0xe) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002f80)=@bpf_tracing={0x1a, 0x1a, &(0x7f0000002c40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r19}}, {}, [@jmp={0x5, 0x1, 0xd, 0x1, 0x9, 0x40, 0x1}, @map_fd={0x18, 0xb, 0x1, 0x0, r21}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x6}, @map_val={0x18, 0x3, 0x2, 0x0, r12, 0x0, 0x0, 0x0, 0xfe09}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r23}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002d40)='syzkaller\x00', 0xda, 0xef, &(0x7f0000002d80)=""/239, 0x40f00, 0x0, '\x00', 0x0, 0x17, r20, 0x8, &(0x7f0000002e80)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000002ec0)={0x3, 0xb, 0x3, 0xe5c}, 0x10, 0x3b81, r22, 0x2, &(0x7f0000002f00)=[r12], &(0x7f0000002f40)=[{0x5, 0x4, 0x9, 0x6}, {0x2, 0x4, 0x9, 0xe}], 0x10, 0x3}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000030c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', r9, r18, 0x2, 0x0, 0x2}, 0x50) 2.251725174s ago: executing program 34 (id=227): perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1, 0x8000000}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0900000006000000080000000800000000000000", @ANYRES32, @ANYBLOB="00000400", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0xce, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r6, 0x2000000, 0xe, 0x0, &(0x7f0000000600)="c9f7b98600"/14, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.235480385s ago: executing program 35 (id=228): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x6, 0x4, 0x3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 0s ago: executing program 6 (id=230): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0xc008, r0}, 0x18) (async, rerun: 32) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@rc={0x1f, @any, 0x7f}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000180)=[{0x58, 0x111, 0x8, "64db60afa5320e4d7819662b282155d2bb64977a4acecf259b8e726a9de2752b7df2ee3a43e0fe0877923ec2e04b2310cd38ad761d30c8c37e616c75543fdcffdd325aef4b"}, {0xd0, 0x10d, 0xffff, "1e09c57dfc67649f5a6b003c989235e837f54088a60f0150e479a716ae6d2a366455bb2af39fa97679626860733d53240b6fe74c3f9f09bdc458d8cc06120b1babb234d435990611ea4feaa469e26fdedfbb381a820a0bc26348ed0e813f181fffa692de42ba1e771c2ef65971f8e206cb745e1dd6ffee3168bad3aceeeeb46abc62beb6b3ca27ef187cc90b75b33930f70d4ad572b522e71f058fcf19ed0c2e93b07d583f0985f40cc3b70b4733e121d708ea8332a4b033f5f16b"}], 0x128}, 0x0) (rerun: 32) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x3, 0x80, 0x2, 0x7, 0x0, 0xff, 0x0, 0xffffffff00000001, 0x80000, 0x12, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x4, 0x3}, 0x11, 0x7, 0x9, 0x2, 0xd, 0x9, 0xe, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000380)='!!\x00') (async, rerun: 32) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x420000, 0x0) (rerun: 32) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) (async) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@fallback=r0, 0x22, 0x1, 0xcf, &(0x7f0000000440)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={@map=r1, r4, 0x5, 0x2010, 0xffffffffffffffff, @value=r7, @void, @void, @void, r6}, 0x20) r8 = openat$cgroup_pressure(r5, &(0x7f0000000600)='io.pressure\x00', 0x2, 0x0) write$cgroup_pressure(r8, &(0x7f0000000640)={'some', 0x20, 0x1, 0x20, 0x70b}, 0x2f) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={r4, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f0000000700)=[0x0], &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9e, &(0x7f0000000780)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x8f, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) (rerun: 32) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000680)={@ifindex=r10, r8, 0x2, 0x0, 0x0, @void, @value=r7, @void, @void, r6}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a00)=@generic={&(0x7f00000009c0)='./file0\x00', 0x0, 0x8}, 0x18) (async) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a40)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async, rerun: 64) r13 = gettid() (rerun: 64) syz_open_procfs$namespace(r13, &(0x7f0000000a80)='ns/pid_for_children\x00') (async) perf_event_open(&(0x7f0000000b00)={0x2, 0x80, 0xfa, 0x4, 0x2, 0x4, 0x0, 0x0, 0x30104, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xf, 0x4, @perf_bp={&(0x7f0000000ac0), 0xd}, 0x0, 0x7fffffffffffffff, 0x7, 0x0, 0x3311, 0xb085, 0xf80, 0x0, 0x2, 0x0, 0x1ff}, r13, 0xe, r2, 0x8) (async, rerun: 64) r14 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b80)={r9}, 0x4) (async, rerun: 64) r15 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@generic={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000bc0)={@fallback=r2, r14, 0x2c, 0x14, 0x0, @void, @value=r15, @void, @void, r6}, 0x20) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000dc0)={r5, 0x0, 0xa, 0x0, &(0x7f0000000c80)="e5dce6b32f175d48c3b5", 0x0, 0xfffffff6, 0x0, 0xec, 0x0, &(0x7f0000000cc0)="b391bd428e5064758b73c424bd9c6be4dd8590498ea138dafccc6b1e4acdf544eeb0aa30627a5480c54f8d15295089aee34461027a7dbbe05e3044a9f5279fcfcdcda38d91aeab3460834486b474318c233ed8d9195d27b4cd42c6f2434d1481e2f1ebfc0ca31c0154bd0096227a287dc6cb49e1296c4c7db7a2a8aed9710cdd9d5d3c8f486bfad2d04f054b3f9e7939ec012ffd35b350216c6e1356251b1e87312c252278f72f541caceadaee0a814b689b790390f9d94b14da7fbf5e436a7b5dd2b19747e26c9def25abe2e8b65ebf64fbeaabd787d1f3dc00b5227008f5ba20fe398c0d2f876a3c7dccb4", 0x0, 0x2, 0x0, 0xead}, 0x50) r16 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e40)={0x0, 0x9, 0x4}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000f00)={r12, 0x58, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000f40)={0x2, 0x4, 0x8, 0x1, 0x80, r16, 0x4, '\x00', r17, 0xffffffffffffffff, 0x1, 0x2, 0x2}, 0x50) (async, rerun: 64) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000fc0), 0x6e, &(0x7f0000001480)=[{&(0x7f0000001040)=""/72, 0x48}, {&(0x7f00000010c0)=""/168, 0xa8}, {&(0x7f0000001180)=""/98, 0x62}, {&(0x7f0000001200)=""/81, 0x51}, {&(0x7f0000001280)=""/34, 0x22}, {&(0x7f00000012c0)=""/54, 0x36}, {&(0x7f0000001300)=""/200, 0xc8}, {&(0x7f0000001400)=""/69, 0x45}], 0x8, &(0x7f0000001500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x2100) (rerun: 64) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000015c0)={0x3, 0x0, [0x0, 0x0, 0x0]}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001a00)={0x6, 0xd, &(0x7f0000001600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff8}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x10}, @map_val={0x18, 0x7, 0x2, 0x0, r19, 0x0, 0x0, 0x0, 0x6}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x400}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe}]}, &(0x7f0000001680)='GPL\x00', 0x4618, 0x0, 0x0, 0x41100, 0x8, '\x00', r10, @fallback=0x36, r12, 0x8, &(0x7f00000016c0)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000001700)={0x0, 0x2, 0xecf6, 0x2}, 0x10, r11, 0xffffffffffffffff, 0x6, &(0x7f0000001940)=[r18], &(0x7f0000001980)=[{0x4, 0x5, 0x10, 0x5}, {0x9, 0x3}, {0x3, 0x5, 0x1, 0x7}, {0x2, 0x4, 0x1, 0x5}, {0x1, 0x1, 0x4, 0xa}, {0x1, 0x1, 0x0, 0x7}], 0x10, 0x8001}, 0x94) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.178' (ED25519) to the list of known hosts. [ 20.383215][ T30] audit: type=1400 audit(1766977570.199:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.384291][ T273] cgroup: Unknown subsys name 'net' [ 20.405935][ T30] audit: type=1400 audit(1766977570.199:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.433673][ T30] audit: type=1400 audit(1766977570.229:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.454036][ T273] cgroup: Unknown subsys name 'devices' [ 20.640999][ T273] cgroup: Unknown subsys name 'hugetlb' [ 20.646742][ T273] cgroup: Unknown subsys name 'rlimit' [ 20.843379][ T30] audit: type=1400 audit(1766977570.659:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.867052][ T30] audit: type=1400 audit(1766977570.659:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.872866][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.892280][ T30] audit: type=1400 audit(1766977570.659:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 20.924107][ T30] audit: type=1400 audit(1766977570.719:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.949717][ T30] audit: type=1400 audit(1766977570.719:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.979005][ T30] audit: type=1400 audit(1766977570.789:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.004566][ T30] audit: type=1400 audit(1766977570.789:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.004769][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.665353][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.672626][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.680114][ T282] device bridge_slave_0 entered promiscuous mode [ 21.702726][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.709991][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.717432][ T282] device bridge_slave_1 entered promiscuous mode [ 21.760555][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.767610][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.775071][ T284] device bridge_slave_0 entered promiscuous mode [ 21.790226][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.797487][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.805063][ T284] device bridge_slave_1 entered promiscuous mode [ 21.833749][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.841031][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.848334][ T281] device bridge_slave_0 entered promiscuous mode [ 21.855547][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.862712][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.870277][ T281] device bridge_slave_1 entered promiscuous mode [ 21.880277][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.887413][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.894886][ T285] device bridge_slave_0 entered promiscuous mode [ 21.914921][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.922004][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.929471][ T285] device bridge_slave_1 entered promiscuous mode [ 21.980790][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.987948][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.995412][ T283] device bridge_slave_0 entered promiscuous mode [ 22.015416][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.022516][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.029950][ T283] device bridge_slave_1 entered promiscuous mode [ 22.160380][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.167532][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.174950][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.182000][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.207839][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.215016][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.222322][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.229494][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.262991][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.270300][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.277943][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.285443][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.294354][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.302102][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.334308][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.342351][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.350730][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.357781][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.380906][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.388722][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.396379][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 22.405045][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.414102][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.421161][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.428776][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.436769][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.445142][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.453289][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.460480][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.467864][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.476343][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.483406][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.490939][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.499463][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.506669][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.514351][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.524139][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.532482][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.539644][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.555573][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.563766][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.570808][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.581010][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.610937][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.620729][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.628817][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.635867][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.643518][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.651698][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.659854][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.668306][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.675634][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.683033][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.691013][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.699002][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.706988][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.714946][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.723128][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 22.738844][ T282] device veth0_vlan entered promiscuous mode [ 22.747136][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.755599][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.764223][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.772338][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.780681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 22.788909][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.797473][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.804776][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.812447][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.819947][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.841762][ T281] device veth0_vlan entered promiscuous mode [ 22.848592][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.857187][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.866079][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.874976][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.883593][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.891661][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.901120][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.908712][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.916843][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 22.925227][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.937488][ T282] device veth1_macvtap entered promiscuous mode [ 22.948546][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.956770][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.965529][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.973475][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.981501][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.989921][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.997392][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.005903][ T285] device veth0_vlan entered promiscuous mode [ 23.023751][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.031902][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.040707][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.048809][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.057367][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.066032][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.074819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.083125][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.091408][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.099785][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.108614][ T281] device veth1_macvtap entered promiscuous mode [ 23.125560][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 23.135205][ T283] device veth0_vlan entered promiscuous mode [ 23.142780][ T284] device veth0_vlan entered promiscuous mode [ 23.149604][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.157397][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.165857][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.174207][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.182686][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.191103][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.199785][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.208298][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.216388][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.224488][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.232120][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.239734][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.247164][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.257422][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.265651][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.285364][ T283] device veth1_macvtap entered promiscuous mode [ 23.293480][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.303317][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.317078][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.325928][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.335760][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.343792][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.352348][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.378404][ T284] device veth1_macvtap entered promiscuous mode [ 23.387617][ T285] device veth1_macvtap entered promiscuous mode [ 23.401448][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.413069][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.421387][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.439069][ C0] hrtimer: interrupt took 29209 ns [ 23.445032][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.453904][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.462921][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.480896][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.500513][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.518077][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.526775][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.556516][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.573447][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.622966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.633979][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.786008][ T418] device sit0 entered promiscuous mode [ 25.118068][ T432] device syzkaller0 entered promiscuous mode [ 25.520625][ T444] device sit0 entered promiscuous mode [ 25.637320][ T453] ref_ctr_offset mismatch. inode: 0x39 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 25.685975][ T451] ÿÿÿÿÿÿ: renamed from vlan1 [ 25.780160][ T282] syz-executor (282) used greatest stack depth: 21344 bytes left [ 26.377738][ T466] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.395308][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 26.395324][ T30] audit: type=1400 audit(1766977576.209:117): avc: denied { create } for pid=479 comm="syz.3.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 26.421246][ T466] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.428808][ T466] device bridge_slave_0 entered promiscuous mode [ 26.440458][ T466] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.447736][ T466] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.455273][ T466] device bridge_slave_1 entered promiscuous mode [ 26.622375][ T30] audit: type=1400 audit(1766977576.439:118): avc: denied { create } for pid=466 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.649317][ T30] audit: type=1400 audit(1766977576.459:119): avc: denied { write } for pid=466 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.715423][ T500] device sit0 left promiscuous mode [ 26.719985][ T30] audit: type=1400 audit(1766977576.459:120): avc: denied { read } for pid=466 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.745554][ T508] device sit0 entered promiscuous mode [ 26.900264][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.921674][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.938434][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.950151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.958720][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.965942][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.974139][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.013293][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.028385][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.053324][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.060446][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.072676][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.087888][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.104432][ T30] audit: type=1400 audit(1766977576.919:121): avc: denied { cpu } for pid=527 comm="syz.2.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 27.127490][ T525] ÿÿÿÿÿÿ: renamed from vlan1 [ 27.134825][ T531] device sit0 left promiscuous mode [ 27.194466][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.217985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.232992][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.259583][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.274327][ T466] device veth0_vlan entered promiscuous mode [ 27.315965][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.332259][ T466] device veth1_macvtap entered promiscuous mode [ 27.357872][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.382897][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.583250][ T562] device veth1_macvtap left promiscuous mode [ 29.322523][ T30] audit: type=1400 audit(1766977579.139:122): avc: denied { tracepoint } for pid=596 comm="syz.4.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 29.643699][ T582] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.651407][ T582] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.658848][ T582] device bridge_slave_0 entered promiscuous mode [ 29.714934][ T582] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.722126][ T582] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.729873][ T582] device bridge_slave_1 entered promiscuous mode [ 29.827104][ T332] device bridge_slave_1 left promiscuous mode [ 29.834284][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.842216][ T332] device bridge_slave_0 left promiscuous mode [ 29.848507][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.856451][ T332] device veth1_macvtap left promiscuous mode [ 29.862755][ T332] device veth0_vlan left promiscuous mode [ 30.095724][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 30.127964][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 30.146341][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 30.155091][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 30.164080][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.171150][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.178901][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 30.189546][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 30.197908][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.204980][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.226891][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 30.290764][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 30.309817][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 30.339520][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 30.358402][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 30.366622][ T617] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 30.395293][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 30.403721][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 30.426336][ T582] device veth0_vlan entered promiscuous mode [ 30.475035][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 30.495259][ T582] device veth1_macvtap entered promiscuous mode [ 30.562851][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 30.588291][ T30] audit: type=1400 audit(1766977580.399:123): avc: denied { create } for pid=627 comm="syz.4.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.638444][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 31.267777][ T646] device veth0_vlan left promiscuous mode [ 31.289909][ T646] device veth0_vlan entered promiscuous mode [ 31.618228][ T652] device syzkaller0 entered promiscuous mode [ 32.065041][ T660] device syzkaller0 entered promiscuous mode [ 32.302994][ T680] device pim6reg1 entered promiscuous mode [ 32.347199][ T655] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.354767][ T655] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.362670][ T655] device bridge_slave_0 entered promiscuous mode [ 32.384656][ T655] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.394235][ T655] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.405490][ T655] device bridge_slave_1 entered promiscuous mode [ 32.694742][ T655] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.701857][ T655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.709183][ T655] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.716262][ T655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.820654][ T332] device bridge_slave_1 left promiscuous mode [ 32.827009][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 32.834778][ T332] device bridge_slave_0 left promiscuous mode [ 32.841119][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 32.849513][ T332] device veth1_macvtap left promiscuous mode [ 32.855668][ T332] device veth0_vlan left promiscuous mode [ 33.053634][ T30] audit: type=1400 audit(1766977582.869:124): avc: denied { create } for pid=722 comm="syz.2.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 33.150481][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 33.164338][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 33.172085][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 33.224866][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 33.289802][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.296966][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.350904][ T30] audit: type=1400 audit(1766977583.169:125): avc: denied { create } for pid=735 comm="syz.2.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 33.352811][ T736] ------------[ cut here ]------------ [ 33.379355][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 33.397877][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.405116][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.449534][ T736] trace type BPF program uses run-time allocation [ 33.456122][ T736] WARNING: CPU: 1 PID: 736 at kernel/bpf/verifier.c:11722 check_map_prog_compatibility+0x6cd/0x870 [ 33.487278][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 33.499319][ T736] Modules linked in: [ 33.503248][ T736] CPU: 0 PID: 736 Comm: syz.2.98 Not tainted syzkaller #0 [ 33.521262][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 33.555508][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 33.569036][ T736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 33.591396][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 33.618605][ T30] audit: type=1400 audit(1766977583.429:126): avc: denied { ioctl } for pid=746 comm="syz.0.100" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 33.650021][ T655] device veth0_vlan entered promiscuous mode [ 33.659863][ T736] RIP: 0010:check_map_prog_compatibility+0x6cd/0x870 [ 33.671482][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 33.684412][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 33.692868][ T736] Code: ee ff 48 c7 c6 20 fa 47 85 4c 8b 65 d0 e9 fd fc ff ff e8 f6 4a ee ff c6 05 24 96 6b 05 01 48 c7 c7 80 f6 47 85 e8 c3 78 25 03 <0f> 0b e9 88 fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c ac f9 ff [ 33.716618][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 33.724652][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 33.737615][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 33.745553][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 33.753405][ T736] RSP: 0018:ffffc90000987428 EFLAGS: 00010246 [ 33.781580][ T736] RAX: ff7d9a69d8e1a900 RBX: 0000000000000001 RCX: ffff8881284aa780 [ 33.795536][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 33.804333][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 33.862620][ T736] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 33.873066][ T655] device veth1_macvtap entered promiscuous mode [ 33.889560][ T736] RBP: ffffc90000987470 R08: dffffc0000000000 R09: ffffed103ee24e93 [ 33.911896][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 33.925759][ T736] R10: ffffed103ee24e93 R11: 1ffff1103ee24e92 R12: ffff888128254000 [ 33.929637][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 33.941977][ T736] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff88810acc0800 [ 33.950696][ T736] FS: 00007f640e3eb6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 33.969221][ T736] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 33.984703][ T736] CR2: 0000000100000000 CR3: 000000011e044000 CR4: 00000000003506b0 [ 34.001661][ T736] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 34.009516][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.018384][ T736] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 34.036379][ T736] Call Trace: [ 34.043085][ T736] [ 34.049264][ T736] resolve_pseudo_ldimm64+0x685/0x11d0 [ 34.073138][ T736] ? check_attach_btf_id+0xde0/0xde0 [ 34.092441][ T763] device veth0_vlan left promiscuous mode [ 34.098478][ T736] ? __mark_reg_known+0x1b0/0x1b0 [ 34.109787][ T763] device veth0_vlan entered promiscuous mode [ 34.116125][ T736] ? security_capable+0x87/0xb0 [ 34.121903][ T736] bpf_check+0x2c25/0xf280 [ 34.130841][ T736] ? bpf_prog_119110c7debceb57+0x674/0x920 [ 34.145846][ T736] ? is_bpf_text_address+0x177/0x190 [ 34.161524][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 34.170746][ T736] ? bpf_get_btf_vmlinux+0x60/0x60 [ 34.178229][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 34.190942][ T736] ? unwind_get_return_address+0x4d/0x90 [ 34.199722][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.208393][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.216423][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 34.225119][ T736] ? stack_trace_save+0xe0/0xe0 [ 34.230332][ T736] ? arch_stack_walk+0xee/0x140 [ 34.235793][ T736] ? stack_trace_save+0x98/0xe0 [ 34.242008][ T736] ? __stack_depot_save+0x34/0x480 [ 34.249765][ T736] ? __kasan_slab_alloc+0x69/0xf0 [ 34.255184][ T736] ? _find_next_bit+0x1fa/0x200 [ 34.260342][ T736] ? __kasan_kmalloc+0xec/0x110 [ 34.265325][ T736] ? __kasan_kmalloc+0xda/0x110 [ 34.297321][ T30] audit: type=1400 audit(1766977584.109:127): avc: denied { relabelfrom } for pid=765 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.318170][ T736] ? kmem_cache_alloc_trace+0x119/0x270 [ 34.328512][ T736] ? selinux_bpf_prog_alloc+0x51/0x140 [ 34.363285][ T30] audit: type=1400 audit(1766977584.109:128): avc: denied { relabelto } for pid=765 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 34.394132][ T736] ? security_bpf_prog_alloc+0x62/0x90 [ 34.431579][ T736] ? bpf_prog_load+0x97c/0x1550 [ 34.436888][ T736] ? __sys_bpf+0x4c3/0x730 [ 34.449320][ T736] ? __x64_sys_bpf+0x7c/0x90 [ 34.453956][ T736] ? x64_sys_call+0x4b9/0x9a0 [ 34.458815][ T736] ? do_syscall_64+0x4c/0xa0 [ 34.489207][ T736] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.500283][ T736] ? check_stack_object+0x81/0x140 [ 34.512131][ T736] ? memset+0x35/0x40 [ 34.521698][ T736] ? bpf_obj_name_cpy+0x193/0x1e0 [ 34.536652][ T736] bpf_prog_load+0x1042/0x1550 [ 34.542019][ T736] ? __anon_inode_getfd+0x34b/0x3b0 [ 34.547814][ T736] ? map_freeze+0x360/0x360 [ 34.552559][ T736] ? selinux_bpf+0xc7/0xf0 [ 34.557358][ T736] ? security_bpf+0x82/0xa0 [ 34.573682][ T736] __sys_bpf+0x4c3/0x730 [ 34.577987][ T736] ? bpf_link_show_fdinfo+0x310/0x310 [ 34.614846][ T736] ? __kasan_check_write+0x14/0x20 [ 34.629172][ T736] ? switch_fpu_return+0x15d/0x2c0 [ 34.634452][ T736] __x64_sys_bpf+0x7c/0x90 [ 34.649671][ T736] x64_sys_call+0x4b9/0x9a0 [ 34.683503][ T736] do_syscall_64+0x4c/0xa0 [ 34.687984][ T736] ? clear_bhb_loop+0x50/0xa0 [ 34.701183][ T736] ? clear_bhb_loop+0x50/0xa0 [ 34.709094][ T736] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 34.725269][ T736] RIP: 0033:0x7f640f983749 [ 34.739491][ T736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.794415][ T736] RSP: 002b:00007f640e3eb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.819495][ T736] RAX: ffffffffffffffda RBX: 00007f640fbd9fa0 RCX: 00007f640f983749 [ 34.859884][ T332] device bridge_slave_1 left promiscuous mode [ 34.866171][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.879214][ T736] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 34.893371][ T332] device bridge_slave_0 left promiscuous mode [ 34.919162][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.937850][ T736] RBP: 00007f640fa07f91 R08: 0000000000000000 R09: 0000000000000000 [ 34.947245][ T332] device veth1_macvtap left promiscuous mode [ 34.953619][ T332] device veth0_vlan left promiscuous mode [ 34.969114][ T736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.977193][ T736] R13: 00007f640fbda038 R14: 00007f640fbd9fa0 R15: 00007ffd2723b8e8 [ 35.000401][ T736] [ 35.043069][ T736] ---[ end trace ab01456389aea2f0 ]--- [ 35.053227][ T787] syz.4.111[787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.054558][ T787] syz.4.111[787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.202385][ T798] device syzkaller0 entered promiscuous mode [ 35.334037][ T786] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.371580][ T786] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.379617][ T786] device bridge_slave_0 entered promiscuous mode [ 35.395258][ T786] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.403322][ T786] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.411208][ T786] device bridge_slave_1 entered promiscuous mode [ 35.530022][ T834] Â: renamed from pim6reg1 [ 35.592091][ T786] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.599202][ T786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.606699][ T786] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.613852][ T786] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.655665][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.666931][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.678804][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 35.686648][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.756320][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.765343][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.772704][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.784425][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.792910][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.799987][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.892735][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 35.901570][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.909961][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.933794][ T786] device veth0_vlan entered promiscuous mode [ 35.957610][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 35.966082][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 35.973820][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 35.985076][ T786] device veth1_macvtap entered promiscuous mode [ 35.993270][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.024225][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.042426][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.239775][ T850] GPL: port 1(veth0_to_team) entered blocking state [ 36.256452][ T850] GPL: port 1(veth0_to_team) entered disabled state [ 36.270488][ T850] device veth0_to_team entered promiscuous mode [ 36.623316][ T332] device bridge_slave_1 left promiscuous mode [ 36.629738][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.637483][ T332] device bridge_slave_0 left promiscuous mode [ 36.643879][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.652174][ T332] device veth1_macvtap left promiscuous mode [ 36.658287][ T332] device veth0_vlan left promiscuous mode [ 36.889463][ T30] audit: type=1400 audit(1766977586.709:129): avc: denied { create } for pid=863 comm="syz.2.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 36.950667][ T857] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.957733][ T857] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.985913][ T857] device bridge_slave_0 entered promiscuous mode [ 37.011964][ T857] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.039745][ T857] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.107174][ T857] device bridge_slave_1 entered promiscuous mode [ 37.572748][ T30] audit: type=1400 audit(1766977587.389:130): avc: denied { create } for pid=896 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 37.621280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 37.632665][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.655011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 37.665324][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.679328][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.686424][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.694784][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 37.705307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.713718][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.720797][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.728687][ T905] device wg2 entered promiscuous mode [ 37.749173][ T911] device pim6reg1 entered promiscuous mode [ 37.766192][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 37.799934][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 37.808203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.824156][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.850122][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.857043][ T921] syz.0.145[921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.858336][ T921] syz.0.145[921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.871542][ T30] audit: type=1400 audit(1766977587.689:131): avc: denied { create } for pid=917 comm="syz.2.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 37.911525][ T857] device veth0_vlan entered promiscuous mode [ 37.925687][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.934617][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 37.944600][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 37.973435][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 38.029958][ T857] device veth1_macvtap entered promiscuous mode [ 38.063734][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 38.076071][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 38.106210][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 38.135093][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 38.493214][ T332] device bridge_slave_1 left promiscuous mode [ 38.499454][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.506825][ T332] device bridge_slave_0 left promiscuous mode [ 38.513047][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.520795][ T332] device veth1_macvtap left promiscuous mode [ 38.526793][ T332] device veth0_vlan left promiscuous mode [ 39.029556][ T947] device pim6reg1 entered promiscuous mode [ 40.499043][ C0] sched: RT throttling activated [ 42.588613][ T944] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.595828][ T944] bridge0: port 1(bridge_slave_0) entered disabled state [ 42.604135][ T944] device bridge_slave_0 entered promiscuous mode [ 42.612128][ T944] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.619369][ T944] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.626832][ T944] device bridge_slave_1 entered promiscuous mode [ 42.692241][ T944] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.699494][ T944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.825085][ T971] device veth1_macvtap left promiscuous mode [ 42.833688][ T972] device veth1_macvtap entered promiscuous mode [ 42.840027][ T972] device macsec0 entered promiscuous mode [ 42.851323][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 42.952996][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.960750][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.049915][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 43.058491][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.067861][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.074949][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.082617][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.091297][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.098335][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.132979][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.141512][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.150003][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.157567][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.165153][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.173455][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.182569][ T944] device veth0_vlan entered promiscuous mode [ 43.270935][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.282228][ T944] device veth1_macvtap entered promiscuous mode [ 43.302072][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.310993][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.462172][ T332] device bridge_slave_1 left promiscuous mode [ 43.468454][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 43.503295][ T332] device bridge_slave_0 left promiscuous mode [ 43.512026][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 43.541795][ T332] device veth1_macvtap left promiscuous mode [ 43.547856][ T332] device veth0_vlan left promiscuous mode [ 44.320248][ T30] audit: type=1400 audit(1766977594.139:132): avc: denied { read } for pid=1006 comm="syz.4.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.670665][ T1033] bond_slave_1: mtu less than device minimum [ 44.860817][ T332] device bridge_slave_1 left promiscuous mode [ 44.887330][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 44.911996][ T332] device bridge_slave_0 left promiscuous mode [ 44.921107][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 44.933749][ T332] device veth1_macvtap left promiscuous mode [ 44.940039][ T332] device veth0_vlan left promiscuous mode [ 45.124655][ T1048] device syzkaller0 entered promiscuous mode [ 45.254813][ T1015] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.262608][ T1015] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.275821][ T1015] device bridge_slave_0 entered promiscuous mode [ 45.285472][ T1015] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.292632][ T1015] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.300345][ T1015] device bridge_slave_1 entered promiscuous mode [ 45.543610][ T30] audit: type=1400 audit(1766977595.349:133): avc: denied { create } for pid=1062 comm="syz.4.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 45.785476][ T1015] bridge0: port 2(bridge_slave_1) entered blocking state [ 45.792757][ T1015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 45.800243][ T1015] bridge0: port 1(bridge_slave_0) entered blocking state [ 45.807392][ T1015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 45.825148][ T332] bridge0: port 1(bridge_slave_0) entered disabled state [ 45.833252][ T332] bridge0: port 2(bridge_slave_1) entered disabled state [ 45.910844][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 45.922674][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 46.004431][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 46.031006][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 46.048609][ T332] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.055721][ T332] bridge0: port 1(bridge_slave_0) entered forwarding state [ 46.094234][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 46.142130][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 46.177244][ T332] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.184351][ T332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 46.227929][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 46.269480][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 46.309691][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 46.328478][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 46.418146][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 46.436807][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 46.483522][ T1015] device veth0_vlan entered promiscuous mode [ 46.498833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 46.509529][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 46.526537][ T1015] device veth1_macvtap entered promiscuous mode [ 46.562175][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 46.576961][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 46.585359][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 46.594187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 46.603518][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 46.620237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 46.629691][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 46.650511][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 46.659968][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 46.773495][ T30] audit: type=1400 audit(1766977596.589:134): avc: denied { create } for pid=1112 comm="syz.2.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 47.785182][ T1133] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.793882][ T1133] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.879631][ T1131] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.886869][ T1131] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.897390][ T1131] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.905579][ T1131] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.912904][ T1131] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.920068][ T1131] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.930807][ T1131] device bridge0 entered promiscuous mode [ 48.052226][ T30] audit: type=1400 audit(1766977597.869:135): avc: denied { create } for pid=1142 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 48.312717][ T1140] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.320581][ T1140] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.329553][ T1140] device bridge_slave_0 entered promiscuous mode [ 48.339563][ T1140] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.346786][ T1140] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.354445][ T1140] device bridge_slave_1 entered promiscuous mode [ 48.441236][ T351] device bridge_slave_1 left promiscuous mode [ 48.448701][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.472523][ T351] device bridge_slave_0 left promiscuous mode [ 48.489201][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.507412][ T351] device veth1_macvtap left promiscuous mode [ 48.519014][ T351] device veth0_vlan left promiscuous mode [ 48.851206][ T30] audit: type=1400 audit(1766977598.669:136): avc: denied { create } for pid=1162 comm="syz.4.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 48.959401][ T1140] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.966580][ T1140] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.974000][ T1140] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.981187][ T1140] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.256251][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.285462][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.304731][ T1195] syz.3.210[1195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.304827][ T1195] syz.3.210[1195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 52.318564][ T1195] device pim6reg1 entered promiscuous mode [ 52.338843][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.347830][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.355108][ T30] audit: type=1400 audit(1766977602.159:137): avc: denied { create } for pid=1194 comm="syz.3.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 52.431933][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.440833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.449186][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.456589][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.464044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.472502][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.480784][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.487822][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.495446][ T1203] bond_slave_1: mtu less than device minimum [ 52.509315][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.517648][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.529433][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.541043][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.564068][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 52.582988][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 52.600075][ T1140] device veth0_vlan entered promiscuous mode [ 52.645663][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 52.654160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 52.663031][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 52.672637][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 52.686966][ T1140] device veth1_macvtap entered promiscuous mode [ 52.694131][ T1215] GPL: port 1(erspan0) entered blocking state [ 52.700609][ T1215] GPL: port 1(erspan0) entered disabled state [ 52.707216][ T1215] device erspan0 entered promiscuous mode [ 52.719224][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 52.744328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 52.759568][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 52.826559][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 52.848821][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.858287][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 52.866764][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.917899][ T1227] device sit0 entered promiscuous mode [ 52.985282][ T30] audit: type=1400 audit(1766977602.799:138): avc: denied { create } for pid=1233 comm="syz.0.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 54.073593][ T351] device bridge_slave_1 left promiscuous mode [ 54.083613][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.091234][ T351] device bridge_slave_0 left promiscuous mode [ 54.097570][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.106409][ T351] device veth1_macvtap left promiscuous mode [ 54.112592][ T351] device veth0_vlan left promiscuous mode [ 77.583804][ T1261] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.591210][ T1261] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.598653][ T1261] device bridge_slave_0 entered promiscuous mode [ 77.606681][ T1261] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.613758][ T1261] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.621312][ T1261] device bridge_slave_1 entered promiscuous mode [ 77.700842][ T1262] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.707909][ T1262] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.715513][ T1262] device bridge_slave_0 entered promiscuous mode [ 77.722562][ T1262] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.729699][ T1262] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.737124][ T1262] device bridge_slave_1 entered promiscuous mode [ 77.805120][ T1265] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.812331][ T1265] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.820009][ T1265] device bridge_slave_0 entered promiscuous mode [ 77.833152][ T1263] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.840223][ T1263] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.847726][ T1263] device bridge_slave_0 entered promiscuous mode [ 77.857769][ T1265] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.865536][ T1265] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.873333][ T1265] device bridge_slave_1 entered promiscuous mode [ 77.883400][ T1264] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.890577][ T1264] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.897984][ T1264] device bridge_slave_0 entered promiscuous mode [ 77.904941][ T1263] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.912109][ T1263] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.919640][ T1263] device bridge_slave_1 entered promiscuous mode [ 77.935935][ T1264] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.943209][ T1264] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.950623][ T1264] device bridge_slave_1 entered promiscuous mode [ 78.122301][ T1262] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.129395][ T1262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.136833][ T1262] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.143878][ T1262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.171182][ T351] device veth0_to_team left promiscuous mode [ 78.177270][ T351] GPL: port 1(veth0_to_team) entered disabled state [ 78.184875][ T351] device bridge_slave_1 left promiscuous mode [ 78.191011][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.198515][ T351] device bridge_slave_0 left promiscuous mode [ 78.204830][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.212660][ T351] device veth1_macvtap left promiscuous mode [ 78.392337][ T1261] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.399435][ T1261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.406724][ T1261] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.413965][ T1261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.429597][ T1263] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.436780][ T1263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.444224][ T1263] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.451268][ T1263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.467091][ T1264] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.474348][ T1264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.481726][ T1264] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.488745][ T1264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.504946][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.512858][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.520611][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.527794][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.535834][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.543575][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.550899][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.558204][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.573590][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.581067][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.613736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.622501][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.631022][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.638131][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.645777][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.654120][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.662596][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.669820][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.679642][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.687698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.696069][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.705133][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.722008][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.729488][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.737020][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.744658][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.771165][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.779656][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.788124][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.795287][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.803363][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.812144][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.820505][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.827530][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.835034][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.843443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.851692][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.858703][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.866231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.874551][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.882710][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.889751][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.897131][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.904558][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.912117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.920511][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.928589][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.935716][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.943160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.951625][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.959824][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.966838][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.974356][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.001779][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.010881][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.018305][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.026243][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.034883][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.043550][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.051934][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.060089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.068092][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.076186][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.084175][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.092186][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.109731][ T1262] device veth0_vlan entered promiscuous mode [ 79.127012][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.134666][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.142468][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 79.151889][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 79.160186][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.167204][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.174694][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 79.183362][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 79.191969][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.198995][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.206794][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.214969][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.223095][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.231418][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.246368][ T1265] device veth0_vlan entered promiscuous mode [ 79.256729][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.265577][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.273867][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.281613][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.289542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.301592][ T1261] device veth0_vlan entered promiscuous mode [ 79.312909][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.321329][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.329769][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.338057][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.345844][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.361018][ T1265] device veth1_macvtap entered promiscuous mode [ 79.367978][ T1262] device veth1_macvtap entered promiscuous mode [ 79.376759][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.385294][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.398353][ T1263] device veth0_vlan entered promiscuous mode [ 79.406662][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.414668][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.422208][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.442543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.450872][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.459443][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.467736][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.476596][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.489922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.500206][ T1263] device veth1_macvtap entered promiscuous mode [ 79.526745][ T1261] device veth1_macvtap entered promiscuous mode [ 79.534815][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.543024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.550927][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.560215][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.569956][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 79.580287][ T1264] device veth0_vlan entered promiscuous mode [ 79.598911][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.608648][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.629205][ T30] audit: type=1400 audit(1766977629.439:139): avc: denied { write } for pid=273 comm="syz-executor" path="pipe:[13975]" dev="pipefs" ino=13975 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 79.665676][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.679437][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.688076][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.710920][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.719595][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.728166][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.024753][ T351] device erspan0 left promiscuous mode [ 80.030495][ T351] GPL: port 1(erspan0) entered disabled state [ 80.341858][ T351] device bridge_slave_1 left promiscuous mode [ 80.348117][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.355668][ T351] device bridge_slave_0 left promiscuous mode [ 80.361870][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.369801][ T351] device bridge_slave_1 left promiscuous mode [ 80.376001][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.383566][ T351] device bridge_slave_0 left promiscuous mode [ 80.389702][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.397698][ T351] device bridge_slave_1 left promiscuous mode [ 80.403883][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.411232][ T351] device bridge_slave_0 left promiscuous mode [ 80.417331][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.425604][ T351] device veth1_macvtap left promiscuous mode [ 80.431746][ T351] device veth0_vlan left promiscuous mode [ 80.437859][ T351] device veth1_macvtap left promiscuous mode [ 80.444000][ T351] device veth0_vlan left promiscuous mode [ 83.419947][ T351] device bridge_slave_1 left promiscuous mode [ 83.426083][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.433566][ T351] device bridge_slave_0 left promiscuous mode [ 83.439826][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.447631][ T351] device bridge_slave_1 left promiscuous mode [ 83.453863][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.461251][ T351] device bridge_slave_0 left promiscuous mode [ 83.467343][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.475322][ T351] device bridge_slave_1 left promiscuous mode [ 83.481728][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.489419][ T351] device bridge_slave_0 left promiscuous mode [ 83.495642][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.503661][ T351] device bridge_slave_1 left promiscuous mode [ 83.510204][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.517749][ T351] device bridge_slave_0 left promiscuous mode [ 83.524176][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.532195][ T351] device bridge_slave_1 left promiscuous mode [ 83.538333][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 83.546218][ T351] device bridge_slave_0 left promiscuous mode [ 83.552589][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 83.561023][ T351] device veth0_vlan left promiscuous mode [ 83.566791][ T351] device veth1_macvtap left promiscuous mode [ 83.572839][ T351] device veth0_vlan left promiscuous mode [ 83.578624][ T351] device veth1_macvtap left promiscuous mode [ 83.584676][ T351] device veth0_vlan left promiscuous mode [ 83.590807][ T351] device veth1_macvtap left promiscuous mode [ 83.596801][ T351] device veth0_vlan left promiscuous mode [ 83.602944][ T351] device veth1_macvtap left promiscuous mode [ 83.609073][ T351] device veth0_vlan left promiscuous mode